Trellix

Trellix

Document request

If you would like the following materials, please proceed to the application form.

Trellix (formerly FireEye)

Document content
white paper

[Email Security] Macnica Implementation Case Study - Reasons for choosing Trellix Email Security from an operator's perspective - 1.95MB/12P PDF NEW

[Email Security] Countering Repeated Attacks - Trellix's Emotet Countermeasure1.40MB /6P PDF

catalog

[Email Security] Protect each store with FireEye's email threat protection940KB /2P PDF

[Cloud Security] FireEye's Approach to Effective Cloud Security3.42MB /8P PDF

[Targeted Attack Countermeasures and Security Operations] Countering Advanced Cyberattacks vs. Real Issues in Security Operations - Strengthening Security and Improving Operational Efficiency with FireEye Helix - 2.78MB/9P PDF

[E-mail Security] E-mail Security Measures Realized by FireEye Email Security5.74MB /16P PDF

[Email Security] A must-see for companies that have introduced Office365! What cloud email security should be implemented now3.14MB/10P PDF

Many cyber crimes are said to start with emails. Although companies have introduced email security products and are taking countermeasures, attackers are still trying to infiltrate their systems using all possible means. In particular, the number of companies using Office365 has increased significantly, and simultaneous attacks are being carried out against multiple targets. In this article, we will analyze the actual situation of targeted attacks and the gap between current security measures, and introduce an effective FireEye Email Security solution for companies that are considering introducing Office365.

[E-mail Security] Selection Guide for E-mail Security - Determining a Secure E-mail Gateway (SEG) You Can Really Rely On 654KB/10P PDF

[Email Security] Email Threat Report 2019 Q1 Statistics Revealed1.72MB/16P PDF

[Email Security] E-Mail & Threat Prevention "Email Security Series (Appliance)" "ETP Series (Cloud)" 615KB/2P PDF

[E-mail Security] The number of unknown threats is increasing, and targeted e-mail attacks are becoming more sophisticated .

[Security operation] Security automation makes operation easier! How to proceed with a successful SOAR introduction828KB /13P PDF

In recent years, cyber threats such as targeted attacks have become more sophisticated, increasing the burden on security operations. The skills required of people in charge are becoming more sophisticated, and the current situation is that they are approaching their limits both physically and mentally. As one of the solutions, the automation of security operations by SOAR (Security Orchestration and Automated Response) is attracting attention. SOAR is a security operation platform that works with various security products. By introducing SOAR, companies can obtain many benefits such as "automation of operations", "speeding up incident response", and "resolving lack of skills".
Among the various benefits, this document focuses on "automation of operations" and organizes the security operation issues surrounding companies. We will explain in an easy-to-understand manner how to proceed with the smooth introduction of SOAR for

[Security Operations] SIEM: Breaking Away from "Werewolf Boy" Finding True Alerts and Realizing Efficient Security Operations540KB /7P PDF

[Cloud Security] "5 Urban Legends of Cloud Security" that you should know before working on cloud security 730KB/8P PDF

[Security Trends] M-Trends 2020 7.55MB/60P PDF

For over 15 years, FireEye has been involved in detecting and responding to cyberattacks every day. M-Trends® 2020, now in its 11th year of release, brings insights from the front lines of these attacks to the cyber security industry.

[Utilization of Trellix (former FireEye) existing equipment] Differences between 4th and 5th generation0.98MB /12P PDF

Products called FireEye's 4th generation have been discontinued on November 15, 2017, and will be replaced by new generation 5th generation products from 2017. In the 5th generation, power consumption is suppressed and it has evolved to support MAC OS. This time, we will include a comparison table for equipment specifications, so please refer to it. (Detailed function introduction will be announced in a separate document.)

[Endpoint Security] The key to EDR, which is indispensable for countering the latest threats, is "operation" - MDR service that reduces operational load and eliminates threats from the root - 1.67MB/2P PDF

application form

Trellix (formerly McAfee)

McAfee Network Security Platform: High Performance Intrusion Prevention (IPS)

Document content
catalog

McAfee Network Security Platform 2.52MB/4P PDF

white paper

Performance verification result email attachment when SSL is detected

application form

McAfee SIEM: Threat Visibility with Log Analysis

Document content
catalog

McAfee SIEM 3.32MB/4P PDF

application form

McAfee Endpoint Data Protection: hard disk encryption, data loss prevention

Document content
catalog

McAfee Endpoint Data Protection 2.39MB/4P PDF

application form

Inquiry

In charge of Macnica Trellix Co., Ltd.

  • TEL:045-476-2010

Mon-Fri 8:45-17:30