product
- Line up
- Network Security: Trellix (formerly FireEye) Network Security
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense
- Network Security: Trellix (formerly McAfee) Network Security Platform
- Endpoint: Trellix (formerly FireEye) HX
- Endpoint: Trellix (formerly McAfee) Mvision
- Endpoint: Trellix (formerly McAfee) Complete Data Protection
- Email Security: Trellix (formerly FireEye) Server Edition
- Email Security: Trellix (formerly FireEye) Cloud Edition
- Security Operations: Trellix (formerly FireEye) Helix
- Security Operations: Trellix (formerly McAfee) SIEM (Security Information and Event Management)
- Enhanced cloud governance: Trellix (formerly FireEye) Cloudvisory
- File Threat Protection in the Cloud: Trellix (Formerly FireEye) Detection On Demand
- File Security: Trellix (formerly FireEye) Malware File Storage Scanning
- Integrated Management Solution: Trellix (formerly FireEye) Central Management
- NDR Solution: Network Investigator (NI) / Packet Capture (PX)
Specifications/Technical Information
- Trellix (formerly FireEye) Technical Information
- Trellix (formerly FireEye) Specifications
- Network Security: Trellix (formerly FireEye) Network Security Technical Information
- Network Security: Trellix (formerly McAfee) Network Security Platform Technical Information
- Network Security: Trellix (formerly McAfee) Network Security Platform Specifications
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense Technical Information
- Network Security: Trellix (formerly McAfee) Advanced Threat Defense Specification
- Email Security: Trellix (formerly FireEye) Server Edition EX Series Technical Information
- Email Security: Trellix (formerly FireEye) Server Edition EX Series Specifications
- Integrated Management Solution: Trellix (formerly FireEye) Central Management (CM) Series Specifications
- Security Operations: Trellix (formerly McAfee) SIEM (Security Information and Event Management) Technical Information
Trellix
Trellix
Document request
If you would like the following materials, please proceed to the application form.
Trellix (formerly FireEye)
Document content | |
white paper |
[Email Security] Macnica Implementation Case Study - Reasons for choosing Trellix Email Security from an operator's perspective - 1.95MB/12P PDF NEW |
[Email Security] Countering Repeated Attacks - Trellix's Emotet Countermeasure1.40MB /6P PDF |
|
catalog |
[Email Security] Protect each store with FireEye's email threat protection940KB /2P PDF |
[Cloud Security] FireEye's Approach to Effective Cloud Security3.42MB /8P PDF |
|
[Targeted Attack Countermeasures and Security Operations] Countering Advanced Cyberattacks vs. Real Issues in Security Operations - Strengthening Security and Improving Operational Efficiency with FireEye Helix - 2.78MB/9P PDF |
|
[E-mail Security] E-mail Security Measures Realized by FireEye Email Security5.74MB /16P PDF |
|
[Email Security] A must-see for companies that have introduced Office365! What cloud email security should be implemented now3.14MB/10P PDF Many cyber crimes are said to start with emails. Although companies have introduced email security products and are taking countermeasures, attackers are still trying to infiltrate their systems using all possible means. In particular, the number of companies using Office365 has increased significantly, and simultaneous attacks are being carried out against multiple targets. In this article, we will analyze the actual situation of targeted attacks and the gap between current security measures, and introduce an effective FireEye Email Security solution for companies that are considering introducing Office365. |
|
[E-mail Security] Selection Guide for E-mail Security - Determining a Secure E-mail Gateway (SEG) You Can Really Rely On 654KB/10P PDF |
|
[Email Security] Email Threat Report 2019 Q1 Statistics Revealed1.72MB/16P PDF |
|
[Email Security] E-Mail & Threat Prevention "Email Security Series (Appliance)" "ETP Series (Cloud)" 615KB/2P PDF |
|
[E-mail Security] The number of unknown threats is increasing, and targeted e-mail attacks are becoming more sophisticated . |
|
[Security operation] Security automation makes operation easier! How to proceed with a successful SOAR introduction828KB /13P PDF In recent years, cyber threats such as targeted attacks have become more sophisticated, increasing the burden on security operations. The skills required of people in charge are becoming more sophisticated, and the current situation is that they are approaching their limits both physically and mentally. As one of the solutions, the automation of security operations by SOAR (Security Orchestration and Automated Response) is attracting attention. SOAR is a security operation platform that works with various security products. By introducing SOAR, companies can obtain many benefits such as "automation of operations", "speeding up incident response", and "resolving lack of skills". |
|
[Security Operations] SIEM: Breaking Away from "Werewolf Boy" Finding True Alerts and Realizing Efficient Security Operations540KB /7P PDF |
|
[Cloud Security] "5 Urban Legends of Cloud Security" that you should know before working on cloud security 730KB/8P PDF |
|
[Security Trends] M-Trends 2020 7.55MB/60P PDF For over 15 years, FireEye has been involved in detecting and responding to cyberattacks every day. M-Trends® 2020, now in its 11th year of release, brings insights from the front lines of these attacks to the cyber security industry. |
|
[Utilization of Trellix (former FireEye) existing equipment] Differences between 4th and 5th generation0.98MB /12P PDF Products called FireEye's 4th generation have been discontinued on November 15, 2017, and will be replaced by new generation 5th generation products from 2017. In the 5th generation, power consumption is suppressed and it has evolved to support MAC OS. This time, we will include a comparison table for equipment specifications, so please refer to it. (Detailed function introduction will be announced in a separate document.) |
|
[Endpoint Security] The key to EDR, which is indispensable for countering the latest threats, is "operation" - MDR service that reduces operational load and eliminates threats from the root - 1.67MB/2P PDF |
|
application form |
Trellix (formerly McAfee)
McAfee Network Security Platform: High Performance Intrusion Prevention (IPS)
Document content | |
catalog |
McAfee Network Security Platform 2.52MB/4P PDF |
white paper |
Performance verification result email attachment when SSL is detected |
application form |
McAfee SIEM: Threat Visibility with Log Analysis
Document content | |
catalog |
McAfee SIEM 3.32MB/4P PDF |
application form |
McAfee Endpoint Data Protection: hard disk encryption, data loss prevention
Document content | |
catalog |
McAfee Endpoint Data Protection 2.39MB/4P PDF |
application form |
Inquiry
In charge of Macnica Trellix Co., Ltd.
- TEL:045-476-2010
Mon-Fri 8:45-17:30