Trellix has announced enhanced data security capabilities along with a strategic framework designed to help organizations confidently adopt generative AI while safeguarding sensitive data from exposure and loss. With AI adoption accelerating rapidly, the company is taking a proactive approach to address emerging risks tied to both sanctioned and shadow AI usage.
Notably, enterprises are increasingly integrating AI into their operations, but this shift is also introducing new challenges. For instance, 88% of businesses implemented AI in at least one function in 2025, significantly outpacing traditional security controls. As a result, shadow AI usage has surged, creating hidden vulnerabilities across organizations. Moreover, the financial impact is becoming more evident, as the average cost of data breaches has risen by $670,000. At the same time, even approved AI tools can pose risks when organizations lack clear policies around data access and sharing.
“The rapid adoption of AI tools across the enterprise is creating new and often invisible data risks,” said Alex Au Yeung, Chief Product Officer, Trellix. “Trellix brings together policy, visibility, and enforcement in a unified framework to help customers control how data is used across both sanctioned and shadow AI.”
In response to these growing concerns, Trellix is introducing a comprehensive solution that combines enhancements across Data Loss Prevention (DLP), Data Encryption, and Database Security. Furthermore, the company has developed a three-part framework that enables organizations to implement AI workflows securely while maintaining strict data protection controls. This framework not only establishes clear usage policies but also reinforces them through governance and training, ensuring consistent compliance.
At the same time, industry experts emphasize the importance of adapting to evolving regulatory requirements.
“The regulatory landscape around data security continues to evolve, making compliance a moving target,” said Kristin Lowery, Field CISO, Optiv. “As organizations increasingly leverage AI in the workplace, having the right controls and visibility is essential to ensure compliant data-handling practices and prevent potential data leaks. This combination of associate training, data-handling processes, and controls is critical for responsibly integrating new AI tools.”
In addition, Trellix has introduced several key capabilities to strengthen its offering. Its DLP solution now features an AI Data Risk Dashboard, which provides real-time visibility into both approved and unauthorized AI usage while helping prevent sensitive data leaks. Meanwhile, its Database Security solution includes an Analytics Hub that monitors vulnerabilities, detects unauthorized access, and prioritizes risks without requiring system downtime.
Additionally, Trellix Data Encryption ensures that only authorized users can access sensitive information, effectively preventing AI tools from interacting with protected data. Beyond technology, Trellix also offers Professional Services to help organizations build a holistic approach to managing AI-related risks. These services include policy development, technical implementation, and employee training programs designed to foster an AI-aware culture.
Consequently, organizations can better define acceptable AI usage, optimize security configurations, and continuously monitor for potential threats. This integrated approach not only reduces the risk of data leakage but also enables businesses to maintain compliance with evolving regulations.
Overall, Trellix is positioning its enhanced data security framework as a critical enabler for organizations looking to harness AI responsibly. By combining advanced security capabilities with governance and training, the company aims to help enterprises unlock AI-driven productivity while maintaining full control over sensitive data and minimizing emerging risks.
Recommended Cyber Technology News :
- Resecurity Integrates with Splunk to Enhance Threat Intelligence and SIEM Operations
- EclecticIQ 3.7 Enhances Cyber Threat Intelligence
- Cloudsmith Adds Threat Intelligence to Software Artifacts
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading





