Save to My Lists

Trellix Network Detection and Response (NDR) Features

What are the features of Trellix Network Detection and Response (NDR)?

Prevention

  • Intrusion Prevention
  • Firewall
  • Encryption
  • Security hardening
  • Cloud Data Protection

Detection

  • Intrusion Detection
  • Security Monitoring
  • Anti-Malware / Malware Detection

Administration

  • Compliance
  • Administration Console -
  • API / integrations

Top Rated Trellix Network Detection and Response (NDR) Alternatives

Filter for Features

Prevention

Intrusion Prevention

Enforces security paramaters to prevent unauthorized access. 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature.
89%
(Based on 18 reviews)

Firewall

Protects servers, data center infrastructure and information from a variety of attacks and malware threats. This feature was mentioned in 18 Trellix Network Detection and Response (NDR) reviews.
88%
(Based on 18 reviews)

Encryption

As reported in 18 Trellix Network Detection and Response (NDR) reviews. Provide some level of encryption of information, protecting sensitive data while it exists within the data center.
81%
(Based on 18 reviews)

Security hardening

Facilitates system and network security by identifying and remediating vulnerabilities 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature.
84%
(Based on 18 reviews)

Cloud Data Protection

As reported in 15 Trellix Network Detection and Response (NDR) reviews. Provides high quality and wide scope of in-cloud and offline data security capabilities.
81%
(Based on 15 reviews)

Detection

Intrusion Detection

Detects unauthorized access and use of privileged systems. This feature was mentioned in 17 Trellix Network Detection and Response (NDR) reviews.
85%
(Based on 17 reviews)

Security Monitoring

As reported in 19 Trellix Network Detection and Response (NDR) reviews. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
88%
(Based on 19 reviews)

Anti-Malware / Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences. 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature.
86%
(Based on 18 reviews)

Administration

Compliance

As reported in 16 Trellix Network Detection and Response (NDR) reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
82%
(Based on 16 reviews)

Administration Console -

Provides a centralized console for administation tasks and unified control. 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature.
83%
(Based on 18 reviews)

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 17 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature.
76%
(Based on 17 reviews)

Automation

Metadata Management

Indexes metadata descriptions for easier searching and enhanced insights

Not enough data

Artificial Intelligence & Machine Learning

Facilitates Artificial Intelligence (AI) or Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Functionality

Multi-Network Capability

Provides monitoring capabilities for multiple networks at once.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Network Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Scalability

Provides features to allow scaling for large organizations.

Not enough data

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Decryption

Facilitates the decryption of files and data stored using cryptographic algorithms.

Not enough data

Incident Management

Incident Logs

Information on each incident is stored in databases for user reference and analytics.

Not enough data

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Incident Reporting

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Analysis

File Analysis

Identifies potentially malicious files and applications for threats files and applications for abnormalities and threats.

Not enough data

Memory Analysis

Analyzes infortmation from a computer or other endpoint's memory dump for information removed from hard drive.

Not enough data

Registry Analysis

Identifies recently accessed files and applications for abnormalities and threats.

Not enough data

Email Analysis

Parses and/or extracts emails and associated content for malware, phishing, other data that can be used in investigations.

Not enough data

Linux Analysis

Allows for parsing and/or extraction of artifacts native to Linux OS including but not limited to system logs, SSH activity, and user accounts.

Not enough data

Remediation

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data