Trellix has announced the expansion of its XDR platform. Arriving in the fourth quarter of 2022, the upgraded XDR engine provides security operations teams with enhanced playbooks for guided investigations, upgraded threat intelligence through the integration of McAfee and FireEye assets, and the launch of Trellix Event Fabric.
Trellix Event Fabric bridges disparate security data from any cloud provider allowing security analysts to access and correlate data from anywhere. This combination of machine learning and automation allows security operations teams to reduce mean time detection and improve mean time to response.
“We have the most comprehensive XDR platform in the industry,” said Bryan Palma, CEO, Trellix. “Legacy security information and event management (SIEM) technology has failed to modernize security operations. We are confident Trellix XDR fills this critical gap.”
XConsole simplifies the user experience across Trellix XDR providing a single interface for security operations teams. Delivering a common operating picture allows customers to maximize their investments in native Trellix technologies and third-party security tools. By leveraging a single user interface, analysts and responders can quickly baseline their overall threat posture through added visibility across network, endpoint, data, email, and cloud attack surfaces. Available early in 2023, XConsole becomes the control center for Trellix XDR.
“Trellix XDR, now incorporating a unified security operations console, brings it all together by ingesting data from all technologies in an organization,” said Dr. Ali Baghdadi, Senior Vice President & Chief Country Executive, Ingram Micro. “This easy-to-use platform is very attractive to our customers.”
Arriving early 2023, Trellix Endpoint unifies the best of McAfee and FireEye technologies across endpoint protection, endpoint detection and response, and forensics to deliver best-in-class layered endpoint defense.
This first step on the XDR journey provides:
- multi-stage ransomware prevention
- identity detection and response to prevent credential theft and abuse
- attack surface management to prioritize threats that matter
- digital forensics and incident response to quickly find root causes.