Skip to main content
VendorsTrellix

Trellix

Cybersecurity reports and statistics published by Trellix

8 categories4 reports

Recent Statistics & Reports

47% of CISOs report being completely confident that AI-powered security tools can effectively defend against autonomous, AI-driven cyberattacks.

12/13/2025
CISOAI DefenseAI-driven Cyberattacks

40% of CISOs plan to invest in OT/IT security convergence over the next 12 months as part of their hybrid infrastructure strategies.

12/13/2025
CISOBudgetOT/IT Convergence

97% of CISOs agree that hybrid infrastructure provides greater resilience and risk management capabilities than relying solely on cloud or on-premises environments.

12/13/2025
CISOHybrid InfrastructureRisk Management

88% of CISOs agree that the convergence of OT and IT security exposes new challenges that many organizations are not yet prepared to address.

12/13/2025
CISOOT/IT Convergence

94% of CISOs agree that emerging threats are forcing them to rethink and reprioritize their cybersecurity and infrastructure strategy.

12/13/2025
CISOEmerging ThreatsInfrastructure Strategy

96% of Chief Information Security Officers (CISOs) agree that the convergence of operational technology (OT) and information technology (IT) security is essential for protecting critical infrastructure from emerging threats.

12/13/2025
CISOOT/IT ConvergenceCritical Infrastructure

PowerShell was the primary attack vector with 96,061 detections by Trellix, followed by Cobalt Strike with 85,986 detections targeting the IT-to-OT boundary.

11/22/2025
Operational technologyPowerShell Cobalt Strike

Manufacturing represented 41.5% of all Trellix detections of threats targeting operational technology from April 1 to September 30, 2025.

11/22/2025
Operational technologyManufacturingOperational technology

The utilities, energy/oil and gas, and aerospace and defense industries combined accounted for 21.5% of all detections by Trellix between April 1 to September 30, 2025.

11/22/2025
Operational technologyUtilitiesEnergy

There were 333 ransomware attacks detected by Trellix specifically targeting critical infrastructure sectors from April 1 to September 30, 2025.

11/22/2025
Operational technologyRansomwareCritical infrastructure

The average time from vulnerability disclosure to patch deployment in operational technology environments exceeds 180 days, compared to 30 days for traditional IT systems.

11/22/2025
Operational technologyVulnerability disclosurePatch deployment

Transportation and shipping ranked second in detections by Trellix, accounting for 27.6% of all threats detected from April 1 to September 30, 2025.

11/22/2025
Operational technologyTransportationShipping

80% of CISOs report their organization's approach to threat intelligence monitoring requires significant improvement or complete overhaul.

6/10/2025
Threat intelligenceCISO

85% of CISOs say their organization's cybersecurity budget is influenced by the volume of nation-state threats.

6/10/2025
BudgetCISONation state

A majority (89%) of CISOs are frequently asked about nation-state threats by their CEO and/or the board.

6/10/2025
APTCISONation state

Over half (60%) of organizations have yet to fully integrate threat intelligence into their wider cybersecurity strategy.

6/10/2025
Threat intelligenceCISO

Nearly all CISOs (98%) face barriers when acting on threat intelligence.

6/10/2025
Threat intelligenceCISO

82% of CISOs report their organization's approach to threat intelligence collecting requires significant improvement or complete overhaul.

6/10/2025
Threat intelligenceCISO

28% of CISOs report limited automation makes it difficult to integrate tools into their threat intelligence programs.

6/10/2025
AutomationCISOSecurity tools

When asked about the top challenges when acting on threat intelligence, 45% of CISOs said keeping pace with evolving threats.

6/10/2025
Threat intelligenceCISO

Showing 1-20 of 47 results