
Trend Micro launches agentic SIEM to boost proactive cybersecurity
The SIEM market has seen minimal structural evolution since its inception, leaving many enterprises reliant on models unable to adapt to the varied and voluminous flow of modern security data. Trend Micro's latest solution represents a significant departure from existing practices, introducing an agentic AI approach that integrates support for over 900 data sources and features a rapid onboarding process for new log types, which the company expects to reduce from three days to three hours by the next year.
Trend Micro's agentic SIEM also offers an archival data retention capability stretching back seven years, designed to meet growing demands for security and regulatory compliance.
Industry analyst views
Dave Gruber, Principal Cybersecurity Analyst at ESG, commented on the changing landscape of AI in security environments, stating: "As the cybersecurity stack increasingly becomes AI driven, the security data layer must evolve to support data-hungry agentic capabilities, including infusing agentic AI into core SIEM functions. Trend Vision One Agentic SIEM enters the SIEM market at a pivotal time, leveraging Agentic AI from the ground up to drive speed, performance, and a new level of risk-driven, contextual insights to rapidly mitigate cyber threat activity."
Gruber's comments reflect a broader industry need for SIEM technology to better align with the advanced capabilities of AI, particularly as security teams face rising threats and growing data environments.
Challenges in current SIEM technology
Traditional SIEM systems often depend on manual configuration and rigid data parsers, making it difficult to keep pace with the scale and diversity of cybersecurity threats today. As a result, security teams grapple with high operational costs, alert fatigue, and inefficiencies arising from static, passive data lakes.
According to Trend Micro, its agentic SIEM uses the next wave of AI to automate learning, mapping, and data optimisation, reducing setup times that previously spanned weeks to a matter of days. The agentic AI operates autonomously, filtering out extraneous alerts and helping overburdened security teams focus on strategic security initiatives.
Product features and benefits
The new offering includes support for more than 900 data sources, improving an organisation's visibility and ability to detect threats across a wide range of network environments. Trend Micro claims that the onboarding of new log types can be achieved within three days, with an aim for this process to drop to just three hours by 2026, minimising the risks associated with unfamiliar data types.
Trend Micro's extended detection and response (XDR) features are integrated into the solution, drawing from six security sensors - endpoint, cloud, email, networks, servers, and identity. The agentic SIEM can also ingest third-party telemetry to help organisations obtain a broad environmental overview. The platform enables up to seven years of data archiving and two years of analytic retention to enhance both detection and compliance support.
Vision and strategic direction
Rachel Jin, Chief Enterprise Platform Officer at Trend Micro, outlined the company's vision for security operations: "Agentic SIEM is a major stepping stone to our long-term vision for full, AI-driven SecOps. It's a future in which security teams will have more time to work on strategic tasks, safe in the knowledge that our agentic AI has their backs. With this launch, Trend is once again laying down a marker for cybersecurity innovation and global market leadership."
The newly launched SIEM is intended to allow security professionals to devote more time to strategic tasks, shifting the burden of low-level monitoring and data sifting onto automated AI-driven systems.
Use cases and integration
The potential applications for the agentic SIEM include threat detection and response, where it replaces manual log monitoring with autonomous data analysis and anomaly detection to decrease the time required to detect and address cyber threats. For compliance support, the system combines long-term data retention with advanced search capabilities, designed to help organisations efficiently meet audit and regulatory requirements.
Incident investigation is another area where the technology is expected to have a significant impact, as it automates data correlation from multiple sources, accelerating investigation timelines and enhancing the accuracy of findings.
Additionally, the company highlights the strategic opportunity in combining the agentic SIEM with its digital twin technology, allowing users to proactively manage and mitigate risks affecting virtual models across highly regulated sectors including healthcare, supply chain management, predictive maintenance, and smart building infrastructure.
Trend Micro aims for the solution to enhance both operational resilience and compliance support for organisations adapting to increasingly complex cyber threats.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 days ago
- Techday NZ
Trend Micro unveils Agentic SIEM to automate & streamline security
Trend Micro has launched Agentic SIEM, an artificial intelligence-powered security solution designed to address the longstanding challenges faced by traditional Security Information and Event Management (SIEM) systems. SIEM challenges Security Information and Event Management systems are relied upon by organisations to detect and respond to cyber threats. However, users of traditional SIEM solutions regularly cite challenges around high costs, operational complexity, alert overload, and passive data storage. Manual setup and static parsing also reportedly hinder effective management of the increasing variety and volume of contemporary data sources. The newly-announced Agentic SIEM deploys agentic AI to automate and improve key tasks, acting independently to reduce the number of alerts and streamline the workload of security teams. The platform is designed from the outset to utilise AI-driven capabilities in detecting, learning from, and responding to threats with minimal human intervention. Integration and scale Agentic SIEM supports over 900 data sources from launch, with integration options not only for Trend's proprietary XDR security sensors but also for third-party telemetry. This aims to provide a more comprehensive view of the security environment. The solution also offers three-day onboarding for new log types, with an aim to reduce this further to three hours by 2026. Data retention features include up to seven years of archival storage and two years of analytics retention, supporting both compliance and threat hunting requirements. Agentic SIEM is built to complement Trend's digital twin technology, enabling proactive risk mitigation across sectors such as healthcare, supply chains, predictive maintenance, and smart infrastructure. Industry perspective "As the cybersecurity stack increasingly becomes AI driven, the security data layer must evolve to support data-hungry agentic capabilities, including infusing agentic AI into core SIEM functions. Trend Vision One Agentic SIEM enters the SIEM market at a pivotal time, leveraging Agentic AI from the ground up to drive speed, performance, and a new level of risk-driven, contextual insights to rapidly mitigate cyber threat activity." This observation from Dave Gruber, Principal Cybersecurity Analyst at ESG, reflects current industry expectations for greater automation and intelligence in responding to security challenges. Workload automation The system employs agentic AI to map and optimise data flows swiftly, automating tasks that previously took security teams weeks to configure and manage. Trend Micro states that this immediate reduction in manual effort allows security professionals to concentrate on strategic and analytical work instead of routine monitoring and response. "Agentic SIEM is a major stepping stone to our long-term vision for full, AI-driven SecOps. It's a future in which security teams will have more time to work on strategic tasks, safe in the knowledge that our agentic AI has their backs. With this launch, Trend is once again laying down a marker for cybersecurity innovation and global market leadership." This was the statement from Mick McCluney, ANZ Field CTO at Trend. Use cases According to Trend Micro, Agentic SIEM can facilitate a range of use cases including automated threat detection and response, streamlined compliance support, and enhanced incident investigation. By performing autonomous data analysis, correlating information from multiple sources, and retaining extensive historical data, the system aims to reduce investigation timeframes and improve accuracy. The combination of Agentic SIEM with digital twin technology is intended to bolster cyber resilience and compliance further. Trend Micro points to prospective benefits in environments where virtual models and real-time data integration can inform risk mitigation, such as in healthcare operations, supply chain security, smart building management and predictive maintenance scenarios.


Techday NZ
2 days ago
- Techday NZ
Trend Micro launches agentic SIEM to boost proactive cybersecurity
Trend Micro has launched a new agentic Security Information and Event Management (SIEM) solution that aims to drive proactive cybersecurity through the use of agentic artificial intelligence (AI), addressing the cost and complexity issues common in traditional SIEM systems. The SIEM market has seen minimal structural evolution since its inception, leaving many enterprises reliant on models unable to adapt to the varied and voluminous flow of modern security data. Trend Micro's latest solution represents a significant departure from existing practices, introducing an agentic AI approach that integrates support for over 900 data sources and features a rapid onboarding process for new log types, which the company expects to reduce from three days to three hours by the next year. Trend Micro's agentic SIEM also offers an archival data retention capability stretching back seven years, designed to meet growing demands for security and regulatory compliance. Industry analyst views Dave Gruber, Principal Cybersecurity Analyst at ESG, commented on the changing landscape of AI in security environments, stating: "As the cybersecurity stack increasingly becomes AI driven, the security data layer must evolve to support data-hungry agentic capabilities, including infusing agentic AI into core SIEM functions. Trend Vision One Agentic SIEM enters the SIEM market at a pivotal time, leveraging Agentic AI from the ground up to drive speed, performance, and a new level of risk-driven, contextual insights to rapidly mitigate cyber threat activity." Gruber's comments reflect a broader industry need for SIEM technology to better align with the advanced capabilities of AI, particularly as security teams face rising threats and growing data environments. Challenges in current SIEM technology Traditional SIEM systems often depend on manual configuration and rigid data parsers, making it difficult to keep pace with the scale and diversity of cybersecurity threats today. As a result, security teams grapple with high operational costs, alert fatigue, and inefficiencies arising from static, passive data lakes. According to Trend Micro, its agentic SIEM uses the next wave of AI to automate learning, mapping, and data optimisation, reducing setup times that previously spanned weeks to a matter of days. The agentic AI operates autonomously, filtering out extraneous alerts and helping overburdened security teams focus on strategic security initiatives. Product features and benefits The new offering includes support for more than 900 data sources, improving an organisation's visibility and ability to detect threats across a wide range of network environments. Trend Micro claims that the onboarding of new log types can be achieved within three days, with an aim for this process to drop to just three hours by 2026, minimising the risks associated with unfamiliar data types. Trend Micro's extended detection and response (XDR) features are integrated into the solution, drawing from six security sensors - endpoint, cloud, email, networks, servers, and identity. The agentic SIEM can also ingest third-party telemetry to help organisations obtain a broad environmental overview. The platform enables up to seven years of data archiving and two years of analytic retention to enhance both detection and compliance support. Vision and strategic direction Rachel Jin, Chief Enterprise Platform Officer at Trend Micro, outlined the company's vision for security operations: "Agentic SIEM is a major stepping stone to our long-term vision for full, AI-driven SecOps. It's a future in which security teams will have more time to work on strategic tasks, safe in the knowledge that our agentic AI has their backs. With this launch, Trend is once again laying down a marker for cybersecurity innovation and global market leadership." The newly launched SIEM is intended to allow security professionals to devote more time to strategic tasks, shifting the burden of low-level monitoring and data sifting onto automated AI-driven systems. Use cases and integration The potential applications for the agentic SIEM include threat detection and response, where it replaces manual log monitoring with autonomous data analysis and anomaly detection to decrease the time required to detect and address cyber threats. For compliance support, the system combines long-term data retention with advanced search capabilities, designed to help organisations efficiently meet audit and regulatory requirements. Incident investigation is another area where the technology is expected to have a significant impact, as it automates data correlation from multiple sources, accelerating investigation timelines and enhancing the accuracy of findings. Additionally, the company highlights the strategic opportunity in combining the agentic SIEM with its digital twin technology, allowing users to proactively manage and mitigate risks affecting virtual models across highly regulated sectors including healthcare, supply chain management, predictive maintenance, and smart building infrastructure. Trend Micro aims for the solution to enhance both operational resilience and compliance support for organisations adapting to increasingly complex cyber threats.


Techday NZ
4 days ago
- Techday NZ
Trend Micro's Zero Day Initiative marks two decades of impact
Trend Micro's Zero Day Initiative (ZDI) is marking its twentieth year of reporting and coordinating disclosures of software vulnerabilities across the digital landscape. The ZDI claims the position as the world's largest vendor-agnostic bug bounty programme, having helped to identify and disclose thousands of software security flaws since its founding in 2005. According to data referenced by the company, the ZDI contributed to the responsible disclosure of 73 per cent of all reported vulnerabilities in 2024, exceeding the total from all other participating vendors combined. The bug bounty programme incentivises security researchers globally to uncover zero-day vulnerabilities in widely used products and to submit them in exchange for financial rewards. By working with vendors ahead of public disclosure, the ZDI aims to close security gaps before malicious actors can exploit them. One of the notable features for Trend customers is early access to virtual patches for zero-day threats. These interim security fixes are distributed, on average, over two months in advance of the release of official vendor updates. This provides an extended window of protection as vendors work to develop and test their formal patches. "Our top priority is empowering our customers to take a proactive approach to cybersecurity. The Zero Day Initiative is one of the best tools we have to stay ahead of cybercriminals, and it's one of a kind. Nobody else in the industry can protect their customers as far in advance as we do." This was stated by Mick McCluney, ANZ Field CTO at Trend Micro, who emphasised the significance of proactive approaches enabled by the ZDI's work. The initiative's history began in 2005 when it was established by TippingPoint, then a division of 3Com. Initially, it focussed on bringing together the security research community, providing a framework for researchers to report zero-day bugs responsibly by offering financial incentives. Two years later, the Pwn2Own competition was launched, challenging teams of researchers to discover vulnerabilities in specific software and operating system categories against the clock. Trend Micro took over the ZDI in 2016 following its acquisition of TippingPoint. Today, the programme comprises more than 450 dedicated researchers across 14 global threat centres, supported by a broader community of over 19,000 vulnerability researchers. The ZDI has played a role in several major security events over the past two decades. For example, its researchers uncovered issues with a patch intended to fix a LNK file vulnerability exploited by the Stuxnet worm, prompting Microsoft to develop a subsequent patch. Similarly, collaborative research with Microsoft led to the award of USD $125,000 to original ZDI researchers for identifying a method to bypass Internet Explorer's defences; this sum was subsequently donated to charity, and the technique went on to earn a patent. Other notable research successes include the identification of two zero-day vulnerabilities in Apple's QuickTime for Windows product, which resulted in Apple discontinuing support for the software and ZDI advising users to uninstall it. The ZDI's investigative output has also contributed to disrupting covert operation campaigns such as Black Energy APT, which has targeted Ukraine on multiple occasions. In 2023, a researcher associated with the ZDI was recognised with a Pwnie award for "most under-hyped research" after discovering a previously unreported exploit technique called activation context cache poisoning. The ZDI's operations not only benefit Trend Micro's client base but also contribute to improved security outcomes more broadly, by ensuring that vulnerabilities in widely used products are fixed before hostile actors can take advantage. The bug bounty scheme is credited with encouraging vendors to implement more robust security practices and to address security flaws ahead of public exploitation. As one of the larger vendor-neutral vulnerability research communities, ZDI continues to rely on its global network of researchers, ethical hacking competitions such as Pwn2Own, and partnerships with vendors, to fulfil its remit of identifying and coordinating the remediation of critical security flaws.