{"id":32195,"date":"2024-01-29T11:27:52","date_gmt":"2024-01-29T10:27:52","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/"},"modified":"2024-12-05T09:31:41","modified_gmt":"2024-12-05T08:31:41","slug":"trellix-endpoint-detection-response-edr","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/","title":{"rendered":"Trellix Endpoint Detection &#038; Response (EDR)"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-knua6ap-0eb70e3b62506131d4cbbf149268631d entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jxddwld-f6a5a4c42a05a093053a8fc3dc042842\">\n.flex_cell.av-jxddwld-f6a5a4c42a05a093053a8fc3dc042842{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/Trellix-EDR-2.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jxddwld-f6a5a4c42a05a093053a8fc3dc042842{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jxddwld-f6a5a4c42a05a093053a8fc3dc042842 av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1yyeuht-c0e90f4a1a07e40dd91a8ca39fc29525\">\n.flex_cell.av-1yyeuht-c0e90f4a1a07e40dd91a8ca39fc29525{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-1yyeuht-c0e90f4a1a07e40dd91a8ca39fc29525{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-1yyeuht-c0e90f4a1a07e40dd91a8ca39fc29525 av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-j2px401-229147442c352991fc8c19c264dc2e6d\">\n#top .av-special-heading.av-j2px401-229147442c352991fc8c19c264dc2e6d{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-j2px401-229147442c352991fc8c19c264dc2e6d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-j2px401-229147442c352991fc8c19c264dc2e6d .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-j2px401-229147442c352991fc8c19c264dc2e6d .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-j2px401-229147442c352991fc8c19c264dc2e6d .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-j2px401-229147442c352991fc8c19c264dc2e6d .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-j2px401-229147442c352991fc8c19c264dc2e6d .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-j2px401-229147442c352991fc8c19c264dc2e6d av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Trellix Endpoint Detection <span class='special_amp'>&amp;<\/span> Response (EDR)<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-itu7c5d-8cc959bf216106fd0bfa13efc30e7c27\">\n#top .av_textblock_section.av-itu7c5d-8cc959bf216106fd0bfa13efc30e7c27 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-itu7c5d-8cc959bf216106fd0bfa13efc30e7c27 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><div class=\"avia-testimonial-meta-mini\">\n<p>Endpoint security beyond malware detection: detect, investigate and defend against attacks<\/p>\n<\/div>\n<\/div><\/section><\/p>\n<\/div><\/div><\/div><div id='av-layout-grid-2'  class='av-layout-grid-container av-i271aht-bc11b23da8fdd702274b33f3cadca09f entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ht7mmox-9e73b21599e89457fe2d50681d184adb\">\n.flex_cell.av-ht7mmox-9e73b21599e89457fe2d50681d184adb{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-ht7mmox-9e73b21599e89457fe2d50681d184adb{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-ht7mmox-9e73b21599e89457fe2d50681d184adb av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-h4yr0ox-e1bf3a322796e4ac5bef50019b93e208\">\n.flex_cell.av-h4yr0ox-e1bf3a322796e4ac5bef50019b93e208{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-h4yr0ox-e1bf3a322796e4ac5bef50019b93e208{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-h4yr0ox-e1bf3a322796e4ac5bef50019b93e208 av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div><\/div><div id='av-layout-grid-3'  class='av-layout-grid-container av-go6mh5t-62e8306c24d26b09ab62cfea0d49d87d entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-g4xlx0h-0efc70b9aff50db3dc2bb9eb6843fb4a\">\n.flex_cell.av-g4xlx0h-0efc70b9aff50db3dc2bb9eb6843fb4a{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-g4xlx0h-0efc70b9aff50db3dc2bb9eb6843fb4a{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-g4xlx0h-0efc70b9aff50db3dc2bb9eb6843fb4a av-gridrow-cell av_one_full no_margin  avia-builder-el-9  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-fojrs01-f67ef01423426d2af4a0bd03f37b829c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">AI-powered analytics for attack detection and investigation<\/h2>\n<p style=\"text-align: center;\">To avoid over-alerting or missing threats, EDR systems need the right data, correlations and analysis.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div><\/p>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-fl7g2n5-f1b3973e9fbbaeb925dd8ef36357fd90 entry-content-wrapper main_color av-flex-cells  avia-builder-el-11  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ewa3joh-76fb2a589a5c501cd89e2b4ac5de5daf\">\n.flex_cell.av-ewa3joh-76fb2a589a5c501cd89e2b4ac5de5daf{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-ewa3joh-76fb2a589a5c501cd89e2b4ac5de5daf{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-ewa3joh-76fb2a589a5c501cd89e2b4ac5de5daf av-gridrow-cell av_one_third no_margin  avia-builder-el-12  el_before_av_cell_one_third  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-ell8y8x-57830028c5d615e5570f96e66b31010a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Multiple analysis engines combined<\/h3>\n<p>Trellix EDR constantly collects data and analyses it using multiple engines to detect suspicious behaviour, interpret alerts and take the right action.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-e84be0x-56150f09f0be330dbebea928c5338272\">\n.flex_cell.av-e84be0x-56150f09f0be330dbebea928c5338272{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-e84be0x-56150f09f0be330dbebea928c5338272{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-e84be0x-56150f09f0be330dbebea928c5338272 av-gridrow-cell av_one_third no_margin  avia-builder-el-14  el_after_av_cell_one_third  el_before_av_cell_one_third  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-dipaae9-f7c360bab02608832c4f00eabda9e33d '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Trellix Insights for new context<\/h3>\n<p>The Trellix Intelligent Sandbox sends automatic notifications, provides information, assesses local systems, predicts possible impact on the security platform and gives instructions on how to avoid security breaches.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-cyg4ptt-9f5fb52c2b0fc30605e511afec40d180\">\n.flex_cell.av-cyg4ptt-9f5fb52c2b0fc30605e511afec40d180{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-cyg4ptt-9f5fb52c2b0fc30605e511afec40d180{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-cyg4ptt-9f5fb52c2b0fc30605e511afec40d180 av-gridrow-cell av_one_third no_margin  avia-builder-el-16  el_after_av_cell_one_third  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-co4wy5d-893dd9ec7883f7e4578e6e5d02692032 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Accelerated response to security incidents<\/h3>\n<p>Threats can be contained immediately by terminating a process, quarantining a computer or deleting files. A single endpoint or the entire inventory can be responded to with one click.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-84jcrs1-8fdd4b4a4ec4b763228c0af6f9627521 entry-content-wrapper main_color av-flex-cells  avia-builder-el-18  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6rhh3j5-a2021c44bffe8fe932bfebf9ecc79307\">\n.flex_cell.av-6rhh3j5-a2021c44bffe8fe932bfebf9ecc79307{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-6rhh3j5-a2021c44bffe8fe932bfebf9ecc79307{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-6rhh3j5-a2021c44bffe8fe932bfebf9ecc79307 av-gridrow-cell av_one_third no_margin  avia-builder-el-19  el_before_av_cell_one_third  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-63p36zl-2815147214788d019dbb48bae34f5d87 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Product benefits<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lrrswg0z-0920dfc219ab9e1589c77a251fd72e9f\">\n#top .hr.hr-invisible.av-lrrswg0z-0920dfc219ab9e1589c77a251fd72e9f{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-lrrswg0z-0920dfc219ab9e1589c77a251fd72e9f hr-invisible  avia-builder-el-21  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-lrrsw0fq-985119081411e2e062d9ad3e5c0c270b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><blockquote>\n<ul>\n<li>Reduced administration and rapid analysis<\/li>\n<li>Proactive insight into threats before an attack occurs<\/li>\n<li>AI-led investigations<\/li>\n<li>Extend analytical expertise<\/li>\n<\/ul>\n<\/blockquote>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5pf5tlt-e335a303ebd11a4f98b5533a05759f73\">\n.flex_cell.av-5pf5tlt-e335a303ebd11a4f98b5533a05759f73{\nvertical-align:middle;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-5pf5tlt-e335a303ebd11a4f98b5533a05759f73{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-5pf5tlt-e335a303ebd11a4f98b5533a05759f73 av-gridrow-cell av_one_third no_margin  avia-builder-el-23  el_after_av_cell_one_third  el_before_av_cell_one_third  content-align-middle'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2jloe3l-53cbf305d2d42b7bf6308ee6fe51f596\">\n.avia-image-container.av-2jloe3l-53cbf305d2d42b7bf6308ee6fe51f596 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-2jloe3l-53cbf305d2d42b7bf6308ee6fe51f596 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-2jloe3l-53cbf305d2d42b7bf6308ee6fe51f596 av-styling- avia-align-center  avia-builder-el-24  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img fetchpriority=\"high\" class='wp-image-28808 avia-img-lazy-loading-not-28808 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/06\/Trellix_LOGO_Color_Graphite-300.png' alt='Trellix' title='Trellix'  height=\"75\" width=\"300\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lrrsojqs-a8d50138a09c2f06da45f057c20aa852\">\n.flex_cell.av-lrrsojqs-a8d50138a09c2f06da45f057c20aa852{\nvertical-align:middle;\n}\n.responsive #top #wrap_all .flex_cell.av-lrrsojqs-a8d50138a09c2f06da45f057c20aa852{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-lrrsojqs-a8d50138a09c2f06da45f057c20aa852 av-gridrow-cell av_one_third no_margin  avia-builder-el-25  el_after_av_cell_one_third  avia-builder-el-last  content-align-middle'  ><div class='flex_cell_inner'><p><div  class='avia-button-wrap av-lrrsnv1x-40af198fbb7b144fd4a4e905fe3ff086-wrap avia-button-left  avia-builder-el-26  el_before_av_hr  avia-builder-el-first '><a href='\/wp-content\/downloads\/trellix-endpoint-detection-and-response-datasheet.pdf'  class='avia-button av-lrrsnv1x-40af198fbb7b144fd4a4e905fe3ff086 av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-dark'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Datasheet\"><span class='avia_iconbox_title' >Datasheet<\/span><\/a><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1zlow8x-64b6280a66b43eb0afb6394377039f94\">\n#top .hr.hr-invisible.av-1zlow8x-64b6280a66b43eb0afb6394377039f94{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-1zlow8x-64b6280a66b43eb0afb6394377039f94 hr-invisible  avia-builder-el-27  el_after_av_button  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-lrrso3ed-413baa2ea6595f326de181316098dd15-wrap avia-button-left  avia-builder-el-28  el_after_av_hr  avia-builder-el-last '><a href='mailto:sales@ikarus.at?subject=Trellix%20EDR%20-%20request%20from%20www.ikarussecurity.com'  class='avia-button av-lrrso3ed-413baa2ea6595f326de181316098dd15 av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Inquire now\"><span class='avia_iconbox_title' >Inquire now<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-6'  class='av-layout-grid-container av-50l5bmp-8e3003e1173161b2b701e893b19142e9 entry-content-wrapper main_color av-flex-cells  avia-builder-el-29  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4ftjbb5-ee76c427379c5db25e409553092239ba\">\n.flex_cell.av-4ftjbb5-ee76c427379c5db25e409553092239ba{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-4ftjbb5-ee76c427379c5db25e409553092239ba{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-4ftjbb5-ee76c427379c5db25e409553092239ba av-gridrow-cell av_one_full no_margin  avia-builder-el-30  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><p><section  class='av_textblock_section av-3t8qc8x-956860c27bbb591c56216728cc4434c5 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-31978\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png\" alt=\"Trellix Endpoint Detection &#038; Response (EDR)\" width=\"1920\" height=\"970\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png 1920w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1-300x152.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1-1030x520.png 1030w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1-768x388.png 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1-1536x776.png 1536w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1-1500x758.png 1500w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1-705x356.png 705w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-3ii7qbl-bdef001429e186158126cbab3703f7bf '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"col-12 mb-4\">\n<p style=\"text-align: center;\">The analysis results are displayed in the monitoring area &#8211; without false positives, but with actionable information.<\/p>\n<\/div>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-7'  class='av-layout-grid-container av-1t7xpwh-2e48af4a69d02464dcf18ddf960bd3ae entry-content-wrapper main_color av-flex-cells  avia-builder-el-33  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-17n7m3l-247a39a2cb888ff6e52a2b4244728999\">\n.flex_cell.av-17n7m3l-247a39a2cb888ff6e52a2b4244728999{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-17n7m3l-247a39a2cb888ff6e52a2b4244728999{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-17n7m3l-247a39a2cb888ff6e52a2b4244728999 av-gridrow-cell av_one_full no_margin  avia-builder-el-34  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-oubwg1-a29e80fb76b61281a06b82ff7f29a622 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2 style=\"text-align: center;\">Professional consultation<\/h2>\n<p style=\"text-align: center;\"><strong>Contact us<\/strong> for more information about Trellix Endpoint Detection &#038; Response!<\/p>\n<p style=\"text-align: center;\">Sales-Hotline: Phone +43 1 58995-500<\/p>\n<p style=\"text-align: center;\"><span style=\"text-align: center;\">+43 1 58995-500 |\u00a0<\/span><a style=\"text-align: center;\" href=\"mailto:sales@ikarus.at\">sales@ikarus.at<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4310,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-32195","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trellix Endpoint Detection &amp; Response (EDR) - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trellix Endpoint Detection &amp; Response (EDR) - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-05T08:31:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/\",\"name\":\"Trellix Endpoint Detection & Response (EDR) - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png\",\"datePublished\":\"2024-01-29T10:27:52+00:00\",\"dateModified\":\"2024-12-05T08:31:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#primaryimage\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Solutions\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trellix Endpoint Detection &#038; Response (EDR)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ikarusantivirussoftware\",\"https:\/\/x.com\/ikarusantivirus\",\"https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh\",\"https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh\",\"https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trellix Endpoint Detection & Response (EDR) - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/","og_locale":"en_US","og_type":"article","og_title":"Trellix Endpoint Detection & Response (EDR) - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2024-12-05T08:31:41+00:00","og_image":[{"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/","url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/","name":"Trellix Endpoint Detection & Response (EDR) - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png","datePublished":"2024-01-29T10:27:52+00:00","dateModified":"2024-12-05T08:31:41+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/trellix-edr-tour-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/trellix-endpoint-detection-response-edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security Solutions","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/"},{"@type":"ListItem","position":3,"name":"Trellix Endpoint Detection &#038; Response (EDR)"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/32195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=32195"}],"version-history":[{"count":4,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/32195\/revisions"}],"predecessor-version":[{"id":37674,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/32195\/revisions\/37674"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4310"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=32195"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=32195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}