{"id":46585,"date":"2025-01-10T03:30:00","date_gmt":"2025-01-10T03:30:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2025\/01\/10\/trend-micro-and-intel-innovate-to-weed-out-covert-threats\/"},"modified":"2025-01-10T03:30:00","modified_gmt":"2025-01-10T03:30:00","slug":"trend-micro-and-intel-innovate-to-weed-out-covert-threats","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2025\/01\/10\/trend-micro-and-intel-innovate-to-weed-out-covert-threats\/","title":{"rendered":"Trend Micro and Intel Innovate to Weed Out Covert Threats"},"content":{"rendered":"<p> \n<\/p>\n<div lang=\"en\">\n<p>        HONG KONG SAR &#8211;<br \/>\n<a href=\"https:\/\/www.media-outreach.com\/\" rel=\"sponsored\">Media OutReach Newswire<\/a> &#8211; 10 January 2025 &#8211; Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new collaboration with Intel<sup> \u00ae<\/sup><sup> <\/sup>(NASDAQ:INTC) designed to help joint enterprise customers protect critical systems from stealthy threats, including fileless malware and advanced ransomware.<\/p>\n<p>When Trend&#8217;s proactive security platform and Intel&#8217;s technology are used together, the integrated solution can better determine if encryption behavior is legitimate\u2014such as a user backing up files or malicious\u2014ensuring the appropriate action is taken to protect critical systems.\n<\/p>\n<p><b>Carla Rodriguez, Intel VP:<\/b> &#8220;Threat actors are increasingly targeting endpoints with sophisticated attacks that evade traditional software-based security. Trend Micro&#8217;s integration of Intel\u00ae Threat Detection Technology provides a hardware-accelerated detection layer to uncover stealthy threats. This technology, deployed across a billion PCs, is the only AI-based silicon security solution of its kind. Our mutual customers will benefit from enhanced protection with Trend Micro&#8217;s AI-powered Trend Vision One\u2122 \u2013 Endpoint solutions on Intel AI PCs.&#8221;\n<\/p>\n<p>Protecting critical assets across endpoints, email, networks, and cloud workloads is increasingly challenging as malicious actors favor covert threats such as fileless malware, which was<br \/>\n<a href=\"https:\/\/www.creative-n.com\/blog\/emerging-malware-threats-in-2024-what-businesses-need-to-know\/#:~:text=Fileless%20malware%20has%20been%20on,to%20these%20types%20of%20attacks.\" rel=\"sponsored\">reportedly present<\/a> in 40% of attacks in 2023. These can be used to deploy ransomware, steal sensitive data, and cause significant financial and reputational damage.\n<\/p>\n<p>Fileless attacks are particularly dangerous as they rely on in-memory execution, reside in the registry, or abuse legitimate tools like PowerShell and Windows Management Instrumentation.\n<\/p>\n<p>That&#8217;s why Trend and Intel are teaming up by combining the AI-powered Trend Vision One. This collaboration provides organizations with powerful tools to detect and respond to ransomware and fileless attacks before they can cause damage.\n<\/p>\n<p><b>Rachel Jin, chief enterprise platform officer at Trend Micro: <\/b>&#8220;Proactive security has long been desired but just recently feasible. Through our work with Intel, we&#8217;re redefining what&#8217;s possible in cybersecurity\u2014empowering enterprises to proactively safeguard their systems, data, and operations against an increasingly complex threat landscape.&#8221;\n<\/p>\n<p><b>How AMS works:<\/b><br \/>\n<\/p>\n<ul>\n<li>\n    Intel<sup>\u00ae<\/sup> TDT offloads advanced memory scanning (AMS) workloads from CPU to GPU\n  <\/li>\n<li>\n    This enables Trend endpoint security solutions to scan more deeply and more often to uncover fileless attacks before they can launch malicious payloads.\n  <\/li>\n<li>\n    Using fewer CPU resources enhances threat detection and response without affecting performance, slowing down PCs, or reducing battery life.\n  <\/li>\n<\/ul>\n<p>\nTrend Vision One\u2122 \u2013 Endpoint Security leverages AMS to improve memory scanning capacity by 7 to 10X[1]. This means that organizations can scan more and detect more threats.<\/p>\n<p><b>CPU-based threat detection:<\/b><br \/>\n<br \/>Advanced ransomware is increasingly capable of evading EDR detection thanks to<b> <\/b>packing and obfuscation techniques and VM cloaking. EDR solutions are too often playing catchup with behavior-based approaches, which take time to get up to speed.\n<\/p>\n<p>Intel<sup>\u00ae<\/sup> TDT augments Trend&#8217;s behavioral analysis, runtime machine learning, and expert rules by providing critical visibility into the hardware layer, increasing ransomware detection efficacy by<br \/>\n<a href=\"https:\/\/selabs.uk\/reports\/enterprise-advanced-security-ransomware-intel-threat-detection-technology-2023-02\/\" rel=\"sponsored\">24% over software alone<\/a>.\n<\/p>\n<p>It does this by:<br \/>\n<\/p>\n<ul>\n<li>\n    Using CPU telemetry and Intel<sup>\u00ae<\/sup> AI, offloading Intel AI and memory scanning from the CPU to the integrated GPU to provide a detection assist to Trend&#8217;s ransomware defenses which won&#8217;t disrupt the user experience.\n  <\/li>\n<li>\n    Integrating Intel TDT source code directly into the Trend Micro agent to deliver deeper insights from CPU telemetry. This enables instant discovery of zero-day attacks and new, fast-moving variants.\n  <\/li>\n<\/ul>\n<p>\n  <span style=\"font-size: 1rem\"># # #<\/span>\n<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/generic_link.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/www.trendmicro.com<\/a><br \/><a href=\"https:\/\/www.linkedin.com\/in\/trend-micro-hong-kong-96353768\/\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/iconmonstr-linkedin-1-24.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/www.linkedin.com\/in\/trend-micro-hong-kong-96353768\/<\/a><br \/><a href=\"https:\/\/twitter.com\/trendmicroamea\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/iconmonstr-twitter-1-24.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/twitter.com\/trendmicroamea<\/a><br \/><a href=\"https:\/\/www.facebook.com\/tmhk1989\/\" class=\"social-media-link\"><img loading=\"lazy\" style=\"margin-right: 7px;vertical-align: middle;display: inline-block !important;width: 24px\" src=\"https:\/\/release.media-outreach.com\/Release\/templates\/images\/socialMedia\/iconmonstr-facebook-1-24.png\" width=\"24\" height=\"24\" data-no-lazy=\"1\"\/>https:\/\/www.facebook.com\/tmhk1989\/<\/a>            <\/p>\n<p><b>Hashtag: <\/b>#trendmicro #trendvisionone #visionone #cybersecurity #intel #intelaipc #aipc<\/p>\n<p>\n            <em>The issuer is solely responsible for the content of this announcement.<\/em>\n        <\/p>\n<p>        <img loading=\"lazy\" src=\"http:\/\/track.media-outreach.com\/index.php\/WebView\/354804\/4121\" alt=\"\" width=\"1\" height=\"1\" style=\"width:1px;height:1px;\"\/>\n    <\/div>\n<p><script async src=\"http:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/>\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/hong-kong-sar\/2025\/01\/10\/354804\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG KONG SAR &#8211; Media OutReach Newswire &#8211; 10 January 2025 &#8211; Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new collaboration with Intel \u00ae (NASDAQ:INTC) designed to help joint enterprise customers protect critical systems from stealthy threats, including fileless malware and advanced ransomware. When Trend&#8217;s proactive security platform &hellip;<\/p>\n","protected":false},"author":1,"featured_media":46586,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/46585"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=46585"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/46585\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/46586"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=46585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=46585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=46585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}