Software Details
- 1 Year Subscription License + 1 Year Thrive Essential Support
- SaaS
- 1 User License
- 5 License Minimum
Know your gear
Trellix Application Control ensures only trusted applications run on servers. It reduces risks from unauthorized software, extends the viability of fixed-function systems without impacting performance, and lowers operating costs. Trellix Application Control is ideal for extending a layer of protection to systems that are fixed function in terms of CPU or memory resources. Its low overhead footprint does not impact system performance, requires very low initial and ongoing operational overhead, and is equally effective in standalone mode without network access. Trellix Application Control gives enterprises an effective way to block unauthorized applications on servers. Application Control uses a dynamic trust model, which eliminates the need for tedious manual updates to approved lists. As enterprises face an avalanche of unknown software from the web, this centrally managed solution adds a timely control to your systems security strategy, attuned to the operational needs of enterprises.
LICENSE: Per Node.
DELIVERABLE: Software as a Service (SaaS) with activation email
MANAGEMENT: ePO-SaaS
PRODUCT CONTENT: Protect endpoints from unauthorized applications and system changes with Trellix Application and Change Control. Create and easily manage allow/deny lists and protect against memory exploits with this cloud-managed application that still works when disconnected from the cloud. Gain deeper visibility into application changes with periodic inventory reports, helping identify gaps in protected endpoints. Not available for embedded systems like ATMs, POS, medical, or other fixed-function devices and servers.
LICENSE: Per Node.
DELIVERABLE: Software as a Service (SaaS) with activation email
MANAGEMENT: ePO-SaaS
PRODUCT CONTENT: Protect endpoints from unauthorized applications and system changes with Trellix Application and Change Control. Create and easily manage allow/deny lists and protect against memory exploits with this cloud-managed application that still works when disconnected from the cloud. Gain deeper visibility into application changes with periodic inventory reports, helping identify gaps in protected endpoints. Not available for embedded systems like ATMs, POS, medical, or other fixed-function devices and servers.