{"id":82876,"date":"2025-01-10T08:00:57","date_gmt":"2025-01-10T11:00:57","guid":{"rendered":"https:\/\/abes.org.br\/?p=82876"},"modified":"2024-12-12T19:46:35","modified_gmt":"2024-12-12T22:46:35","slug":"trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/","title":{"rendered":"Trend Micro and NTT Security Join Forces to Strengthen Cybersecurity with Advanced AI"},"content":{"rendered":"<p><em>The partnership aims to leverage the companies&#039; strengths to expand the range of solutions and tools available against cyberattacks.<\/em><\/p>\n<p><span data-olk-copy-source=\"MessageBody\">THE\u00a0<a title=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606vWxuhxal7X3jsVh3Q6P1ApjS7i_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrE8QA-2Fkz7T5zjrqNdC2-2BEusRoK82KFMQnm2OnhplNdPuHaCntf6kehx260UZQzuxJ79X2XbMUtN-2B3ZO7Ouhf9xYDN1pTEvg8sNVSfI7ARo1MIP6Y0ihPXo46kPeIvuLuRpT5KCun0NuMBcAxoSH-2Fk-2FqpzNvkkewne-2FPkm7EEmZtQ-3D-3D\" href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606vWxuhxal7X3jsVh3Q6P1ApjS7i_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrE8QA-2Fkz7T5zjrqNdC2-2BEusRoK82KFMQnm2OnhplNdPuHaCntf6kehx260UZQzuxJ79X2XbMUtN-2B3ZO7Ouhf9xYDN1pTEvg8sNVSfI7ARo1MIP6Y0ihPXo46kPeIvuLuRpT5KCun0NuMBcAxoSH-2Fk-2FqpzNvkkewne-2FPkm7EEmZtQ-3D-3D\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"1\"><strong>Trend Micro<\/strong><\/a><strong><u>,<\/u><\/strong>\u00a0Global cybersecurity leader NTT Security has partnered to accelerate the development of comprehensive cybersecurity solutions focused on the use of Artificial Intelligence (AI). The strategic alliance between the Japanese companies aims to strengthen protection against sophisticated cyberattacks, a growing challenge in a scenario where AI is increasingly widespread and accessible.<\/span><\/p>\n<p>Trend Micro\u2019s cybersecurity report highlights that 801,000 global organizations are at risk of a cyberattack in the coming months, with a high likelihood of affecting customer information. Another recent study reveals a significant gap between organizations, with only one-third maintaining 24\/7 cyber vigilance.<\/p>\n<p>Both NTT and Trend recognize that as AI becomes more popular, the number of threats faced by companies and users increases, mainly due to new types of attacks, such as virtual kidnappings and fraud with\u00a0<em>deepfakes<\/em>. The rapid evolution of new technology has allowed attackers to use natural language algorithms to launch highly sophisticated attacks that overcome linguistic, cultural and even spatial barriers.<\/p>\n<p>The alliance aims to leverage the companies&#039; strengths, such as NTT Security&#039;s excellent response capability and intelligence and Trend Micro&#039;s renowned AI utilization technology and development capabilities.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cosmicpimg-prod.services.web.outlook.com\/proxy\/?u=http%3A%2F%2Fdfreire.hospedagemdesites.ws%2Femail%2Ftrendmicro121224_clip_image002.jpg&amp;t=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InZQUXBFOUN6djBnVW5xdmh6bCtNMkdzejdkTT0iLCJ4NXQiOiJ2UFFwRTlDenYwZ1VucXZoemwrTTJHc3o3ZE09IiwiaXNzbG9jIjoiQk4wUFIyME1CNDExOSIsInNyc24iOjYzODY5NTY2NjM4MjY1ODAyN30.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.lJzt4XzCnVIslgADRztUVouxc49ZTwSkQOCJ6OtTvFxyowWVJU-Va6KaLe3rKz6mRQLreZ8mE6zblE9v3ngxkD-qJ__zqhQeG1P2GSalohoKAJOYkLGzGVctT-i4pAXkBHF-JTMKL4neW3HS1ZvjcPLmvDauIN5XcIG0t93ukFPdQ6b6sLD74NUe_gWM6rzLwg61YqsaEo2s_YXNEJdmezSvdhdb2eTWYBJjVdGOVqj0ZphZtiW6Xgn3L4eQSpg05Qj6U0nAud3ZyL-17oIHayPsZaVeEkZ8SEcteHLNC51JEGLXLW04kciABkLZ9dtQI2I40_vlBUsjWxYAKV2wZg&amp;r=p&amp;s=c\" \/><\/p>\n<p><strong><span data-olk-copy-source=\"MessageBody\">Future Initiatives<\/span><\/strong><\/p>\n<p>The introduction of Generative AI into business operations promises efficiency gains, but it also increases the risk of information leaks and exposure to new vulnerabilities. Trend Micro and NTT Security aim to mitigate these risks with a comprehensive security solution that will reduce companies\u2019 vulnerability to AI misuse by attackers, while optimizing the secure integration of new technology into business. In a context of increasing risks to economic security and the supply chain, ensuring trust, security and transparency is essential for corporate operations.<\/p>\n<p>Through this alliance, NTT Security and Trend Micro will deliver advanced cybersecurity services capable of optimizing IT risk management, detecting unknown threats and ensuring regulatory compliance, responding to the growing demand for robust and reliable security solutions.<\/p>\n<p><strong>About NTT Security<\/strong><br \/>\nNTT Security provides proactive cyber defense and services that leverage human resources and intelligence to protect customers and society. For more than 20 years, the company has helped customers secure their digital businesses by predicting, detecting and responding to cyber threats, while supporting business innovation and managing risk. The company\u2019s Security Operations Center (SOC), Research and Development (R&amp;D) centers and security experts provide unparalleled threat intelligence, handling hundreds of thousands of security incidents annually.<\/p>\n<p><strong>About Trend Micro<\/strong><br \/>\nTrend Micro, a global leader in cybersecurity, helps make the world a safer place to exchange digital information. Powered by decades of cybersecurity expertise, global threat research, and continuous innovation, Trend Micro\u2019s AI-powered cybersecurity platform protects hundreds of thousands of individuals and organizations across the cloud, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend Micro delivers a powerful array of advanced threat defenses optimized for environments such as AWS, Microsoft, and Google, and central visibility for faster, better detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to secure and simplify their connected world.<\/p>\n<p><strong>Site:<\/strong>\u00a0\u00a0<a title=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.8NypQylkYW7c1HC4kb3a-2F-2FhC-2Fi7VE9qhJ6RT9dYMXEEAW5-2B9avAST057VKf8ShgFJmIwP0pLTxValJ-2FBL4VpDw-3D-3Dbja5_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrE8QA-2Fkz7T5zjrqNdC2-2BEusRoK82KFMQnm2OnhplNdPnWVBO-2FlujAy-2FgvFLm0lIErZwOP7OspK6REimqGW1QSlWxko-2B1ZneUFXPLVy-2FhZ7MNdqqOsvZhqBdOmbcXnRZD3TdKRwl3fD0WsAAInPjeBejjTCQwSsHx7DP87AHj4PnA-3D-3D\" href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.8NypQylkYW7c1HC4kb3a-2F-2FhC-2Fi7VE9qhJ6RT9dYMXEEAW5-2B9avAST057VKf8ShgFJmIwP0pLTxValJ-2FBL4VpDw-3D-3Dbja5_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrE8QA-2Fkz7T5zjrqNdC2-2BEusRoK82KFMQnm2OnhplNdPnWVBO-2FlujAy-2FgvFLm0lIErZwOP7OspK6REimqGW1QSlWxko-2B1ZneUFXPLVy-2FhZ7MNdqqOsvZhqBdOmbcXnRZD3TdKRwl3fD0WsAAInPjeBejjTCQwSsHx7DP87AHj4PnA-3D-3D\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"2\">www.trendmicro.com\/pt_br\/business.html<\/a><br \/>\n<strong>Twitter:<\/strong>\u00a0@TrendmicroBR<br \/>\n<strong>Linkedin:<\/strong>\u00a0\u00a0<a title=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.8NypQylkYW7c1HC4kb3a-2F3CRDBuucuasforsh62HKyzdzkAW-2Fy6bsBIimgao7q65V3klt7yHpB4GE7C8zMAmFA-3D-3DHaO8_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrE8QA-2Fkz7T5zjrqNdC2-2BEusRoK82KFMQnm2OnhplNdPokjNijdOb2fn56L-2FJBxHS0lqscyGbOQp7apnGJv3wC8PP1c9VuV9yJsvNzPlsKFqV-2FjVVlaiGnCwXuzuKn4XNU9irvQ33EszKj9WdqP94giYb7CWQ513TKaMR5T-2B57eIA-3D-3D\" href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.8NypQylkYW7c1HC4kb3a-2F3CRDBuucuasforsh62HKyzdzkAW-2Fy6bsBIimgao7q65V3klt7yHpB4GE7C8zMAmFA-3D-3DHaO8_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrE8QA-2Fkz7T5zjrqNdC2-2BEusRoK82KFMQnm2OnhplNdPokjNijdOb2fn56L-2FJBxHS0lqscyGbOQp7apnGJv3wC8PP1c9VuV9yJsvNzPlsKFqV-2FjVVlaiGnCwXuzuKn4XNU9irvQ33EszKj9WdqP94giYb7CWQ513TKaMR5T-2B57eIA-3D-3D\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"3\">www.linkedin.com\/company\/trend-micro-brasil\/<\/a><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>A parceria pretende aproveitar os pontos fortes das empresas para ampliar a oferta de solu\u00e7\u00f5es e ferramentas contra os ciberataques A\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica, e a NTT Security firmaram parceria para acelerar o desenvolvimento de solu\u00e7\u00f5es abrangentes de seguran\u00e7a cibern\u00e9tica com foco no uso de Intelig\u00eancia Artificial (IA). A alian\u00e7a estrat\u00e9gica das empresas [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":82877,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[6421,270],"class_list":["post-82876","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ia-generativa-nas-operacoes-empresariais","tag-seguranca-cibernetica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada - ABES\" \/>\n<meta property=\"og:description\" content=\"A parceria pretende aproveitar os pontos fortes das empresas para ampliar a oferta de solu\u00e7\u00f5es e ferramentas contra os ciberataques A\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica, e a NTT Security firmaram parceria para acelerar o desenvolvimento de solu\u00e7\u00f5es abrangentes de seguran\u00e7a cibern\u00e9tica com foco no uso de Intelig\u00eancia Artificial (IA). A alian\u00e7a estrat\u00e9gica das empresas [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-10T11:00:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/CIBERSEGURANCA-TREND-NTT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada\",\"datePublished\":\"2025-01-10T11:00:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/CIBERSEGURANCA-TREND-NTT.jpg\",\"keywords\":[\"IA Generativa nas opera\u00e7\u00f5es empresariais\",\"seguran\u00e7a cibern\u00e9tica\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/\",\"name\":\"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/CIBERSEGURANCA-TREND-NTT.jpg\",\"datePublished\":\"2025-01-10T11:00:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/CIBERSEGURANCA-TREND-NTT.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/CIBERSEGURANCA-TREND-NTT.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada - ABES","og_description":"A parceria pretende aproveitar os pontos fortes das empresas para ampliar a oferta de solu\u00e7\u00f5es e ferramentas contra os ciberataques A\u00a0Trend Micro,\u00a0l\u00edder global em seguran\u00e7a cibern\u00e9tica, e a NTT Security firmaram parceria para acelerar o desenvolvimento de solu\u00e7\u00f5es abrangentes de seguran\u00e7a cibern\u00e9tica com foco no uso de Intelig\u00eancia Artificial (IA). A alian\u00e7a estrat\u00e9gica das empresas [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2025-01-10T11:00:57+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/CIBERSEGURANCA-TREND-NTT.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada","datePublished":"2025-01-10T11:00:57+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/"},"wordCount":749,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/CIBERSEGURANCA-TREND-NTT.jpg","keywords":["IA Generativa nas opera\u00e7\u00f5es empresariais","seguran\u00e7a cibern\u00e9tica"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/","url":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/","name":"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/CIBERSEGURANCA-TREND-NTT.jpg","datePublished":"2025-01-10T11:00:57+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/CIBERSEGURANCA-TREND-NTT.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/12\/CIBERSEGURANCA-TREND-NTT.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/trend-micro-e-ntt-security-unem-forcas-para-fortalecer-a-seguranca-cibernetica-com-uso-de-ia-avancada\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Trend Micro e NTT Security unem for\u00e7as para fortalecer a seguran\u00e7a cibern\u00e9tica com uso de IA avan\u00e7ada"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 10:15:14","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/82876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=82876"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/82876\/revisions"}],"predecessor-version":[{"id":82878,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/82876\/revisions\/82878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/82877"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=82876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=82876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=82876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}