Site Search

Trellix

Trellix

Document request

If you would like the following materials, please proceed to the application form.

Trellix (formerly FireEye)

Document content
white paper

[Email Security] Countering Repeated Attacks - Trellix's Emotet Countermeasure1.40MB /6P PDF

Whitelist-based virus protection that supports stable operation PDF

Case study

[Email Security] Macnica Implementation Case Study - Reasons for choosing Trellix Email Security from an operator's perspective - 1.95MB/12P PDF

catalog

[Targeted attack countermeasures and security operations] Countering advanced cyber attacks vs. real issues in security operations - Strengthening security and streamlining operations with Trellix Helix - 2.78MB/9P PDF

[E-mail Security] E-mail Security Measures Realized by FireEye Email Security5.74MB /16P PDF

[Email Security] A must-see for companies that have introduced Office365! What cloud email security should be implemented now3.14MB/10P PDF

Many cyber crimes are said to start with emails. Although companies have introduced email security products and are taking countermeasures, attackers are still trying to infiltrate their systems using all possible means. In particular, the number of companies using Office365 has increased significantly, and simultaneous attacks are being carried out against multiple targets. In this article, we will analyze the actual situation of targeted attacks and the gap between current security measures, and introduce an effective FireEye Email Security solution for companies that are considering introducing Office365.

[E-mail Security] Selection Guide for E-mail Security - Determining a Secure E-mail Gateway (SEG) You Can Really Rely On 654KB/10P PDF

[Email Security] E-Mail & Threat Prevention "Email Security Series (Appliance)" "ETP Series (Cloud)" 615KB/2P PDF

[Security operation] Security automation makes operation easier! How to proceed with a successful SOAR introduction828KB /13P PDF

In recent years, cyber threats such as targeted attacks have become more sophisticated, increasing the burden on security operations. The skills required of people in charge are becoming more sophisticated, and the current situation is that they are approaching their limits both physically and mentally. As one of the solutions, the automation of security operations by SOAR (Security Orchestration and Automated Response) is attracting attention. SOAR is a security operation platform that works with various security products. By introducing SOAR, companies can obtain many benefits such as "automation of operations", "speeding up incident response", and "resolving lack of skills".
Among the various benefits, this document focuses on "automation of operations" and organizes the security operation issues surrounding companies. We will explain in an easy-to-understand manner how to proceed with the smooth introduction of SOAR for

[Security Operations] SIEM: Breaking Away from "Werewolf Boy" Finding True Alerts and Realizing Efficient Security Operations540KB /7P PDF

[Endpoint Security] The key to EDR, which is indispensable for countering the latest threats, is "operation" - MDR service that reduces operational load and eliminates threats from the root - 1.67MB/2P PDF

application form

Inquiry

In charge of Macnica Trellix Co., Ltd.

  • TEL:045-476-2010

Weekdays: 9:00-17:00