Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Trend Micro’s Vision One Platform Uses AI to Streamline Cybersecurity
Cybersecurity as a Business Enabler

Trend Micro’s Vision One Platform Uses AI to Streamline Cybersecurity

Chris HughesBy Chris HughesJuly 19, 20234 Mins Read
Facebook Twitter LinkedIn Email
AI cybersecurity trend micro
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

If you’re anywhere in the technology field these days, you cannot turn a corner without hearing about artificial intelligence (AI), especially tools like OpenAI, ChatGPT, Google Bard, and more. Cybersecurity is no different. Chief information security officers (CISOs) and other leaders are looking to leverage AI to bolster their programs and mitigate risks while vendors are rushing to integrate AI into their platforms.

Trend Micro, a vendor on the Acceleration Economy Cybersecurity Top 10 Shortlist, is an organization leading the charge. It recently announced the release of its Vision One platform, which brings together capabilities such as extended detection and response (XDR), attack surface risk management (ASRM), and zero trust, all powered by AI. In this analysis, I’ll take a close look at Trend Micro’s new offering, with a spotlight on its AI assistant, Companion.

An AI Assistant

Trend Micro empowers customers by having an AI assistant, Companion, as part of the Vision One platform. The AI assistant can accelerate workflows for security operations center (SOC) teams; manage the never-ending barrage of alerts and notifications; and identify anomalous behavior from the massive amounts of security logs that organizations are collecting. Companion helps free chief information officers (CIOs) and CISOs up so that they can tackle more strategic activities tied to business value and revenue generation or protection.

Companion’s Use Cases

Trend Micro provides several use cases and examples of Companion in action. These include activities such as contextualizing threat intelligence and forming an understanding of your attack surface to quickly explain multi-step attacks that traditionally would have taken several hours for an analyst to manually string together. I performed these activities earlier in my career; they are incredibly tedious and time-consuming, and they kept me from focusing on strategic business and security initiatives.

Another notable example is the platform’s potential contributions to threat hunting, where organizations are looking for specific techniques, tactics, and procedures (TTPs) or indicators of compromise (IOCs) from malicious actors across their complex environments. Traditionally, practitioners manually looked across environments, logs, and system data to identify behaviors matching specific patterns. Now, with the power of AI and context-rich search queries on top of the unified Trend Micro Vision One platform, these behaviors can be quickly identified, bringing together telemetry from the myriad of security tools that organizations are juggling.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Lastly, Companion can understand complex scripts, often used by malicious actors to both penetrate and persist in victim environments. Traditionally, practitioners would need to manually review these scripts and seek to identify what it is that the malicious actors are doing. Now, with the power of Vision One’s Companion, organizations can autonomously investigate these scripts and quickly get feedback from the AI assistant in plain language with regard to what the script is doing and how it is being used by the attackers.

The Challenge of Tool Sprawl

With its Vision One platform, Trend Micro looks to address a longstanding industry challenge: tool sprawl. Helping practitioners manage their security tooling is an incredibly important goal. The average organization is juggling more than 40 different security tools based on findings from Ponemon. This is leading to cognitive overload on security teams and arguably creating more risk than it mitigates as security practitioners spend more time managing their cybersecurity portfolio rather than addressing the risks identified by the tools.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

Conclusion

Trend Micro’s Vision One platform provides a perfect example of the power of AI when it comes to cybersecurity use cases. It helps organizations tackle the complex modern attack surface and maximize the efficiency of their scarce security resources to mitigate organizational risks. It will be exciting to watch the platform, as well as others like it, continue to grow.


for more cybersecurity insights, visit the cybersecurity channel

Interested in Trend Micro?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Artificial Intelligence CIO CISO Cybersecurity data featured phishing Risk Management Trend-Micro workflows
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

On Location at Automation Anywhere Imagine: The Convergence of Generative AI and RPA

September 21, 2023

Larry Ellison: ‘And the Newborn Baby Talked!’

September 21, 2023

On Location At Oracle CloudWorld: Demystifying Generative AI

Sponsored ContentSeptember 21, 2023

On Location at Oracle CloudWorld: Larry Ellison’s Keynote Unveils the Future of Tech and AI

Sponsored ContentSeptember 20, 2023
Add A Comment

Comments are closed.

Recent Posts
  • On Location at Automation Anywhere Imagine: The Convergence of Generative AI and RPA
  • Road to Community Summit North America: Dynamics GP, Learning, Forging Relationships
  • Larry Ellison: ‘And the Newborn Baby Talked!’
  • The Intelligent Enterprise for the Insurance Industry
  • On Location At Oracle CloudWorld: Demystifying Generative AI

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The State of Process Mining 2023: Unlocking Efficiency and Driving Customer Satisfaction

July 31, 2023

How Workday Creates Agile Monetization Opportunities for CFOs

June 21, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.