Trellix to prevent data exposure in sanctioned and shadow AI

Trellix to prevent data exposure in sanctioned and shadow AI

Trellix has announced enhanced data security capabilities and a strategic framework designed to help organizations confidently adopt generative AI while protecting sensitive data from exposure and loss.

“The rapid adoption of AI tools across the enterprise is creating new and often invisible data risks,” said Alex Au Yeung, Chief Product Officer, Trellix. “Trellix brings together policy, visibility, and enforcement in a unified framework to help customers control how data is used across both sanctioned and shadow AI.”

In 2025, 88% of businesses implemented AI in at least one function, outpacing traditional security controls and accelerating the rise of shadow AI. This shift is already increasing the cost of data breaches, which have risen by an average of $670,000. At the same time, even approved AI tools introduce risk when organizations lack clear policies governing the access and sharing of sensitive data.

“The regulatory landscape around data security continues to evolve, making compliance a moving target,” said Kristin Lowery, Field CISO, Optiv. “As organizations increasingly leverage AI in the workplace, having the right controls and visibility is essential to ensure compliant data-handling practices and prevent potential data leaks. This combination of associate training, data-handling processes, and controls is critical for responsibly integrating new AI tools.”

Trellix’s solution combines enhancements across Data Loss Prevention, Data Encryption, and Database Security, with a three-part framework enabling organizations to securely implement modern AI workflows with the necessary guardrails to protect their data. This approach establishes clear usage policies, reinforces them through training and governance, and delivers real-time visibility and control over how AI tools interact with sensitive data.

Key capabilities and recent enhancements include:

  • Trellix DLP with AI Data Risk Dashboard: Monitors and prevents sensitive data loss to AI tools, delivers real-time visibility into sanctioned and unsanctioned AI usage, identifies high-risk activity across endpoints and networks, and enables centralized incident response.
  • Trellix Database Security with Analytics Hub: Protects against unauthorized access and potential database compromise, with patching support requiring no downtime. Monitors activity and vulnerabilities to score database risk, helping teams quickly identify and address high-risk databases to prevent data loss.
  • Trellix Data Encryption: Restricts access to sensitive data across devices, files, and removable media, preventing AI tools from reading protected data while ensuring only authorized users can access it.
  • Trellix Professional Services: Supports organizations in building and operationalizing a holistic program to mitigate AI-related data loss risk across policy, technology, and governance.
    • Policy Assessments and Development: Defines and refines acceptable use policies for AI applications and agents, reducing the risks associated with Shadow AI and ensuring alignment with regulatory and business requirements.
    • Technical Implementation and Tuning: Optimizes DLP and Database Security configurations to detect and prevent AI-driven data leakage, with continuous tuning to maintain effectiveness.
    • Training and Enablement: Builds an AI-aware culture through targeted training, user guidance, and real-time alerts to help prevent policy violations before they occur.

Together, Trellix’s data security innovations, Professional Services, and integrated framework enable organizations to harness AI as a productivity driver while maintaining control over sensitive data and minimizing risk.

As AI adoption reshapes the threat and enterprise landscapes, Trellix is focused on responsibly integrating AI as a strategic enabler. Trellix helps customers securely adopt AI while protecting critical assets, and prioritizes Trellix Wise innovations across its product portfolio for proactive defense against advanced threats.

 

Cybersecurity takes center stage in modern surveillance

Cybersecurity takes center stage in modern surveillance

Steven Kenny, Manager, Architect & Engineering (A&E) Program – EMEA at…
The Gulf’s AI ambition demands AI‑era security

The Gulf’s AI ambition demands AI‑era security

Diego Arrabal, Vice President, Eastern Europe, Middle East and Africa, Check…
Cyber fallout from the Iran war

Cyber fallout from the Iran war

Tomáš Foltyn, security writer at ESET, highlights that the cybersecurity implications of…
Google Announces Completion of Its $32 Billion Acquisition of Wiz

Google Announces Completion of Its $32 Billion Acquisition of Wiz

Google announced the completion of its $32 billion acquisition of Wiz, a leading…
Apply for Madinah Tech Cultivator till March 22

Apply for Madinah Tech Cultivator till March 22

Applications for the second cohort of the Madinah Tech Cultivator will close…
Armadin Secures Record Funding to Fight AI‑Driven Hyperattacks

Armadin Secures Record Funding to Fight AI‑Driven Hyperattacks

Armadin has raised an industry record $189.9 million in Seed and…