Average Ratings 6 Ratings

Total
ease
features
design
support

Average Ratings 4 Ratings

Total
ease
features
design
support

Description

A singularly innovative platform. Unmatched velocity. Limitless scalability. Singularity™ provides unparalleled visibility, top-tier detection capabilities, and self-sufficient response mechanisms. Experience the strength of AI-driven cybersecurity that spans across the entire enterprise. The foremost companies in the world rely on the Singularity platform to thwart, identify, and address cyber threats at remarkable speed, larger scales, and with enhanced precision across endpoints, cloud environments, and identity management. SentinelOne offers state-of-the-art security through this platform, safeguarding against malware, exploits, and scripts. The SentinelOne cloud-based solution has been meticulously designed to adhere to security industry standards while delivering high performance across various operating systems, including Windows, Mac, and Linux. With its continuous updates, proactive threat hunting, and behavioral AI, the platform is equipped to tackle any emerging threats effectively, ensuring comprehensive protection. Furthermore, its adaptive nature allows organizations to stay one step ahead of cybercriminals in an ever-evolving threat landscape.

Description

Trellix Endpoint Security (HX) enables rapid and precise forensic investigations throughout numerous endpoints. By implementing a comprehensive security framework, you can safeguard and strengthen your workforce across all endpoints. Trellix's Endpoint Security solutions leverage proactive threat intelligence and robust defenses throughout every stage of the attack lifecycle, enhancing your organization's safety and resilience. In today's ever-evolving threat landscape, it is crucial to maintain the security of your endpoints. Discover how our cohesive suite of endpoint protection technologies equips you with actionable intelligence, machine learning capabilities, and more, allowing you to consistently monitor threats and prevent attacks. The essence of endpoint security lies in the protection of data and workflows related to each device connected to your network. Endpoint protection platforms (EPP) function by scrutinizing files as they infiltrate the network, ensuring a safer digital environment for all users. By investing in advanced security solutions, organizations can stay one step ahead of potential cyber threats and enhance their overall security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

CYREBRO
Cofense Triage
Google Digital Risk Protection
Swimlane
1Fort
Auguria
Avalor
Azure Marketplace
Blink
Chronicle SOAR
CnSight
Cyclops
FortiSandbox
NetBird
Silk Security
Stamus Networks
ThreatAware
ThreatQ
Veriti
VirtualArmour

Integrations

CYREBRO
Cofense Triage
Google Digital Risk Protection
Swimlane
1Fort
Auguria
Avalor
Azure Marketplace
Blink
Chronicle SOAR
CnSight
Cyclops
FortiSandbox
NetBird
Silk Security
Stamus Networks
ThreatAware
ThreatQ
Veriti
VirtualArmour

Pricing Details

$45 per user per year
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

SentinelOne

Founded

2013

Country

United States

Website

www.sentinelone.com

Vendor Details

Company Name

Trellix

Founded

2022

Country

United States

Website

www.trellix.com/products/endpoint-security-hx/

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Alternatives

Criminal IP Reviews

Criminal IP

AI SPERA

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike
CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike