{"id":527470,"date":"2024-10-01T12:12:11","date_gmt":"2024-10-01T16:12:11","guid":{"rendered":"https:\/\/www.commvault.com\/supported-technologies\/trellix"},"modified":"2024-10-08T07:26:32","modified_gmt":"2024-10-08T11:26:32","slug":"trellix","status":"publish","type":"cmv_supported-tech","link":"https:\/\/www.commvault.com\/supported-technologies\/trellix","title":{"rendered":"Trellix"},"content":{"rendered":"<div class=\"style-side-image wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__breadcrumbs\">\n\t\t\t\t<ul class=\"new-breadcrumbs\"><li><a href=\"https:\/\/www.commvault.com\">Home<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li>Trellix<\/li><\/ul>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tTrellix&nbsp;\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tUncover threats early, respond quickly, and gain insights needed to drive a more adaptive, smarter security strategy.&nbsp;\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Request a demo\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRequest a demo\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t<div class=\"wp-block-commvault-v2-hero__side-image\">\n\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"650\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_5BuildingBlocks_650x650.jpg?quality=80\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_5BuildingBlocks_650x650.jpg 650w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Hero_5BuildingBlocks_650x650.jpg?resize=300,300 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n<div class=\"alignfull sticky wp-block-commvault-v2-page-navigation\">\n\t<div class=\"custom-container\">\n\t\t<div class=\"nav-wrapper\">\n\t\t\t<div class=\"left-nav\">\n\t\t\t\t<div class=\"tab-menu\">\n\t\t\t\t\t<span>Trellix<\/span>\n\t\t\t\t\t<button class=\"toggle\">\n\t\t\t\t\t\t<svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<path d=\"M11 1.5L6 6.5L1 1.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/>\n\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t\t<ul class=\"wp-block-commvault-v2-page-navigation__ul\" aria-label=\"Page navigation\" =\"true\" role=\"navigation\">\n\t\t\t\t\t\t\t\t\t\t<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Benefits\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Benefits<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Features\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Features<\/span>\n\t<\/a>\n<\/li>\n\n\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"right-nav\">\n\t\t\t\t<a href=\"\/request-demo\" class=\"nav-cta\" target=\"_blank\">\n\t\t\t\t\t<span>Request a demo<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"stats wp-block-commvault-v3-stats-v3\" id=\"Benefits\">\n\t\t\t<div class=\"grid-container no-gap\">\n\t\t\t<div class=\"innerblocks-wrapper col-12 reduced-container\">\n\t\t\t\t\n<div class=\"aligncenter wp-block-commvault-v3-section-header-v3\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n      <h5 class=\"eyebrow text-eyebrow-s\">\n      A CONNECTED APPROACH&nbsp;    <\/h5>\n        <h2 class=\"section__title text-heading-l text-sm-heading-xl text-md-heading-xxl text-lg-heading-xxxl\">\n      A connected approach to data security&nbsp;    <\/h2>\n  \n      <p class=\"section__description text-body-s text-md-body-m text-lg-body-l\">\n      With Commvault integration into Trellix (former McAfee family), joint solutions unlock a broad set of security capabilities to enhance cyber readiness.&nbsp;    <\/p>\n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n\n<div class=\"wp-block-commvault-v3-stats-items\">\n\t<div class=\"stats__container__feature\">\n\t\t<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\tLEADER\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tLeader in GigaOm Radar for Extended Detection and Response (XDR) 2024&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-statistic wp-block-commvault-v2-stats-item\">\n\t\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"statisticTitle text-heading-xl text-lg-display-xl text-with-gradient font-light\">\n\t\t\t\t\tZERO\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tZero-day malware detection capabilities&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\t<\/div>\n<\/div>\n<div class=\"wp-block-commvault-v3-graph\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 graph__container\">\n\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"section__title text-heading-s text-md-heading-m mt-0 mb-6\">\n\t\t\t\t\t\tFusce eget odio.\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t<div class=\"graph__list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 10%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tA\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t10%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 25%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tB\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t25%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 30%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tC\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t30%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 50%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tD\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t50%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<span class=\"votes text-body-s mt-4 mt-md-12\">2000 Votes<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n<div style=\"background-color: ;\" class=\"alignfull wp-block-commvault-v2-double-side-image\" id=\"Features\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-8 offset-lg-2 text-center heading__double__side__image\">\n\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\t\tBETTER TOGETHER&nbsp;\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t<h2 class=\"text-heading-l text-md-heading-xl text-lg-heading-xxl section_title\">\n\t\t\t\t\t\t\tCommvault&reg; Cloud integration with Trellix&nbsp;\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<p class=\"description text-body-m text-lg-body-l\">\n\t\t\t\t\t\tCombine Commvault&rsquo;s patented cyber deception technology with advanced sandboxing, threat analysis, and orchestration capabilities for enhanced security, faster response, and accelerated recovery.&nbsp;&nbsp;&nbsp;\t\t\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tAdvanced Threat Defense (ATD)&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tAutomatically submit suspicious files to a sandbox for forensic analysis, providing valuable insights and understanding to improve defenses and reduce risk.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Workloads_Cloud_Benefit_Accelerate-Recovery-Rebuild_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Workloads_Cloud_Benefit_Accelerate-Recovery-Rebuild_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Workloads_Cloud_Benefit_Accelerate-Recovery-Rebuild_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Workloads_Cloud_Benefit_Accelerate-Recovery-Rebuild_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tData Exchange Layer (DXL)&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tGain actionable threat intelligence and provide the ability to accelerate coordinated response to uncovered attacks, enabling a faster recovery and return to operations.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Automation-Orchestration_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Automation-Orchestration_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Automation-Orchestration_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Automation-Orchestration_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tAccelerated clean recovery&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tRespond early, proactively identifying malware threats and automatically quarantining infected files to avoid reinfection during recovery.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Cyber-Recovery-Replication_1088x870.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Cyber-Recovery-Replication_1088x870.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Cyber-Recovery-Replication_1088x870.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/SupportedTech-VMWare_Cyber-Recovery-Replication_1088x870.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"alignfull wp-block-commvault-v2-newsletter-block\">\n\t\t<div class=\"newsletter-container container\">\n\t\t\t\t\t\t\t<div class=\"newsletter-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"421\" height=\"525\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/FooterPromoImagesTech-Guy-2.png\" class=\"cmv-component-card__image\" alt=\"\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"newsletter__text-wrapper\">\n\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-eyebrow-m text-md-eyebrow-default\"><br>Request a demo<\/p>\n\t\t\t\t\t\t\t\t<div class=\"newsletter__text-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"newsletter-block__title text-heading-l text-lg-heading-xxl mb-0\">Experience Commvault&reg; Cyber Resilience Today&nbsp;<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-body-m text-lg-body-l\">Sign up for a personalized demo and experience the data security, readiness, and recoverability features for yourself.&nbsp;<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/request-demo\"\n\t\t\taria-label=\"Request a demo\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRequest a demo\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":154,"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_cmv_custom_url":""},"cmv_integrations":[],"cmv_providers":[],"class_list":{"0":"post-527470","1":"cmv_supported-tech","2":"type-cmv_supported-tech","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Trellix Integrations | Commvault<\/title>\n<meta name=\"description\" content=\"Our collaboration with Trellix allows organizations to analyze malware in an isolated environment to gain a better understanding of zero-day threat patterns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/supported-technologies\/trellix\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trellix\" \/>\n<meta property=\"og:description\" content=\"Our collaboration with Trellix allows organizations to analyze malware in an isolated environment to gain a better understanding of zero-day threat patterns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/supported-technologies\/trellix\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T11:26:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Trellix Integrations | Commvault","description":"Our collaboration with Trellix allows organizations to analyze malware in an isolated environment to gain a better understanding of zero-day threat patterns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/supported-technologies\/trellix","og_locale":"en_US","og_type":"article","og_title":"Trellix","og_description":"Our collaboration with Trellix allows organizations to analyze malware in an isolated environment to gain a better understanding of zero-day threat patterns.","og_url":"https:\/\/www.commvault.com\/supported-technologies\/trellix","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-10-08T11:26:32+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/supported-technologies\/trellix","url":"https:\/\/www.commvault.com\/supported-technologies\/trellix","name":"Trellix Integrations | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"datePublished":"2024-10-01T16:12:11+00:00","dateModified":"2024-10-08T11:26:32+00:00","description":"Our collaboration with Trellix allows organizations to analyze malware in an isolated environment to gain a better understanding of zero-day threat patterns.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/supported-technologies\/trellix#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/supported-technologies\/trellix"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/supported-technologies\/trellix#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Trellix"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_supported-tech\/527470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_supported-tech"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/cmv_supported-tech"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/154"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=527470"}],"wp:term":[{"taxonomy":"cmv_integrations","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_integrations?post=527470"},{"taxonomy":"cmv_providers","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_providers?post=527470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}