
(67)
4.6 out of 5
Visit Website
Sponsored
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature. | 89% (Based on 18 reviews) | |
Firewall | Protects servers, data center infrastructure and information from a variety of attacks and malware threats. This feature was mentioned in 18 Trellix Network Detection and Response (NDR) reviews. | 88% (Based on 18 reviews) | |
Encryption | As reported in 18 Trellix Network Detection and Response (NDR) reviews. Provide some level of encryption of information, protecting sensitive data while it exists within the data center. | 81% (Based on 18 reviews) | |
Security hardening | Facilitates system and network security by identifying and remediating vulnerabilities 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature. | 84% (Based on 18 reviews) | |
Cloud Data Protection | As reported in 15 Trellix Network Detection and Response (NDR) reviews. Provides high quality and wide scope of in-cloud and offline data security capabilities. | 81% (Based on 15 reviews) |
Intrusion Detection | Detects unauthorized access and use of privileged systems. This feature was mentioned in 17 Trellix Network Detection and Response (NDR) reviews. | 85% (Based on 17 reviews) | |
Security Monitoring | As reported in 19 Trellix Network Detection and Response (NDR) reviews. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | 88% (Based on 19 reviews) | |
Anti-Malware / Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature. | 86% (Based on 18 reviews) |
Compliance | As reported in 16 Trellix Network Detection and Response (NDR) reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 82% (Based on 16 reviews) | |
Administration Console - | Provides a centralized console for administation tasks and unified control. 18 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature. | 83% (Based on 18 reviews) | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. 17 reviewers of Trellix Network Detection and Response (NDR) have provided feedback on this feature. | 76% (Based on 17 reviews) |
Metadata Management | Indexes metadata descriptions for easier searching and enhanced insights | Not enough data | |
Artificial Intelligence & Machine Learning | Facilitates Artificial Intelligence (AI) or Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. | Not enough data | |
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data |
Multi-Network Capability | Provides monitoring capabilities for multiple networks at once. | Not enough data | |
Anomaly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Network Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data | |
Scalability | Provides features to allow scaling for large organizations. | Not enough data | |
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Anomaly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Decryption | Facilitates the decryption of files and data stored using cryptographic algorithms. | Not enough data |
Incident Logs | Information on each incident is stored in databases for user reference and analytics. | Not enough data | |
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Incident Reporting | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data |
File Analysis | Identifies potentially malicious files and applications for threats files and applications for abnormalities and threats. | Not enough data | |
Memory Analysis | Analyzes infortmation from a computer or other endpoint's memory dump for information removed from hard drive. | Not enough data | |
Registry Analysis | Identifies recently accessed files and applications for abnormalities and threats. | Not enough data | |
Email Analysis | Parses and/or extracts emails and associated content for malware, phishing, other data that can be used in investigations. | Not enough data | |
Linux Analysis | Allows for parsing and/or extraction of artifacts native to Linux OS including but not limited to system logs, SSH activity, and user accounts. | Not enough data |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Remediation Suggestions | Provides relevant and helpful suggestions for vulnerability remediation upon detection. | Not enough data | |
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data |