{"id":92373,"date":"2024-10-22T12:12:28","date_gmt":"2024-10-22T04:12:28","guid":{"rendered":"https:\/\/version-2.com\/?p=92373"},"modified":"2024-10-14T12:15:29","modified_gmt":"2024-10-14T04:15:29","slug":"optimized-malware-detection-from-eset-intel","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/optimized-malware-detection-from-eset-intel\/","title":{"rendered":"Optimized Malware Detection from ESET &#038; Intel"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"92373\" class=\"elementor elementor-92373\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c10998537\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/Intel_and_ESET.png\" alt=\"\" width=\"250\" height=\"250\" \/><br \/><\/em><\/p><\/div><div><div><div id=\"content-c11002676\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>ESET has been collaborating with Intel for several years to deliver endpoint security software that can take advantage of hardware-based security and performance features\u2014a major advantage in the battle to detect advanced ransomware and other constantly evolving threats.\u00a0<\/p><\/div><div id=\"content-c11002677\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Why businesses need hardware layer security on their endpoints<\/h3><\/header><p>Despite all efforts, ransomware attacks continue to escalate in frequency and severity, with cybercriminals\u2019 extortion tactics becoming <a href=\"https:\/\/www.wired.com\/story\/state-of-ransomware-2024\/\" target=\"_blank\" rel=\"noopener\">progressively more brutal<\/a>. Ransomware and malware in general are also becoming more sophisticated and better able to avoid detection by conventional means.<\/p><p>For example, recent ransomware variants can rewrite themselves once they infiltrate a victim\u2019s environment, thus dodging traditional signature-based detection tools. Another emerging ransomware capability is hiding inside virtual machines.<\/p><p>These advanced obfuscation techniques are creating gaps in cybersecurity coverage. This is where hardware-based malware detection comes into play\u2014detecting both known and novel malware to keep companies safer. While malware software always leaves a \u201cfingerprint\u201d when it executes, hardware-based monitoring of CPU telemetry can flush out even the most sophisticated ransomware, providing elevated immunity to many detection bypasses.<\/p><p>Mutual customers have benefitted from ESET\u2019s collaboration with Intel since March 2022, when ESET rolled out its <a href=\"https:\/\/www.eset.com\/us\/business\/small-and-medium\/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=_us_eng_b2b_google_s_br_rev_gen_mtd_products-2022_always-on_search&amp;adgroupname=eset-protect-advanced&amp;keyword=eset%20protect&amp;matchtype=e&amp;creative=629807638758&amp;network=g&amp;networkcategory=%5bsearch%5d&amp;device=c&amp;sfdccampaignid=7011n000000JwSZAA0&amp;gad_source=1&amp;gbraid=0AAAAADualpHYZf0Ww689si4R95uIg_Xag&amp;gclid=CjwKCAjw8rW2BhAgEiwAoRO5rGn2xGp1O8S6pm1IhfXsRcg5Y8S-bQ6iyW8wGtlmYJXwggppQBKeQBoC-BgQAvD_BwE&amp;gclsrc=aw.dshttps:\/\/www.eset.com\/us\/business\/small-and-medium\/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=_us_eng_b2b_google_s_br_rev_gen_mtd_products-2022_always-on_search&amp;adgroupname=eset-protect-advanced&amp;keyword=eset%20protect&amp;matchtype=e&amp;creative=629807638758&amp;network=g&amp;networkcategory=%5bsearch%5d&amp;device=c&amp;sfdccampaignid=7011n000000JwSZAA0&amp;gad_source=1&amp;gbraid=0AAAAADualpHYZf0Ww689si4R95uIg_Xag&amp;gclid=CjwKCAjw8rW2BhAgEiwAoRO5rGn2xGp1O8S6pm1IhfXsRcg5Y8S-bQ6iyW8wGtlmYJXwggppQBKeQBoC-BgQAvD_BwE&amp;gclsrc=aw.ds\" target=\"_blank\" rel=\"noopener\">ESET PROTECT<\/a> multilayered cybersecurity suite integrated and automatically configured with<a target=\"_blank\"> Intel\u00ae Threat Detection Technology<\/a> (Intel\u00ae TDT).\u00a0 Today, approximately 90% of ESET end users are running on Intel-based systems. Residing\u00a0 on the Intel CPU, the combined solutions use AI to analyze CPU telemetry to provide advanced detection against new and existing strains of malware\u2014especially ransomware.<\/p><\/div><div id=\"content-c11002678\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">The latest from ESET and Intel: Leveraging hybrid processors to optimize performance<\/h3><\/header><p>While the need for advanced, AI-driven threat detection grows by the day, cybersecurity and IT leaders look to balance new technology deployments against the performance and productivity challenges brought on by remote and hybrid work scenarios. Endpoint security tools must keep a low profile to avoid slowing down other tasks and\/or draining users\u2019 batteries.<\/p><p>This is why ESET and Intel have expanded their work together, now offering advanced endpoint solutions that take advantage of Intel\u2019s latest hybrid processor architecture. The newer generations of Intel\u00ae Core\u2122 and Intel\u00ae Core\u2122 Ultra processors have two kinds of cores:<\/p><ol><li>Performance cores, which compute at the highest speeds<\/li><li>Efficient cores, which compute relatively fast but with much lower energy consumption<\/li><\/ol><p>How is hybrid chip architecture relevant to cybersecurity incident detection and response? If you are trying to detect the presence of malware, you probably want that operation to run as fast as possible. So, you would run it on performance cores. But some other cybersecurity processes, such as updates and background scans, can run on efficient cores to save device power and optimize the performance of priority tasks.<\/p><p>By taking advantage of Intel\u2019s hybrid processor architecture to intelligently schedule background workloads on efficient cores when available, ESET endpoint protection solutions can better meet the demands of remote and hybrid work scenarios. Another key benefit discovered in initial testing: battery power savings on laptops running the hybrid aware software have been on the order of 5% to 8%.<\/p><p>According to El\u0151d Kironsk\u00fd, Vice President of Endpoint Solutions and Security Technologies at ESET, \u201cOur endpoint protection product is aware that it is running on a hybrid processor, and it is able to direct different workloads to use either efficient cores or performance cores. Assigning workloads to efficient cores has no negative impact on product performance. In a number of scenarios, performance increases were documented and processes completed faster.\u201d<\/p><p>This new \u201chybrid aware\u201d capability is slated to be released to ESET customers in early December.<\/p><\/div><div id=\"content-c11002679\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Compound benefits for ESET customers running on Intel<\/h3><\/header><p>Low impact to system performance is an area that ESET has always prioritized within its multilayered software architecture and is a key selling point for many of our clients. Leveraging technology that can help with prevention and protection while also preserving performance is a win-win choice.<\/p><p>Likewise, ESET has always advocated a multilayered approach to security. By adding the silicon layer to our security stack, ESET and Intel have reached a new milestone in combatting cyberthreats.<\/p><p>By taking advantage of newly expanded capabilities in the Intel relationship, our customers witness multiple benefits from the joint solution.<\/p><ul><li>Intel TDT\u2019s hardware-level malware detection coupled with its ongoing machine learning improvements are a powerful weapon in the fight against ransomware and other cyberattacks.<\/li><li>The added compute demands from this new hardware-level detection capability are largely being offloaded onto the GPU or efficiency cores, minimizing impacts on system performance and end user productivity.<\/li><li>Because the joint solution activates and operates automatically, it delivers an immediate boost to ransomware protection with no increase in IT complexity or administrative workload.<\/li><\/ul><p>Customers looking to take advantage of next-gen cybersecurity won\u2019t have to wait long for continued innovation from ESET and Intel. We are currently working together to develop new functionalities and tools that take advantage of the neural processing unit (NPU) in Intel Core Ultra processors and expand on ESET\u2019s leadership in AI-native security for AI PCs.<\/p><p>It\u2019s important that we continue to maximize innovation and address tomorrow\u2019s unknown threats through our work with innovation partners, like Intel. It\u2019s these types of collaborations that will empower a safer tomorrow for businesses of all sizes, and we are proud to include them in the ESET technology ecosystem.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ESET has been collaborating with Intel for several year [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[1272,41],"class_list":["post-92373","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-1272","tag-eset"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Optimized Malware Detection from ESET &amp; Intel - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Optimized Malware Detection from ESET &amp; Intel - Version 2\" \/>\n<meta property=\"og:description\" content=\"ESET has been collaborating with Intel for several year [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-22T04:12:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/Intel_and_ESET.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/optimized-malware-detection-from-eset-intel\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Optimized Malware Detection from ESET &#038; Intel\",\"datePublished\":\"2024-10-22T04:12:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/optimized-malware-detection-from-eset-intel\\\/\"},\"wordCount\":891,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/Intel_and_ESET.png\",\"keywords\":[\"2024\",\"ESET\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/optimized-malware-detection-from-eset-intel\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/\",\"name\":\"Optimized Malware Detection from ESET & Intel - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/Intel_and_ESET.png\",\"datePublished\":\"2024-10-22T04:12:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/Intel_and_ESET.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/Intel_and_ESET.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/optimized-malware-detection-from-eset-intel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Optimized Malware Detection from ESET &#038; Intel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Optimized Malware Detection from ESET & Intel - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/","og_locale":"zh_HK","og_type":"article","og_title":"Optimized Malware Detection from ESET & Intel - Version 2","og_description":"ESET has been collaborating with Intel for several year [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/","og_site_name":"Version 2","article_published_time":"2024-10-22T04:12:28+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/Intel_and_ESET.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/optimized-malware-detection-from-eset-intel\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Optimized Malware Detection from ESET &#038; Intel","datePublished":"2024-10-22T04:12:28+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/optimized-malware-detection-from-eset-intel\/"},"wordCount":891,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/Intel_and_ESET.png","keywords":["2024","ESET"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/optimized-malware-detection-from-eset-intel\/","url":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/","name":"Optimized Malware Detection from ESET & Intel - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/Intel_and_ESET.png","datePublished":"2024-10-22T04:12:28+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/Intel_and_ESET.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/Intel_and_ESET.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/optimized-malware-detection-from-eset-intel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Optimized Malware Detection from ESET &#038; Intel"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-o1T","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=92373"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92373\/revisions"}],"predecessor-version":[{"id":92380,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92373\/revisions\/92380"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=92373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=92373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=92373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}