Site Search

Trellix

Trellix

In recent years, cyber attacks have been increasing, and their methods are becoming more sophisticated. In order to respond to these threats, a security monitoring system called "XDR" is required, which improves visibility and detection by cross-analyzing information from multiple sensors such as networks, endpoints, and clouds.

As a first step toward realizing XDR, we are proposing a variety of solutions that utilize XDR's core platform, Trellix Helix.

Let's strengthen our defenses against threats that are difficult to detect and deal with using a single product together with Trellix, which offers a wide range of security products!

For more information on each solution, please contact us at the bottom of the page.

Helix × NX

Discover invisible threats! Network strengthening solution

Improved network threat detection!
  • NX × Helix provides comprehensive visibility into threats, from advanced to invisible
You can visually check the flow of attacks!
  • Multiple alerts are consolidated into one, making it clear which threats need to be investigated
You can also aim to expand to XDR!
  • If EDR is implemented, it can be used in conjunction with this solution to check threats to devices in a series of flows.
Detect suspicious activity with Helix!

※NX:https://www.macnica.co.jp/business/security/manufacturers/trellix/nx.html

Helix × HX

Strengthening the security level of terminals × Reducing operational burden

Strengthen device security with your own rules!
  • Helix-specific HX detection rules
  • Windows event logs are also analyzed.
Manage multiple related alerts together!
  • Visualize the whole picture of alerts
  • Detects low-risk threats on their own
Efficient triage is possible!
  • Quantifying the risk level for each threat
  • Provides a series of steps required for investigation
Detect suspicious activity with Helix!

※HX:https://www.macnica.co.jp/business/security/manufacturers/trellix/endpoint.html

Helix × ENS × TIE

EPP Enhancement Proposal for ENS Implemented Users

Approaching EDR to resolve security issues!
  • Strengthening "detection" and "investigation"
  • "Response" that TIE EDR does not provide
Eliminate concerns when installing!
  • "Reduce costs" related to implementation
  • Reduces work hours
A stepping stone to XDR!
  • Introducing the core part of Trellix XDR, "Helix"
  • Log collection from other products is also possible
EPP achieves something close to EDR!

※ENS:https://www.macnica.co.jp/business/security/manufacturers/trellix/tes.html
 TIE:https://www.trellix.com/products/threat-intelligence-exchange/

Helix × ETP × MS365

Proposal for strengthening measures against attacks targeting authentication information

Prevent phishing emails with ETP!
  • Abundant functions allow you to take measures against phishing emails and spoofing attacks
Detect unauthorized logins with Helix!
  • Able to detect malicious behavior associated with activities that are difficult to detect using email security products alone
Reduces the workload of managing alerts!
  • Aggregate and display multiple related alerts
  • Centralized management of alerts for multiple products
Detect using Trellix Helix's unique rules!

※ETP:https://www.macnica.co.jp/business/security/manufacturers/trellix/etp.html

Inquiry/Document request

In charge of Macnica Trellix Co., Ltd.

  • TEL:045-476-2010

Weekdays: 9:00-17:00