About
Are your Mac endpoints protected? Endpoint Security involves safeguarding entry points on end-user devices, including desktops, laptops, and mobile devices, to prevent exploitation by malicious actors and campaigns. Trellix Endpoint Security (ENS) for Mac represents a robust security solution designed to safeguard Apple Macintosh endpoints, mitigating the risk of exposure to various threats. The security modules within Endpoint Security operate independently, collectively offering multiple layers of protection. Join us as our experts Harsh and Pravas deep dive into the security features for ENS for Mac and describe deployment options, system processes, and supported platforms to best protect your environment.
Presenters
1709826569-85357d4dc435fd79
Harsh Gautam
Customer Success Engineer
Harsh is a Customer Success Engineer at Trellix bringing and delivering extensive expertise on Endpoint Security Products for MAC, Linux and Windows to his role. Harsh is currently supporting all the endpoint Products for the Global Linux and MAC Team.
1709826795-904aa2faf6738bba
Pravas Kumar Dung Dung
Senior Customer Success Engineer
Pravas is a Senior Customer Success Engineer who brings a wealth of experience to the role. Pravas boasts a total of 8 years in the field, with the last 4 years dedicated to Trellix. His background includes support for point products on Windows, Linux and Mac. Currently, he provides support for endpoint products within the Global Linux & Mac Team. He has valuable insights from his previous engagements with competitor support, showcasing a deep understanding of product functionalities.
Register To Watch Recording
First Name*
Last Name*
Email Address*
Company*
Title*
Work Address*
Work Phone*
City*
State*
Postal Code*
Country*
By registering for this webinar, you agree to the processing of your personal data as described in our
(ISC)² member ID
We use BigMarker as our webinar platform. By clicking Register, you acknowledge that the information you provide will be transferred to BigMarker processing in accordance with their Terms of Service and Privacy Policy.