{"id":83842,"date":"2025-02-19T08:00:22","date_gmt":"2025-02-19T11:00:22","guid":{"rendered":"https:\/\/abes.org.br\/?p=83842"},"modified":"2025-01-30T13:41:46","modified_gmt":"2025-01-30T16:41:46","slug":"trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/","title":{"rendered":"Trend Micro and Intel Innovate to Eliminate Invisible Threats with Cutting-Edge Technology"},"content":{"rendered":"<p style=\"text-align: center;\"><span data-olk-copy-source=\"MessageBody\">Partnership combines software and hardware intelligence to strengthen detection of ransomware attacks<\/span><\/p>\n<p>THE\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606tFnGi-2BrKsnBvakKw9lJ2dvOpfrrepEDtsZ6yf1gKsnIg-3D-3DDhvf_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrUrlvIzvwbA4Ab-2F38oeKYFJ6dmNse44UrfoO-2BrR0jLCo9rqgNVIeR807fRk6G7ixhPZCGCb5GY9-2Byt-2BU-2B2H4r7Xs2sJzztzKaaEh7nWKECzXM-2FIqsw52RgJzUHAkWrg6TLchCHSxNBG5P67gI14lGZ8vaTLNLFBlf-2FnXP5Cb-2FGshB6PR3asu9AWOJ-2BJnUnwhU-3D\">Trend Micro<\/a>, a global leader in cybersecurity solutions, announced a new collaboration with Intel\u00ae to protect critical enterprise systems against stealthy threats, including fileless malware and advanced ransomware. The integrated solution offers the unique ability to verify whether encryption behavior is legitimate (such as a user backing up files) or malicious, ensuring rapid decision-making to protect critical systems.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83843 size-medium alignleft\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/TREND-MICRO-E-INTEL-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" \/>\u201cCybercriminals are increasingly targeting endpoints with sophisticated attacks that evade traditional software-based security solutions. By integrating Intel Threat Detection Technology (Intel\u00ae TDT) into Trend Micro solutions, we provide an additional layer of hardware-accelerated detection that can identify stealthy threats,\u201d said Carla Rodriguez, vice president at Intel. \u201cThis technology, already deployed on more than a billion PCs, is the only silicon-based AI security solution. Combined with Trend solutions such as Trend Vision One\u2122 \u2013 Endpoint, our customers gain enhanced protection and optimized performance.\u201d<\/p>\n<p>As cyberattacks become more sophisticated, protecting critical assets across endpoints, networks, email, and cloud workloads is a constant challenge. In 2023, approximately 401,000 attacks used fileless malware, a method that leverages system memory, the registry, or legitimate tools like PowerShell, making it difficult to detect using traditional approaches.<\/p>\n<p>This is where the collaboration between Trend Micro and Intel comes into its own, combining the power of the Trend Vision One\u2122 platform with AI and the unique capabilities of Intel\u00ae TDT to provide tools that detect and respond to attacks before they can cause damage.<\/p>\n<p>\u201cProactive security, long considered an ideal, is now a reality. Our partnership with Intel redefines what\u2019s possible in cybersecurity, enabling businesses to preemptively protect their systems and data against an increasingly complex threat landscape,\u201d said Rachel Jin, director of Enterprise Platforms at Trend Micro.<\/p>\n<p>The integration of Intel\u00ae TDT with Advanced Memory Scanning (AMS) offers the following technological advantages:<\/p>\n<ul type=\"disc\">\n<li class=\"x_MsoNormal\"><strong><span data-olk-copy-source=\"MessageBody\">Unloading advanced loads:<\/span><\/strong>\u00a0Intel\u00ae TDT offloads Advanced Memory Scanning (AMS) loads from the CPU to the GPU, enabling deeper and more frequent scans;<\/li>\n<li class=\"x_MsoNormal\"><strong>Improved efficiency:<\/strong>\u00a0reduced CPU resource utilization ensures that solutions\u00a0<em>endpoint<\/em>\u00a0from Trend Micro to perform faster detections without impacting system performance, battery life, or user experience;<\/li>\n<li class=\"x_MsoNormal\"><strong>Increased detection capacity:<\/strong>\u00a0with Trend Vision One\u2122 \u2013 Endpoint Security leverages AMS to improve memory scanning capability by 7-10x, enabling it to identify and block more threats effectively;<\/li>\n<li class=\"x_MsoNormal\"><strong>Improved behavioral analysis:\u00a0<\/strong>Intel TDT augments Trend\u2019s behavioral analytics, runtime machine learning, and expert rules, providing critical hardware-layer visibility and elevating ransomware detection effectiveness in 24% over software alone.<\/li>\n<\/ul>\n<p><strong>About Trend Micro<\/strong><br \/>\nTrend Micro, a global leader in cybersecurity, helps make the world a safer place to exchange digital information. Powered by decades of cybersecurity expertise, global threat research, and continuous innovation, Trend Micro\u2019s AI-powered cybersecurity platform protects hundreds of thousands of individuals and organizations across the cloud, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, Trend Micro delivers a powerful array of advanced threat defenses optimized for environments such as AWS, Microsoft, and Google, and central visibility for faster, better detection and response. With 7,000 employees across 70 countries, Trend Micro enables organizations to secure and simplify their connected world.<\/p>\n<p>Site:\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPSNULuGRKmEYupt5x2606vWxuhxal7X3jsVh3Q6P1Ap9PUD_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrUrlvIzvwbA4Ab-2F38oeKYFJ6dmNse44UrfoO-2BrR0jLCjHwoEhzXSdLjsQrNk32x72kH8oVcoxeEfAW671SoXL2iEur0L4-2BRVjT87kgq9Pup51yJmGxMMJxyBmaciejUDKw-2FrVItoIvuGerFDaSpBg3-2BdrOCIqgogqYRFE0r2nlzlYUP7uQS9we3xw22ebAbyE-3D\">\u00a0Link<\/a><br \/>\nTwitter: TrendmicroBR<br \/>\nLinkedin:\u00a0<a href=\"https:\/\/u32992647.ct.sendgrid.net\/ls\/click?upn=u001.4WK8f5yxV04ZS-2FaVz7ncmPFSqgP9TLBiKCWEYJ5RvtK-2BGuiGA7dXDTgQH7DTeUOc9-2FslgR3RJ-2FqPz5H3IR6BHA-3D-3Dm0gy_ZLaVF4Uye-2FMZNh-2FFBJkpj5zS69TDi25JDqt9oca99hrUrlvIzvwbA4Ab-2F38oeKYFJ6dmNse44UrfoO-2BrR0jLCpW9d-2B23gZi3yUeIw6d8mwcbexT-2Bm4ZZ0EA-2B-2FDrd-2F-2FEPLLRlNUW7tbHe6693DBsxJTwEqGcw9iA8sPfHdWaNSgQyJ0GDrWyhfdEXCIvdhoofYqVjp4Xkw3hhPLJnBjFcxYftxVYWUGFjba6sxcr21q0-3D\">\u00a0Link<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Parceria combina intelig\u00eancia de software e hardware para fortalecer a detec\u00e7\u00e3o de ataques ransomware A\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a,\u00a0anunciou nova colabora\u00e7\u00e3o com a Intel\u00ae para proteger sistemas cr\u00edticos corporativos contra amea\u00e7as furtivas, incluindo malware sem arquivo e\u00a0ransomware\u00a0avan\u00e7ado. A solu\u00e7\u00e3o integrada oferece a capacidade \u00fanica de verificar se o comportamento de criptografia \u00e9 [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":83843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[1394,6661,6659,6662,6660],"class_list":["post-83842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-cibercriminosos","tag-desempenho-otimizado","tag-deteccao-de-ataques-ransomware","tag-inteligencia-de-software-e-hardware","tag-protecao-aprimorada"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta - ABES\" \/>\n<meta property=\"og:description\" content=\"Parceria combina intelig\u00eancia de software e hardware para fortalecer a detec\u00e7\u00e3o de ataques ransomware A\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a,\u00a0anunciou nova colabora\u00e7\u00e3o com a Intel\u00ae para proteger sistemas cr\u00edticos corporativos contra amea\u00e7as furtivas, incluindo malware sem arquivo e\u00a0ransomware\u00a0avan\u00e7ado. A solu\u00e7\u00e3o integrada oferece a capacidade \u00fanica de verificar se o comportamento de criptografia \u00e9 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-19T11:00:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/TREND-MICRO-E-INTEL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\"},\"headline\":\"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta\",\"datePublished\":\"2025-02-19T11:00:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/\"},\"wordCount\":731,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/TREND-MICRO-E-INTEL.jpg\",\"keywords\":[\"cibercriminosos\",\"desempenho otimizado\",\"detec\u00e7\u00e3o de ataques ransomware\",\"intelig\u00eancia de software e hardware\",\"prote\u00e7\u00e3o aprimorada\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/\",\"name\":\"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/TREND-MICRO-E-INTEL.jpg\",\"datePublished\":\"2025-02-19T11:00:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/TREND-MICRO-E-INTEL.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/TREND-MICRO-E-INTEL.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/dcf8e65fad7e59750ce485162b9368e1\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/","og_locale":"en_US","og_type":"article","og_title":"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta - ABES","og_description":"Parceria combina intelig\u00eancia de software e hardware para fortalecer a detec\u00e7\u00e3o de ataques ransomware A\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a,\u00a0anunciou nova colabora\u00e7\u00e3o com a Intel\u00ae para proteger sistemas cr\u00edticos corporativos contra amea\u00e7as furtivas, incluindo malware sem arquivo e\u00a0ransomware\u00a0avan\u00e7ado. A solu\u00e7\u00e3o integrada oferece a capacidade \u00fanica de verificar se o comportamento de criptografia \u00e9 [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2025-02-19T11:00:22+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/TREND-MICRO-E-INTEL.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1"},"headline":"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta","datePublished":"2025-02-19T11:00:22+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/"},"wordCount":731,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/TREND-MICRO-E-INTEL.jpg","keywords":["cibercriminosos","desempenho otimizado","detec\u00e7\u00e3o de ataques ransomware","intelig\u00eancia de software e hardware","prote\u00e7\u00e3o aprimorada"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/","url":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/","name":"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/TREND-MICRO-E-INTEL.jpg","datePublished":"2025-02-19T11:00:22+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/TREND-MICRO-E-INTEL.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2025\/01\/TREND-MICRO-E-INTEL.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/trend-micro-e-intel-inovam-para-eliminar-ameacas-invisiveis-com-tecnologia-de-ponta\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Trend Micro e Intel inovam para eliminar amea\u00e7as invis\u00edveis com tecnologia\u00a0 de ponta"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/dcf8e65fad7e59750ce485162b9368e1","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/046957867b6753ed9bdaf5dce80daad5de53aef5d91ee911b8b85c9bc9d9e79c?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes2\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-20 06:49:10","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/83842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=83842"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/83842\/revisions"}],"predecessor-version":[{"id":83844,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/83842\/revisions\/83844"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/83843"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=83842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=83842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=83842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}