About
How do the most effective threat hunters operate? They start with the highest quality intelligence and don't stop until they've tracked a threat from detection to eradication.

As adversaries leverage AI, defenders must respond with AI-driven threat-hunting tools and techniques. Trellix provides AI-powered threat intelligence, detection, and response at the heart of our platform that today's security teams need to combat threats with speed and precision.

In this webinar you'll learn:


  • How Trellix leverages GenAI to power industry-leading operational threat intelligence

  • Ways to bridge the gap between threat intelligence and threat hunting operations in XDR

  • How Helix Connect helps analysts visualize the complete context of a threat

Presenters
1730482486-caee6362924d7af0
John Fokker
Head of Threat Intelligence, Advanced Research Center - Trellix
1732126080-45e7392babdc6cf7
Brent King
Senior Solutions Engineer - Trellix
Register To Watch Recording
First Name*
Last Name*
Email Address*
Job Title*
Company*
Country*
We use BigMarker as our webinar platform. By clicking Register, you acknowledge that the information you provide will be transferred to BigMarker processing in accordance with their Terms of Service and Privacy Policy.