InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Trellix Endpoint Security 10.7 Best Practices_English

Presented by

Heiko Brückle, Senior Security Engineer | Konstantin Berger, Senior Security Engineer

About this talk

With hybrid working the new normal, combined with rapid adoption of cloud applications and zero trust approaches, endpoints plays a central role in security considerations. Hackers are constantly finding new ways to gain access to corporate resources, steal data or compromise systems. Often, an employee’s client system is the entry point – or ‘patient zero’. That’s why it is important to configure the endpoint security solution on the systems as securely as possible. Trellix’s endpoint security solution offers many possibilities here. But where should you start? What does the ‘best configuration’ look like, and what do you need to bear in mind? What do you do if it doesn’t work as expected? These are just some of the questions we are asked most often. Join us when we’ll talk about configuration and troubleshooting capabilities of the Trellix Endpoint Security solution.
Trellix - EMEA

Trellix - EMEA

4471 subscribers32 talks
Living Security
Trellix is a global company redefining the future of cybersecurity. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix’s security experts, along with an extensive partner ecosystem, accelerate technology innovation through data science and automation to empower over 40,000 business and government customers. More at www.trellix.com.
Related topics