Trend Micro and Intel Join Forces to Combat Stealthy Threats

Published:

Trend Micro and Intel Join Forces to Combat Stealthy Cyber Threats with Advanced Security Solutions

Trend Micro and Intel Unite to Combat Stealthy Cyber Threats

In a groundbreaking collaboration, Trend Micro has joined forces with Intel to bolster cybersecurity measures for enterprise customers facing increasingly sophisticated attacks. The partnership aims to defend critical systems against stealthy threats, including fileless malware and advanced ransomware, which have become predominant in the rapidly evolving landscape of cybercrime.

As cybercriminals refine their tactics, traditional security measures often fall short. However, with the integration of Trend Micro’s proactive security platform and Intel’s Threat Detection Technology (TDT), organizations can effectively discern between legitimate encryption behaviors and malicious activities. This sophisticated approach not only enhances threat detection but also reduces response times to potential breaches.

Carla Rodriguez, Intel’s Vice President, emphasized the importance of this collaboration: “Threat actors are targeting endpoints with sophisticated attacks that evade traditional software-based security. Our technology, deployed across a billion PCs, delivers an AI-based security layer to uncover these stealthy threats.” This combination positions mutual customers to benefit from the robust capabilities of Trend Vision One™ – Endpoint security on Intel AI PCs.

Fileless malware is particularly concerning; it accounts for nearly 40% of all cyberattacks in 2023, exploiting legitimate tools to evade detection. With Intel’s advanced memory scanning capabilities, Trend’s solutions are set to enhance their scanning capacity drastically—by seven to ten times—allowing for deeper and more frequent analysis of potential threats.

Rachel Jin, Chief Enterprise Platform Officer at Trend Micro, highlighted the significance of proactive security: “Through our work with Intel, we’re redefining what’s possible in cybersecurity.” With this collaboration, enterprises can enhance their resilience against an increasingly complex threat landscape, safeguarding critical data and operations from potential damage.

Related articles

Recent articles