Proactive cybersecurity AI fends off attacks

Advertising

Share post

Trend Micro's first proactive cybersecurity AI sets a new standard with new capabilities for proactive risk management, threat modeling, attack path prediction, and other insights. Proactive security insights are designed to better protect organizations.

The new AI agent is transforming the way organizations address cyber risk. Trend Cybertron is the industry's first specialized cybersecurity Large Language Model (LLM) that delivers proactive security outcomes. The new AI leverages precise local risk assessments and deep, global, and industry-specific threat intelligence to predict and prevent threats across an organization's entire attack surface in any environment.

Advertising
Perfect SME cybersecurity
How small and medium-sized enterprises defend against AI-led attacks with tailored security

AI against more complex security challenges

Organizations around the world are facing increasingly complex security challenges. Understanding attack surfaces, managing siloed technology stacks, responding to threats, dealing with alert fatigue, and integrating AI are leading to overwhelmed and exhausted security teams. Trend Cybertron connects real-time and historical data from around the world. This new approach to AI in cybersecurity is more than a standalone LLM. It leverages all the core technologies of the Trend Vision One platform—threat data, analytics, engines, and more—to provide a complete solution for the entire cybersecurity workload in organizations. Organizations benefit from:

  • Accelerate security processes by anticipating needs and predicting potential risks
  • Reducing the flood of alarms, improving the precision of prioritization and avoiding alarm fatigue
  • Maximizing benefits and gaining more precise insights from existing risk sensors

Trend Cybertron is seamlessly integrated into the Trend Vision One Platform and is available to customers worldwide. Its industry-leading focus on proactive security enables IT teams to anticipate and predict risks and threat activity with precise precision across the entire attack surface. This allows teams to preempt breaches and mitigate risks before they become threats.

Advertising

Subscribe to our newsletter now

Read the best news from B2B CYBER SECURITY once a month



By clicking on "Register" I agree to the processing and use of my data in accordance with the declaration of consent (please open for details). I can find more information in our Privacy Policy. After registering, you will first receive a confirmation email so that no other person can order something you don't want.
Expand for details on your consent
It goes without saying that we handle your personal data responsibly. If we collect personal data from you, we process it in compliance with the applicable data protection regulations. Detailed information can be found in our Privacy Policy. You can unsubscribe from the newsletter at any time. You will find a corresponding link in the newsletter. After you have unsubscribed, your data will be deleted as soon as possible. Recovery is not possible. If you would like to receive the newsletter again, simply order it again. Do the same if you want to use a different email address for your newsletter. If you would like to receive the newsletter offered on the website, we need an e-mail address from you as well as information that allows us to verify that you are the owner of the e-mail address provided and that you agree to receive the newsletter. Further data is not collected or only collected on a voluntary basis. We use newsletter service providers, which are described below, to process the newsletter.

CleverReach

This website uses CleverReach to send newsletters. The provider is CleverReach GmbH & Co. KG, Schafjückenweg 2, 26180 Rastede, Germany (hereinafter “CleverReach”). CleverReach is a service that can be used to organize and analyze the sending of newsletters. The data you enter for the purpose of subscribing to the newsletter (e.g. email address) will be stored on the CleverReach servers in Germany or Ireland. Our newsletters sent with CleverReach enable us to analyze the behavior of the newsletter recipients. This can include It is analyzed how many recipients have opened the newsletter message and how often which link in the newsletter was clicked. With the help of so-called conversion tracking, it can also be analyzed whether a previously defined action (e.g. purchase of a product on this website) took place after clicking on the link in the newsletter. Further information on data analysis by CleverReach newsletter is available at: https://www.cleverreach.com/de/funktionen/reporting-und-tracking/. The data processing takes place on the basis of your consent (Art. 6 Para. 1 lit. a DSGVO). You can revoke this consent at any time by unsubscribing from the newsletter. The legality of the data processing operations that have already taken place remains unaffected by the revocation. If you do not want an analysis by CleverReach, you must unsubscribe from the newsletter. For this purpose, we provide a corresponding link in every newsletter message. The data you have stored with us for the purpose of subscribing to the newsletter will be stored by us or the newsletter service provider until you unsubscribe from the newsletter and deleted from the newsletter distribution list after you have canceled the newsletter. Data stored by us for other purposes remain unaffected. After you have been removed from the newsletter distribution list, your e-mail address may be stored by us or the newsletter service provider in a blacklist if this is necessary to prevent future mailings. The data from the blacklist is only used for this purpose and is not merged with other data. This serves both your interest and our interest in complying with the legal requirements when sending newsletters (legitimate interest within the meaning of Art. 6 Para. 1 lit. f GDPR). Storage in the blacklist is not limited in time. You may object to the storage if your interests outweigh our legitimate interest. For more information, see the privacy policy of CleverReach at: https://www.cleverreach.com/de/datenschutz/.

Data processing

We have concluded a data processing agreement (DPA) for the use of the above-mentioned service. This is a contract mandated by data privacy laws that guarantees that they process personal data of our website visitors only based on our instructions and in compliance with the GDPR.

Trend Cybertron is trained with intelligence and AI expertise

  • Threat intelligence from over 250 million sensors protecting more than 82 million assets at over 500.000 organizations in more than 175 countries. It's the industry's most comprehensive solution, blocking over 2023 billion threats by 160.
  • Machine learning that supports data classification, vulnerability discovery, and detection of deepfakes, phishing techniques, malware, lateral movement, user anomalies, and fraud.
  • Decades of institutional knowledge from over 3.000 security experts with over 700 patents in cybersecurity technology.
  • More than 20 years of advanced vulnerability and zero-day research through the Trend Micro Zero Day Initiative (ZDI), delivering customer protection an average of 70 days earlier than the industry.

The result is a resilient, rapidly evolving system capable of autonomously performing risk management tasks and making decisions. This enables billions of cyber threats worldwide to be detected, understood, and mitigated every month. This enables customers to make informed decisions and manage their cybersecurity, data protection, and compliance.

"Trend Cybertron represents a paradigm shift in cybersecurity—we combine advanced AI with decades of human intelligence to deliver truly proactive security," said Rachel Jin, Chief Enterprise Platform Officer at Trend Micro. "By leveraging global real-time and historical data and comprehensive visibility across all attack surfaces, we empower organizations to anticipate and prevent threats, reduce risk, and create a more resilient future."

Cybertron defines new industry standards in key areas

Rachel Jin, Chief Enterprise Platform Officer at Trend Micro (Image: Trend Micro).

AI for Security

Trend Micro breaks down long-standing security silos by fully connecting all available information to build a comprehensive understanding of security, intelligence, and data. With the ability to securely access data from all layers, security teams can make informed decisions with a depth of understanding that surpasses any previous cybersecurity platform. The risk of data breaches has been reduced by an average of 17 percent, resulting in savings of millions of dollars per year.

Security for AI

The rapid proliferation of AI has raised concerns about data security. More and more companies and governments around the world are training their own AI learning models to reduce the associated risks. Trend Micro makes it safer and easier for organizations at all levels to protect training data, prevent misalignment, and thwart cyberattacks on their AI models.

Actionable insights

Using telemetry across endpoints, cloud, network, email, identity, AI, and data, real-time predictions can be generated to examine the impact and likelihood of thousands of potential attack vectors for each customer. The platform learns and adapts to each customer's unique environment to find and remediate new vulnerabilities and attack vectors. With visibility and automated prioritization, organizations can deliver rapid and effective defenses around the clock.

Simplified workflows

The new AI model was developed with the goal of further enhancing the platform. This ensures that organizations can seamlessly integrate this technology into their existing security systems at every stage of their cybersecurity journey. Security teams benefit from reduced workloads and improved accessibility at all levels.

Empowerment of managers

Trend Vision One goes beyond the standard cybersecurity platform, empowering security leaders to shift their role from reactive defender to proactive business enabler. By transforming security from a mere investment into an innovation driver, executives can effectively communicate cyber risks in the context of business risks, ensuring both operational protection and future growth. Trend Micro research has shownthat this is a critical issue for many companies worldwide.

AI is only as powerful as the data it's trained on and the experts who develop it. Trend Micro's global team of security and AI specialists worked together in Ottawa, Canada, to optimize each development stage and ensure the new AI agent is precisely tuned and provides proactive protection.

AI agents for cybersecurity

"Trend Micro is developing a cybersecurity AI agent that is unparalleled," said Eva Chen, CEO of Trend Micro. "We are combining the highest-quality data in the industry to further enhance our capabilities and make it easier than ever for customers to proactively manage their cyber risks. Our customers and partners are already seeing reduced costs and improved security posture."

"Let's face it. Cybersecurity has been focused on detection for some time now. Prevention was simply uncool. Trend Micro is trying to change the market perception: There's no reason to detect an attack if it never happens," said Frank Dickson, Group Vice President, Security & Trust at IDC. "By leveraging AI in combination with Cyber ​​Risk Exposure Management (CREM), Trend Micro gives organizations an attacker's view of threats. This allows them to thwart them before the risk becomes a reality, creating a massive ROI for overburdened security teams. Trend Micro promises to make proactive prevention cool again in 2025."

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

DDoS attacks: the most important means of cyber warfare

In the second half of 2024, there were at least 8.911.312 DDoS attacks worldwide, according to the results of a recent DDoS Threat Intelligence Report. ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more