Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Identify and populate all local administrator accounts on endpoints across your IT network. Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission based system for smooth employee experience.
Discover and add applications that require elevated privileges to run automatically. Whitelist and blacklist applications using comprehensive application control policies. Enforce principle of least privilege and principle of zero-trust across the organization. Comply with industry regulations with complete audit trails and record all activities. Track application usage across the organization using comprehensive reports and gain insights that help you with creating policies for smoother experience.
Description
The rise of advanced persistent threats (APTs) targeting control points, servers, and fixed devices through remote attacks or social engineering complicates the security landscape for businesses. Trellix Application Control is designed to outmaneuver cybercriminals, ensuring that your organization remains secure while maintaining productivity. By allowing only trusted applications to operate on devices, servers, and desktops, it safeguards your infrastructure. With the increasing demand for flexibility in application usage in today's social and cloud-oriented business environments, Trellix Application Control offers organizations the ability to enhance their whitelisting strategies, thus improving threat prevention measures. For applications that are not yet recognized, it empowers IT teams with various options to facilitate new application installations, including user notifications and self-approvals. Additionally, it effectively blocks the execution of unauthorized applications, thereby thwarting zero-day and APT attacks. Organizations can utilize inventory searches and predefined reports to swiftly identify and resolve vulnerabilities, compliance issues, and security risks within their systems. This comprehensive approach not only fortifies security but also promotes a proactive stance in safeguarding valuable business assets.
API Access
Has API
API Access
Has API
Integrations
Cisco Duo
Google Authenticator
Microsoft Authenticator
Microsoft Entra ID
Okta
OneLogin
OpenText Core Behavioral Signals
Ping Identity
TYCHON
Trellix Security Platform
Integrations
Cisco Duo
Google Authenticator
Microsoft Authenticator
Microsoft Entra ID
Okta
OneLogin
OpenText Core Behavioral Signals
Ping Identity
TYCHON
Trellix Security Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Securden
Founded
2018
Country
United States
Website
www.securden.com/endpoint-privilege-manager/index.html
Vendor Details
Company Name
Trellix
Country
United States
Website
www.trellix.com/products/trellix-application-control/