Trellix

Trellix

Cloud-based targeted email attack countermeasures “Trellix (former FireEye) Cloud Edition”

Trellix (formerly FireEye) Email Security - Cloud Edition alerts administrators when targeted emails are received. Uncover unknown threats not found in signatures by using MVX in the cloud. Furthermore, by linking with Network Security, you can prepare for situations in which users access unauthorized URLs.

 

Trellix (formerly FireEye) Email Security - Cloud Edition Feature Brief

Trellix (formerly FireEye) Product Features: MVX Virtual Execution Analysis Engine

Trellix (formerly FireEye) Product Features: Dynamic Threat Intelligence (DTI) Cloud

We share the latest threat information occurring around the world and strengthen the security of all service users with the latest defense functions.

Trellix (formerly FireEye) Email Security - Cloud Edition MVX Detection

Parsing files attached to emails
URL link analysis in email text
email header parsing

Trellix (formerly FireEye) Email Security - Cloud Edition Detection Enhancements

Dynamic URL Analysis
  • If a URL is found in the body of an email, it will be accessed within the Box, and if a file is found, it will be downloaded and analyzed dynamically.
Trellix (formerly FireEye) Advanced URL DEfence
  • Analyzing suspicious URLs with Trellix (formerly FireEye) cloud (DTI)
Multi-stage attack analysis
  • Multi-stage attack analysis where the file itself is not a malware executable, but communicates with an external site to deliver another malware
Phishing site analysis (PhishVision)
  • Analyzing website screenshot data using a mathematical model technique called "neural network"
Phishing site analysis (Kraken)
  • Detailed comparative analysis of website page content and base phishing sites

Trellix (formerly FireEye) Email Security - Cloud Edition Antispam/Antivirus

Trellix (formerly FireEye) Email Security - Cloud Edition AV/AS option includes:
  • Anti virus
    • Attachment scanning by 3rd party antivirus engines
  • Anti spam
    • RBL (Real-time Block List)
    • Directory Harvest Attack
    • Sender Authentication SPF/DKIM/DMARC
    • Custom rules (user-created WL/BL with conditions such as recipient, sender, etc.)

Deployment configuration

Example 1) Case where you are already using another company's Cloud Email security product and want to enhance/complement the function
Example 2) Case of integration with cloud email standard security service

Operational flow at the time of detection

Inquiry/Document request

In charge of Macnica Trellix Co., Ltd.

  • TEL:045-476-2010

Mon-Fri 8:45-17:30