{"id":34774,"date":"2025-03-19T15:01:26","date_gmt":"2025-03-19T15:01:26","guid":{"rendered":"https:\/\/ramsdata.com.pl\/?page_id=34774"},"modified":"2025-03-20T04:44:18","modified_gmt":"2025-03-20T04:44:18","slug":"network-security","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/en\/trellix\/network-security\/","title":{"rendered":"Network Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"34774\" class=\"elementor elementor-34774\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ca18326 e-flex e-con-boxed e-con e-parent\" data-id=\"6ca18326\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5b0e4a1e e-con-full e-flex e-con e-child\" data-id=\"5b0e4a1e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a7f4166 elementor-widget elementor-widget-heading\" data-id=\"4a7f4166\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Detection and Response\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78862b56 elementor-widget elementor-widget-text-editor\" data-id=\"78862b56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEliminate network security blind spots with Trellix NDR\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d92cfe elementor-widget elementor-widget-button\" data-id=\"5d92cfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ramsdata.com.pl\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3060eed6 e-con-full e-flex e-con e-child\" data-id=\"3060eed6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53f75470 e-flex e-con-boxed e-con e-parent\" data-id=\"53f75470\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3ecd802a e-con-full e-flex e-con e-child\" data-id=\"3ecd802a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78692b94 elementor-widget elementor-widget-image\" data-id=\"78692b94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"446\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/ndr-tour-loop.gif\" class=\"attachment-large size-large wp-image-35063\" alt=\"ndr-tour-loop\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ff6f749 e-con-full e-flex e-con e-child\" data-id=\"4ff6f749\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f81a363 elementor-widget elementor-widget-heading\" data-id=\"1f81a363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Disrupt attackers at every stage\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d46193e elementor-widget elementor-widget-text-editor\" data-id=\"6d46193e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTrellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&#038;CK framework \u2013 spanning data centers, hybrid cloud environments, branch offices, and corporate campuses.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64d90e7f e-flex e-con-boxed e-con e-parent\" data-id=\"64d90e7f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3bb64c6e e-con-full e-flex e-con e-child\" data-id=\"3bb64c6e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-738b6c1d e-con-full e-flex e-con e-child\" data-id=\"738b6c1d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-14d82c01 e-con-full e-flex e-con e-child\" data-id=\"14d82c01\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50f01e09 elementor-widget elementor-widget-heading\" data-id=\"50f01e09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trellix Network Security products\n\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23dbc9dc e-flex e-con-boxed e-con e-child\" data-id=\"23dbc9dc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-22acf513 e-con-full e-flex e-con e-child\" data-id=\"22acf513\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71af23c ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"71af23c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Network Security<\/h3><p class=\"elementor-image-box-description\">Detect and block advanced threats and lateral movement in real time. Resolve incidents faster using concrete evidence and actionable intelligence.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b25860d e-con-full e-flex e-con e-child\" data-id=\"2b25860d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12e77ef3 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"12e77ef3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Network Forensics<\/h3><p class=\"elementor-image-box-description\">Identify and resolve a broad range of security incidents faster. Determine the scope and impact of threats and secure your network. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-611fc50c e-con-full e-flex e-con e-child\" data-id=\"611fc50c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a9df3d3 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"3a9df3d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Trellix Intrusion Prevention System<\/h3><p class=\"elementor-image-box-description\">Inspect all network traffic to prevent new and unknown attacks and streamline security operations with real-time event correlation across all sources.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d42b74c e-flex e-con-boxed e-con e-parent\" data-id=\"2d42b74c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1af0307a e-con-full e-flex e-con e-child\" data-id=\"1af0307a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f0bf4e9 elementor-widget elementor-widget-heading\" data-id=\"4f0bf4e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Trellix Network Detection and Response\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dcc20ed elementor-widget elementor-widget-text-editor\" data-id=\"1dcc20ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTrellix NDR is a key component of the Security Controls layer, specifically under the Network category. It enhances the platform&#8217;s ability to detect and respond to threats across complex networks. By integrating with the Engine layer&#8217;s capabilities like multi-vector correlation and threat hunting, NDR strengthens overall network visibility and security posture within the Trellix ecosystem.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14763867 elementor-widget elementor-widget-image\" data-id=\"14763867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2266\" height=\"1136\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/trellix-security-platform-horiz.svg\" class=\"attachment-full size-full wp-image-34812\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f97fd70 e-flex e-con-boxed e-con e-parent\" data-id=\"2f97fd70\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d8fa9e7 e-con-full e-flex e-con e-child\" data-id=\"5d8fa9e7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-698daf85 e-con-full e-flex e-con e-child\" data-id=\"698daf85\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59b83e13 elementor-widget elementor-widget-heading\" data-id=\"59b83e13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why Network Detection and Response?\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e6027a7 e-flex e-con-boxed e-con e-child\" data-id=\"2e6027a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-175064e4 e-con-full e-flex e-con e-child\" data-id=\"175064e4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e2359a1 elementor-position-top ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"5e2359a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"31\" height=\"21\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/T0099-grad.svg\" class=\"attachment-full size-full wp-image-35057\" alt=\"T0099-grad\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Eliminate Blind Spots<\/h3><p class=\"elementor-image-box-description\">Extend security visibility across complex networks.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32970380 e-con-full e-flex e-con e-child\" data-id=\"32970380\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76fd3b20 elementor-position-top ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"76fd3b20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"29\" height=\"21\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/T0098-grad.svg\" class=\"attachment-full size-full wp-image-35051\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Disrupt Attackers<\/h3><p class=\"elementor-image-box-description\">Multi-layered detection aligned to the MITRE ATT&amp;CK framework.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1aaf2ce3 e-con-full e-flex e-con e-child\" data-id=\"1aaf2ce3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3233d73c elementor-position-top ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"3233d73c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"21\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/T0163-grad.svg\" class=\"attachment-full size-full wp-image-35045\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Accelerate Response<\/h3><p class=\"elementor-image-box-description\">Automated alert enrichment and SOC-focused workflows.\n\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12e94464 e-flex e-con-boxed e-con e-parent\" data-id=\"12e94464\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aa1c0c e-con-full e-flex e-con e-child\" data-id=\"aa1c0c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42c6a986 elementor-widget elementor-widget-image\" data-id=\"42c6a986\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"612\" height=\"792\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280-2.jpeg\" class=\"attachment-full size-full wp-image-35039\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280-2.jpeg 612w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/cq5dam.web_.1280.1280-2-232x300.jpeg 232w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-299a4344 e-con-full e-flex e-con e-child\" data-id=\"299a4344\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cb7cb9b ha-has-bg-overlay elementor-widget elementor-widget-text-editor\" data-id=\"4cb7cb9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSolution Brief\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a829442 elementor-widget elementor-widget-heading\" data-id=\"7a829442\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Network Detection and Response\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5536520f elementor-widget elementor-widget-text-editor\" data-id=\"5536520f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tGain extended network visibility, multi-layered threat detection, automated alert enrichment, and SOC-focused workflows to eliminate security blind spots and disrupt attackers at every stage of the cyber kill chain, while accelerating investigation and response.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-159f99b elementor-widget elementor-widget-button\" data-id=\"159f99b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ramsdata.com.pl\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View Solution Brief<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-340a3ff3 e-flex e-con-boxed e-con e-parent\" data-id=\"340a3ff3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-68c6c53 e-con-full e-flex e-con e-child\" data-id=\"68c6c53\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-6864d0ed e-flex e-con-boxed e-con e-child\" data-id=\"6864d0ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-178c8ea e-con-full e-flex e-con e-child\" data-id=\"178c8ea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e8ffba9 elementor-widget elementor-widget-heading\" data-id=\"5e8ffba9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Industry recognition\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66e4459f elementor-widget elementor-widget-text-editor\" data-id=\"66e4459f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTrellix is recognized as an industry leader by key analyst firms\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4165f30a e-flex e-con-boxed e-con e-child\" data-id=\"4165f30a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-36f4cbd3 e-con-full e-flex e-con e-child\" data-id=\"36f4cbd3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5590814a elementor-widget elementor-widget-image\" data-id=\"5590814a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"23\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/Gartner_logo.svg\" class=\"attachment-full size-full wp-image-35033\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fe48178 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"5fe48178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Representative vendor in the 2024 Gartner Market Guide for Network Detection and Response (NDR)<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-428c76b9 e-con-full e-flex e-con e-child\" data-id=\"428c76b9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73c73dc6 elementor-widget elementor-widget-image\" data-id=\"73c73dc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"131\" height=\"40\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/idc-logo.svg\" class=\"attachment-full size-full wp-image-34876\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c458774 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"5c458774\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">5th largest network security vendor in the IDC Worldwide Trusted Access and Network Security Market Share, 2023<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31c5c728 e-con-full e-flex e-con e-child\" data-id=\"31c5c728\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a5e2035 elementor-widget elementor-widget-image\" data-id=\"5a5e2035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"156\" height=\"24\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/forrester-logo.svg\" class=\"attachment-full size-full wp-image-34870\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16cfa362 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"16cfa362\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Large Vendor in the Forrester Now Tech: Network Analysis And Visibility Q1-2023<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4a929f e-con-full e-flex e-con e-child\" data-id=\"c4a929f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1206a0 elementor-widget elementor-widget-image\" data-id=\"e1206a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"146\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/kc-whitered.png\" class=\"attachment-full size-full wp-image-35027\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/kc-whitered.png 530w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2025\/03\/kc-whitered-300x83.png 300w\" sizes=\"(max-width: 530px) 100vw, 530px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60a25e8 ha-has-bg-overlay elementor-widget elementor-widget-image-box\" data-id=\"60a25e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Leader in the KuppingerCole Leadership Compass Network Threat Detection and Response, 2021 <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Network Detection and Response Eliminate network security blind spots with Trellix NDR Request a demo Disrupt attackers at every stage Trellix NDR delivers extended visibility, multi-layered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&#038;CK framework \u2013 spanning data centers, hybrid cloud environments, branch offices, and corporate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":34733,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-34774","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/comments?post=34774"}],"version-history":[{"count":16,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34774\/revisions"}],"predecessor-version":[{"id":35083,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34774\/revisions\/35083"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/pages\/34733"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/en\/wp-json\/wp\/v2\/media?parent=34774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}