Download PDF version Contact company

Acronis, a global pioneer in cyber protection, announced the enhancement of its security defence against advanced fileless attacks using Intel® Threat Detection Technology (Intel® TDT) leveraging the Intel® integrated GPU to offload memory scanning operations from the CPU. Acronis is the latest cyber protection company to integrate Intel® TDT to enrich its security products. 

With cyber threats evolving and growing on a daily basis, Acronis researchers have witnessed new types of malware and attack vectors on enterprises such as polymorphic malware and fileless attacks. Many threats utilise an in-memory-only approach which can be hard to detect.

Intel® TDT technology

Intel® TDT technology allows Acronis cyber protection solutions to free resources while scanning HDD and memory resulting in improved system performance. Acronis researchers found that while scanning all the processes in system memory on supported CPUs, Intel® TDT reduced the load on the CPU 2.4× times, by offloading the job to the Intel® integrated GPU.

Acronis solution combines complete single-agent cyber protection with Intel® TDT

The Acronis solution combines complete single-agent cyber protection with Intel® TDT. This enhancement results in lower CPU utilisation which allows more compute capacity for productivity and office software used by Acronis end customers while compute-intensive security operations run in the Intel® integrated GPU.

The innovation of Intel® TDT will be available through Acronis Cyber Protect Cloud, Acronis Cyber Protect, and Acronis Cyber Protect Home Office solutions.

Integration of Intel® TDT into Acronis cyber protection solutions

The integration of Intel® TDT into Acronis cyber protection solutions is a logical step to meet the needs of our users," said Patrick Pulvermueller, CEO at Acronis. “During the last year, we observed that almost 50% of attacks detected were fileless. The use of this Intel technology is a great milestone as we continue to optimise and enhance our anti-malware engine.”

Patrick Pulvermueller adds, “Through our collaboration with Acronis to integrate Intel® Threat Detection Technology into their cyber protection solutions, customers of all sizes that utilise Intel vPro® can perform frequent and highly performant memory scanning."

Enhanced cyber security

Acronis provides its users with the ability to take back control and overcome complexity

"This is a great benefit for our mutual customers as we help them stay ahead of increasingly sophisticated threats,” said Carla Rodríguez, Vice President and General Manager, Ecosystem Partner Enabling at Intel.

As the IT world grows in sophistication and continues its migration to the cloud, more stress has fallen on security teams with less-integrated technology, creating complexity and unintentional blind spots in security systems,” said Research Vice President of Security and Trust, Michael Suby at IDC.

Recent IDC survey

Michael Suby adds, “According to a recent IDC survey of 1,015 security professionals in North America, this is particularly the case for smaller organisations who are less equipped to effectively operate separate products from multiple vendors or benefit from a position of strength in negotiating with multiple vendors. As such, they are more likely to resonate with an integrated hardware and software approach to endpoint security.”

Acronis provides its users with the ability to take back control and overcome complexity with an integrated platform which results in greater operational efficiency.

By implementing an integrated solution like Acronis Cyber Protect Cloud, organisations can reduce the time that security teams spend on various operational activities, lower training costs, reduce the complexity in their environment by minimising the number of tools managed, and ultimately drive business growth.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?