Trellix Application and Change Control

Ensure that only trusted applications run on devices, servers, and desktops.

Reduce risk from unauthorized applications

Advanced persistent threats (APTs) to control points, servers, and fixed devices make it increasingly difficult to protect your business. Trellix Application Control keeps your business secure without impacting productivity. Change Control allows you to write-protect and read-protect critical files from unauthorized tampering.

Request a Demo

Why Trellix Application and Change Control?

Reduce risk from unauthorized apps

Prevent zero-day and APT attacks and stay productive with intelligent app control

Implement the right security posture

As users demand more flexibility, maximize your allowlisting strategy for threat prevention

Help users become part of the solution

Enable users to install new applications with user notifications and user self-approvals

Product features

Complete and Fast Response

Leverages Trellix Global Threat Intelligence, an exclusive technology using millions of sensors worldwide to track the reputation of files, messages, and senders in real time.

Powerful, Built-In Suggestions

Use inventory search and pre-defined reports to quickly find and fix vulnerabilities, compliance, and security issues. Discover policies for dynamic desktop environments.

Advanced Execution Control

Trellix Application Control lets you combine rules based on file name, process name, parent process name, command line parameters, and username for enhanced protection.

Related products

Trellix Endpoint Security

Protect against modern and novel threats with multi-layered protection stack delivered in a single agent.

Trellix ePolicy Orchestrator

The single, centralized, and extensible platform for endpoint security policy management that lets you automate daily tasks.

Trellix Endpoint Detection and Response

Comprehensive EDR solution that reduces time to detection and time to remediation without the alert fatigue.

Take the next step toward living security for your endpoints