Products/Services
product
- Line up
- Network Security: Trellix (formerly FireEye) Network Security
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense
- Network Security: Trellix (formerly McAfee) Network Security Platform
- Endpoint: Trellix (formerly FireEye) HX
- Endpoint: Trellix (formerly McAfee) Mvision
- Data Protection: Trellix Data Security
- Email Security: Trellix (formerly FireEye) Server Edition
- Email Security: Trellix Cloud Edition
- Security Operations: Trellix (formerly FireEye) Helix
- Security Operations: Trellix (formerly McAfee) SIEM (Security Information and Event Management)
- Enhanced cloud governance: Trellix (formerly FireEye) Cloudvisory
- File Security: Trellix (formerly FireEye) Malware File Storage Scanning
- Integrated Management Solution: Trellix (formerly FireEye) Central Management
- NDR Solution: Network Investigator (NI) / Packet Capture (PX)
- Cloud-based File Threat Protection: Trellix IVX Cloud
Specifications/Technical Information
Specifications/Technical Information
- Trellix (formerly FireEye) Technical Information
- Trellix (formerly FireEye) Specifications
- Network Security: Trellix (formerly FireEye) Network Security Technical Information
- Network Security: Trellix (formerly McAfee) Network Security Platform Technical Information
- Network Security: Trellix (formerly McAfee) Network Security Platform Specifications
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense Technical Information
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense Specification
- Email Security: Trellix (formerly FireEye) Server Edition EX Series Technical Information
- Email Security: Trellix (formerly FireEye) Server Edition EX Series Specifications
- Integrated Management Solution: Trellix (formerly FireEye) Central Management (CM) Series Specifications
- Security Operations: Trellix (formerly McAfee) SIEM (Security Information and Event Management) Technical Information

Trellix
Trellix
Data Loss Prevention
Trellix Data Loss Prevention(DLP)
⇒A product line that prevents data leaks by identifying and protecting data on the network and offline
Features of Trellix Data Security
Features of Trellix Data Security
DLP Endpoint: Device protection
- Windows/MacOS
- Data Protection Features
- Device Protection
DLP Prevent/Monitor
- Mail Data Protection
- Web Data Protection
- Packet Capture
DLP Discover: Server Protection
- NAS/BOX file data protection
- SharePoint Data Protection
- DB Record Protection
Skyhigh CASB/SSE: Cloud Protection
- File protection in cloud environments
- Cloud Service Data Protection
- Cloud Access Control
Trellix Data Security Lineup
Line of Business | Product Type | Product Family | Products |
Data Security Data Protection |
Data Loss Prevention Information leakage prevention measures |
Data Loss Prevention Endpoint Endpoint Data Leak Prevention |
①Data Loss Prevention Endpoint Complete: DLP Full Version |
②Device Control: DLP Device Control Limited Edition |
|||
Data Loss Prevention Network Network information leakage prevention |
③Data Loss Prevention Network Prevent: Web/email information leakage prevention |
||
④Data Loss Prevention Network Monitor: Network Information Leakage Monitoring |
|||
Data Loss Prevention Discover Data Discovery |
⑤Data Loss Prevention Discover: Detection of confidential information stored on servers, etc. |
||
Data Encryption Data Encryption |
Drive Protection HDD encryption |
⑥ Drive Encryption: Trellix proprietary HDD encryption management |
|
⑦Native Drive Encryption: OS standard encryption management |
|||
File Protection File Encryption |
⑧File and Removable media Protection: File or removable media encryption |
①Data Loss Prevention Endpoint Complete DLP complete version
<概要>
- Endpoint Data Leak Prevention
- Block information leakage from various routes
- route
- Email
- Removable media
-printing
- Webmail/Bulletin board
- Screen capture
- Clipboard etc. - action
- Logging
-block
- Alert
- Preservation of evidence
- route

- Automatic identification of data files
- Automatically identifies the type of data file (confidential information) based on policies, and sets rules for each identified file type and for each data transfer outflow route, ensuring that important information is not leaked to the outside.
②Device Control DLP Device Control Limited Edition
<概要>
- Restrict available external devices (printers, USB, etc.) and regulate how confidential information can be copied
<Device control example>
- Only specified USB memory devices are allowed to read and write, and appropriate controls (read-only or connection refusal) are implemented for other devices.
- "Permission (read and write)": USB provided by the company, devices necessary for work, etc.
- "Restricted (Read-only)": Media such as CD/DVD, etc.
- "Prohibited (Connection Denied)": Other devices not required for work, etc.
<Device designation>
- Devices can be flexibly specified using parameters such as product ID, vendor ID, and USB serial number (individual)
<File-by-file control>
- Restrict export of files containing specified keywords
- Logging of individual files written to removable media
<Points>
- Prevents data transmission or copying to external devices, preventing confidential information from leaking
- Obtain operation logs for devices and record information removal
③Data Loss Prevention Network Prevent Web/email information leakage countermeasures
<概要>
- Integration with Proxy Server (ICAP)
- Inspect web traffic
- Returns the inspection result to the web proxy server to allow or deny the traffic to the destination server.
- Integration with mail server (SMTP)
- Scan your email
- Based on the results of the inspection, the sending of the email is blocked or information is added to the header and sent to the sending email server.
④Data Loss Prevention Network Monitor Network information leakage monitoring
<概要>
- Monitors communications defined by protection rules (web transmissions, email, network).
- Communications are not blocked or altered, so there is no impact on communications
- If you discover a violation, create a hold and incident
<Points>
- EDM (Exact Data Matching) available
- Real-time scanning blocking
⑤Data Loss Prevention Discover Detects confidential information stored on servers, etc.
<概要>
- Discover sensitive information in your repositories
- File Server (CIFS)
- Share Point
- Box
- Databases (Microsoft SQL, MySQL, DB2, Oracle)
- Such
<Specifications>
- Inventory Scan:
- Collect metadata from files in the target repository and verify the stored files
- Classification Scan
- Discovering Sensitive Information in Repositories
- Remediation Scan
- Encrypting sensitive files or moving them to a secure repository
- Registration Scan
- Detect documents containing sensitive information and create fingerprint signatures
⑥Drive Encryption Trellix proprietary HDD encryption management
<概要>
Uses pre-boot authentication and a powerful encryption engine to protect data from unauthorized access, loss, or disclosure
<Points>
① Automatically encrypt all data on the hard disk
All temporary files and backup files in the system area are encrypted, ensuring strong security at all times.

②Strong user authentication and easy operability
- Unique user authentication is performed before the OS starts (authentication settings for when the screen saver is restored are also possible)
- Once authentication is passed, data encryption/decryption is automatically processed in the background, allowing you to use your computer without having to worry about any special operations.
⑦Native Drive Encryption OS standard encryption management
<概要>
Supports management of OS standard encryption (Windows: BitLocker, Mac: File Vault)
⑧File and Removable media Protection (FRP)
<概要>
- Encryption is performed on internal files to minimize damage caused by file leaks.
- Automatic encryption when writing to removable media (USB memory, external HDD)
- Encryption when saving data to a specified network folder
<Points>
- Encrypted files can only be decrypted under the following conditions:
- Machines with FRP installed
- The user or machine that was granted the decryption key
- Automatic data encryption reliably prevents information leaks when removable media is stolen or lost.
- Reduces the risk of exposure even if information is leaked

Trellix ePolicy Orchestrator(ePO)
- A platform for integrated management of former McAfee security products
- By centrally managing Trellix (formerly McAfee) products such as antivirus, host IPS, and Device Control, you can install software, distribute policies, collect logs, and more.
<ePO Features>
- Manage multiple functions from a single console
- Forced installation on non-installed computers
- Distributing security policies to client computers
- Understanding the security status of client computers
- Centralized management of logs and creation of various reports
- Display various product reports graphically on the dashboard
- easy management
- Web-based console allows access using a browser
<Products that can be managed/integrated with ePO>
- Trellix Drive Encryption
- Trellix Device Control
- Trellix File and Removable media Protection
- Trellix Data Loss Prevention Endpoint
Inquiry/Document request
In charge of Macnica Trellix Co., Ltd.
- TEL:045-476-2010
Weekdays: 9:00-17:00