One thing that stood out is that I appreciate the fact that Trellix Endpoint Security Platform has centralized management and many reporting features, and it is easy to use. I had training with the vendor just once, and I was able to navigate through everything and carry out health checks on my own, which is very valuable. The dashboard tells you which agents are not compliant and allows you to ping an agent to know when last it communicated. It has the feature that tells you down to the MAC address of the system, which is very useful. I am able to know the current IP address and in some environments, I can know the last time the user communicated with the network and the last IP the person used. I could even drill down to know the department of the user instead of struggling to find it, which is very helpful. The MAC address always tells me the MAC address and the current computer name.
Trellix Endpoint Security Platform makes my work seamless and is a quality platform. Trellix Endpoint Security Platform can do many things that a lot of people do not know about. It can actually do the work of BitLocker and lock your drive. When your system is stolen, the person that steals your system or whoever takes it will not be able to access the drive. It locks, so you need to type in your username with a password before you can access the drive. Without that, the laptop is useless. For port blocking, many people do not know that Trellix Endpoint Security Platform has a feature where you can block your ports and block USB. For management staff, you do not want to block the USB ports or block the Bluetooth from them. There is a template where you can filter the management staff and exempt them from that role.
There was a time a colleague's laptop got stolen, and the good thing was the agent was communicating. We pushed the last subject that was communicating so the people that stole the laptop were not able to access anything. They were later caught, but due to the camera, the laptop was useless for them. The beauty is that all the company's important documents and users' data were kept safe. There was no trespass from anyone because they were not able to access the drive. The only way someone could have accessed it would be to format, but that would mean losing lots of data.
There was a time we were trying to get ISO certification and we were looking for examples to share with the ISO team. We actually used Trellix Endpoint Security Platform to display everything. The compliance section shows you how many systems helped with the compliance of the laptop and how regular the detection has been. It shows all that on the dashboard, which was very impressive. When the ISO examiner saw it, they were impressed by the compliance demonstration. That was one of the reasons that led to our certification. Any time we do the purging to drill down and take out old systems that have not communicated and bring in new ones, it is seamless. I just pull the template, install the agent, and I am good to go. Within a few minutes, I can see it on the dashboard. It captures everything on the system, including the person's name, the username, who logged in, and who logged on to the system next. It saves time because I do not need to search manually or open an Excel sheet for that. We save time doing the inventory in Excel. Whenever we need new inventory, I just export from the Trellix Endpoint Security Platform dashboard straight to my laptop, which is much better than manually inputting.