Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 4 Ratings

Total
ease
features
design
support

Description

Cloud-native Percept EDR is a comprehensive, centrally-managed technology that works across platforms and detects and protects against advanced threats. Percept EDR, an intelligent, easy to manage, simple-to deploy product, works efficiently in heterogeneous environment. Percept EDR enhances detection capabilities by using AI-ML and EDR telemetry analytics. It is one of only a few products with on-agent artificial intelligence, ensuring devices are protected even when they are in offline mode. Percept EDR offers real-time protection against zero-day attacks, advanced persistent threats (APTs), ransomware, and other malicious activities. Percept EDR integrates components like device control, application blacklisting, and vulnerabilities management into a single, unified product. This gives you a dashboard view of your endpoint security.

Description

Trellix Endpoint Security (HX) enables rapid and precise forensic investigations throughout numerous endpoints. By implementing a comprehensive security framework, you can safeguard and strengthen your workforce across all endpoints. Trellix's Endpoint Security solutions leverage proactive threat intelligence and robust defenses throughout every stage of the attack lifecycle, enhancing your organization's safety and resilience. In today's ever-evolving threat landscape, it is crucial to maintain the security of your endpoints. Discover how our cohesive suite of endpoint protection technologies equips you with actionable intelligence, machine learning capabilities, and more, allowing you to consistently monitor threats and prevent attacks. The essence of endpoint security lies in the protection of data and workflows related to each device connected to your network. Endpoint protection platforms (EPP) function by scrutinizing files as they infiltrate the network, ensuring a safer digital environment for all users. By investing in advanced security solutions, organizations can stay one step ahead of potential cyber threats and enhance their overall security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AppSmart Identity
BackBox
CYREBRO
Cofense Triage
EnCase Forensic
Forcepoint Trusted Gateway System
Genian NAC
Google Cloud Platform
Google Digital Risk Protection
Microland
Microsoft Exchange
NorthStar Navigator
Notus
Swimlane
ThreatConnect Risk Quantifier (RQ)
Trellix Data Encryption
Trellix XDR

Integrations

AppSmart Identity
BackBox
CYREBRO
Cofense Triage
EnCase Forensic
Forcepoint Trusted Gateway System
Genian NAC
Google Cloud Platform
Google Digital Risk Protection
Microland
Microsoft Exchange
NorthStar Navigator
Notus
Swimlane
ThreatConnect Risk Quantifier (RQ)
Trellix Data Encryption
Trellix XDR

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Sequretek

Founded

2013

Country

United States

Website

sequretek.com/products/endpoint-detection-protection-response/

Vendor Details

Company Name

Trellix

Founded

2022

Country

United States

Website

www.trellix.com/products/endpoint-security-hx/

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike