product
- Line up
- Network Security: Trellix (formerly FireEye) Network Security
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense
- Network Security: Trellix (formerly McAfee) Network Security Platform
- Endpoint: Trellix (formerly FireEye) HX
- Endpoint: Trellix (formerly McAfee) Mvision
- Data Protection: Trellix Data Security
- Email Security: Trellix (formerly FireEye) Server Edition
- Email Security: Trellix Cloud Edition
- Security Operations: Trellix (formerly FireEye) Helix
- Security Operations: Trellix (formerly McAfee) SIEM (Security Information and Event Management)
- Enhanced cloud governance: Trellix (formerly FireEye) Cloudvisory
- File Security: Trellix (formerly FireEye) Malware File Storage Scanning
- Integrated Management Solution: Trellix (formerly FireEye) Central Management
- NDR Solution: Network Investigator (NI) / Packet Capture (PX)
- Cloud-based File Threat Protection: Trellix IVX Cloud
Specifications/Technical Information
- Trellix (formerly FireEye) Technical Information
- Trellix (formerly FireEye) Specifications
- Network Security: Trellix (formerly FireEye) Network Security Technical Information
- Network Security: Trellix (formerly McAfee) Network Security Platform Technical Information
- Network Security: Trellix (formerly McAfee) Network Security Platform Specifications
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense Technical Information
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense Specification
- Email Security: Trellix (formerly FireEye) Server Edition EX Series Technical Information
- Email Security: Trellix (formerly FireEye) Server Edition EX Series Specifications
- Integrated Management Solution: Trellix (formerly FireEye) Central Management (CM) Series Specifications
- Security Operations: Trellix (formerly McAfee) SIEM (Security Information and Event Management) Technical Information

Trellix
Trellix
Document request
If you would like the following materials, please proceed to the application form.
Trellix (formerly FireEye)
Document content | |
white paper |
[Email Security] Countering Repeated Attacks - Trellix's Emotet Countermeasure1.40MB /6P PDF |
Whitelist-based virus protection that supports stable operation PDF |
|
Case study |
[Email Security] Macnica Implementation Case Study - Reasons for choosing Trellix Email Security from an operator's perspective - 1.95MB/12P PDF |
catalog |
[Targeted attack countermeasures and security operations] Countering advanced cyber attacks vs. real issues in security operations - Strengthening security and streamlining operations with Trellix Helix - 2.78MB/9P PDF |
[E-mail Security] E-mail Security Measures Realized by FireEye Email Security5.74MB /16P PDF |
|
[Email Security] A must-see for companies that have introduced Office365! What cloud email security should be implemented now3.14MB/10P PDF Many cyber crimes are said to start with emails. Although companies have introduced email security products and are taking countermeasures, attackers are still trying to infiltrate their systems using all possible means. In particular, the number of companies using Office365 has increased significantly, and simultaneous attacks are being carried out against multiple targets. In this article, we will analyze the actual situation of targeted attacks and the gap between current security measures, and introduce an effective FireEye Email Security solution for companies that are considering introducing Office365. |
|
[E-mail Security] Selection Guide for E-mail Security - Determining a Secure E-mail Gateway (SEG) You Can Really Rely On 654KB/10P PDF |
|
[Email Security] E-Mail & Threat Prevention "Email Security Series (Appliance)" "ETP Series (Cloud)" 615KB/2P PDF |
|
[Security operation] Security automation makes operation easier! How to proceed with a successful SOAR introduction828KB /13P PDF In recent years, cyber threats such as targeted attacks have become more sophisticated, increasing the burden on security operations. The skills required of people in charge are becoming more sophisticated, and the current situation is that they are approaching their limits both physically and mentally. As one of the solutions, the automation of security operations by SOAR (Security Orchestration and Automated Response) is attracting attention. SOAR is a security operation platform that works with various security products. By introducing SOAR, companies can obtain many benefits such as "automation of operations", "speeding up incident response", and "resolving lack of skills". |
|
[Security Operations] SIEM: Breaking Away from "Werewolf Boy" Finding True Alerts and Realizing Efficient Security Operations540KB /7P PDF |
|
[Endpoint Security] The key to EDR, which is indispensable for countering the latest threats, is "operation" - MDR service that reduces operational load and eliminates threats from the root - 1.67MB/2P PDF |
|
application form |
Inquiry
In charge of Macnica Trellix Co., Ltd.
- TEL:045-476-2010
Weekdays: 9:00-17:00