Security solutions provider Acronis has advanced its cyber-prevention systems against fileless attacks by leveraging Intel Threat Detection Technology (Intel TDT). This enhances the role of Intel’s integrated graphics processing units (GPUs) to free up the central processing units (CPUs) from memory scanning activities.
As cyber threats evolve and grow, Acronis researchers observe new types of malicious code and new attack vectors to enterprises such as polymorphic malware and fileless attacks. Many threats use the “only-in-memory” approach, which can be very difficult to detect. Intel TDT technology allows Acronis cybersecurity solutions to free up computing resources when scanning hard drives and memory, resulting in improved system performance.
Acronis found that by scanning all processes in the system memory of the supported CPUs, Intel TDT technology reduces the load on the processors by 2.4 times, freeing them from this work and redirecting it to the integrated GPUs.
Acronis’ solution combines comprehensive cyber protection on a single agent basis with Intel TDT. This improvement results in a lower CPU load, allowing more computing capacity to be available for productive work and office software used by end users, while computing-intensive security operations are run on the integrated Intel GPUs.
“Integrating Intel TDT into Acronis’ cyber protection solutions is a logical step to meet the needs of our users,” said Patrick Pulvermuller, CEO of Acronis. The Intel TDT innovation will be available through Acronis Cyber Protect Cloud, Acronis Cyber Protect as well as Acronis Cyber Protect Home Office solutions.
“Over the past year, we’ve seen over 50% of detected attacks be fileless. Leveraging this Intel technology is a fundamental achievement as we continue to optimize and refine our malware engine,” Pulvermuller added.
Users of all sizes relying on Intel vPro can run frequent and high-performance memory scan routines, said Carla Rodriguez, vice president and general manager of Intel’s Partner Ecosystem Development division.
“As the IT world grows more complex and continues its migration to the cloud, security departments are under increasing stress as they rely on loosely integrated technologies, creating complexity and unintended ‘white spots’ in security systems.” commented Michael Subi, vice president of security and trust research at IDC.
According to a recent IDC survey of 1,015 North American IT security professionals, that’s exactly the case for smaller organizations that are less equipped to effectively handle a variety of products from multiple vendors—and don’t have the convenience of being in a strong position to negotiate with multiple suppliers. Therefore, they are much more likely to adopt an integrated hardware and software approach to end device protection, added Michael Subi.
By implementing an integrated solution like Acronis Cyber Protect Cloud, organizations can reduce the time security teams spend on various operational activities, lower training costs and reduce complexity in their IT platforms by reducing the number of tools they manage and in ultimately promote business growth.