Modern Australian
The Times Real Estate

.

Trend Micro and Intel Innovate to Weed Out Covert Threats

Harnessing the power of software and hardware security to drive stronger ransomware detection for businesses

HONG KONG SAR - Media OutReach Newswire - 10 January 2025 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new collaboration with Intel ® (NASDAQ:INTC) designed to help joint enterprise customers protect critical systems from stealthy threats, including fileless malware and advanced ransomware.

When Trend's proactive security platform and Intel's technology are used together, the integrated solution can better determine if encryption behavior is legitimate—such as a user backing up files or malicious—ensuring the appropriate action is taken to protect critical systems.

Carla Rodriguez, Intel VP: "Threat actors are increasingly targeting endpoints with sophisticated attacks that evade traditional software-based security. Trend Micro's integration of Intel® Threat Detection Technology provides a hardware-accelerated detection layer to uncover stealthy threats. This technology, deployed across a billion PCs, is the only AI-based silicon security solution of its kind. Our mutual customers will benefit from enhanced protection with Trend Micro's AI-powered Trend Vision One™ – Endpoint solutions on Intel AI PCs."

Protecting critical assets across endpoints, email, networks, and cloud workloads is increasingly challenging as malicious actors favor covert threats such as fileless malware, which was reportedly present in 40% of attacks in 2023. These can be used to deploy ransomware, steal sensitive data, and cause significant financial and reputational damage.

Fileless attacks are particularly dangerous as they rely on in-memory execution, reside in the registry, or abuse legitimate tools like PowerShell and Windows Management Instrumentation.

That's why Trend and Intel are teaming up by combining the AI-powered Trend Vision One. This collaboration provides organizations with powerful tools to detect and respond to ransomware and fileless attacks before they can cause damage.

Rachel Jin, chief enterprise platform officer at Trend Micro: "Proactive security has long been desired but just recently feasible. Through our work with Intel, we're redefining what's possible in cybersecurity—empowering enterprises to proactively safeguard their systems, data, and operations against an increasingly complex threat landscape."

How AMS works:

  • Intel® TDT offloads advanced memory scanning (AMS) workloads from CPU to GPU
  • This enables Trend endpoint security solutions to scan more deeply and more often to uncover fileless attacks before they can launch malicious payloads.
  • Using fewer CPU resources enhances threat detection and response without affecting performance, slowing down PCs, or reducing battery life.

Trend Vision One™ – Endpoint Security leverages AMS to improve memory scanning capacity by 7 to 10X[1]. This means that organizations can scan more and detect more threats.

CPU-based threat detection:
Advanced ransomware is increasingly capable of evading EDR detection thanks to packing and obfuscation techniques and VM cloaking. EDR solutions are too often playing catchup with behavior-based approaches, which take time to get up to speed.

Intel® TDT augments Trend's behavioral analysis, runtime machine learning, and expert rules by providing critical visibility into the hardware layer, increasing ransomware detection efficacy by 24% over software alone.

It does this by:
  • Using CPU telemetry and Intel® AI, offloading Intel AI and memory scanning from the CPU to the integrated GPU to provide a detection assist to Trend's ransomware defenses which won't disrupt the user experience.
  • Integrating Intel TDT source code directly into the Trend Micro agent to deliver deeper insights from CPU telemetry. This enables instant discovery of zero-day attacks and new, fast-moving variants.
# # #


[1] Trend Micro, Fileless Attacks Prompt Intel's Next-Gen Security, https://www.trendmicro.com/en_us/research/24/d/fileless-malware-attack-solution.html.
Hashtag: #trendmicro #trendvisionone #visionone #cybersecurity #intel #intelaipc #aipc





The issuer is solely responsible for the content of this announcement.

Trend Micro

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's AI-powered cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend's platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to simplify and secure their connected world.

Dating after separation - the do's and don't's

After a romantic split you move forward with plans for fresh dating relationships. The present moment brings excited feelings since you look toward ...

What to Look for in a Reliable Junk Removal Service

Choosing the right junk removal service can feel overwhelming, especially with so many options available. Every year, households and businesses genera...

The Benefits of Choosing Wholesale Packaging Supplies for Your Business

Quality packaging not only protects the product but also plays a key role in your branding, customer satisfaction, and cost management. One of the b...

Freight Shipping a Motorcycle: Avoid These Common Mistakes

Image by Ultimatetransport123 Shipping a motorcycle can be a relatively simple and smooth process. However, even the smallest error can result in d...

Large Bore Steel Pipes: Applications and Advantages in Industrial Projects

As the name implies, large bore steel pipes are massive, powerful tubes. By massive, we’re referring to their large diameters which typically star...

The Business Case for Installing EV Chargers at Service Stations: ROI and Future Trends

As Australia transitions to a net-zero future, the electric vehicle (EV) market is rapidly gathering momentum. With EV ownership in the country fo...

Wealth Without Boundaries: 5 Location-Independent Income Strategies

Photo: Mesut Kaya / Unsplash Many people dream of working from pristine beaches in Thailand, cosy cabins in the Alps, or the best coworking spaces Me...

High Visibility Work Shirts: A Must-Have for Workplace Safety

Workplace safety is a necessity. Workers from construction sites to manufacturing units should be visible for their well-being and they have it by w...

How to Prepare for Your Wedding Video Shoot: A Step-by-Step Guide

Your wedding video captures one of the most important days of your life, preserving precious memories and moments for years to come. To ensure the d...

Preparing for Debt Collection Amidst Economic Downturn in Australia

Economic downturns bring financial uncertainty, especially for Australian businesses reliant on consistent cash flow. The challenges multiply when c...

How to Enhance the Security of Your E-Commerce Site

In the digital age, e-commerce has become a vital part of the global economy, allowing businesses to reach customers far and wide. However, with thi...

Understanding Disability Service Providers: Roles and Responsibilities

Disability service providers are people who support individuals with disabilities. Their role is pretty simple: help people live their lives more in...

Top 10 Guest Posting and Content Agencies in Massachusetts for 2025

Digital marketing relies on SEO content creation and guest posting to get more people to see your website, increase search engine rankings, and establ...

Same Day Rubbish Removal: Convenience and Efficiency at Your Doorstep

In today’s fast-paced world, convenience is king. From on-demand food delivery to next-day shipping, modern living is all about getting what you n...

Optimising Workforce Efficiency: The Benefits and Implementation of Employee Scheduling Software

"Master workforce management with our guide on Employee Scheduling Software. Streamline tasks & increase efficiency seamlessly!" Employee sched...

Enhancing Road Safety with Technology and Apps

Road safety has always been a critical concern for individuals, organisations, and governments alike. With the rapid advancements in technology, a n...

Best Cleaning Methods and Tools for Solar Panels

Solar panels are a fantastic way to harness renewable energy, but keeping them clean is essential to maximise their efficiency. Dust, grime, bird dr...

The Benefits of Implementing a Uniform Policy

A well-thought-out uniform policy can be a game-changer for organisations of all types. Whether you run a corporate office, a retail store, or a tra...