Enterprise Cybersecurity in the CES Spotlight

Feb. 13, 2025
Two solutions - one from a startup and the other from established powerhouses - highlighted from the show floor

This article originally appeared in the February 2025 issue of Security Business magazine. Feel free to share, and please don’t forget to mention Security Business magazine on LinkedIn and @SecBusinessMag on Twitter.

The key to the Hypergate solutions is an enterprise mobility management system (EMM), which many companies and organizations already have in place. Current supported EMMs include: Microsoft Intune, Ivanti Mobileiron, SOTI Mobicontrol, 42Gears, Samsung Knox, VMware Workspace ONE, BlackBerry UEM, KACE Solutions, and PushManager.

The EMM distributes Hypergate securely to company and/or personal smartphones and allows the organization to manage it. The solution runs only on the mobile devices and requires no cloud or other web services. Through a VPN, Hypergate then connects with the organization’s Active Directory securely – authenticating just once via password and/or biometrics. Once authenticated, Hypergate can open all the apps an organization deems necessary through the power of Active Directory. It also empowers users to reset and change their password directly on their devices.

Trend Micro and Intel Announce Collaboration

At CES, Trend Micro announced a new collaboration with Intel to help joint enterprise customers protect critical systems from stealthy threats, including fileless malware and advanced ransomware.

According to a press release, when Trend Micro's AI-powered Trend Vision One proactive security platform and Intel's technology are used together, the integrated solution can better determine if encryption behavior is legitimate – such as a user backing up files – or malicious, ensuring the appropriate action is taken to protect critical systems. The partnership creates powerful tools to detect and respond to ransomware and fileless attacks before they can cause damage.

"Threat actors are increasingly targeting endpoints with sophisticated attacks that evade traditional software-based security,” Intel VP Carla Rodriguez explained in the press release. “Trend Micro's integration of Intel Threat Detection Technology provides a hardware-accelerated detection layer to uncover these stealthy threats.”

Fileless attacks are particularly dangerous as they rely on in-memory execution, reside in the registry, or abuse legitimate tools like PowerShell and Windows Management Instrumentation.

About the Author

Paul Rothman | Editor-in-Chief/Security Business

Paul Rothman is Editor-in-Chief of Security Business magazine. Email him your comments and questions at [email protected]. Access the current issue, full archives and apply for a free subscription at www.securitybusinessmag.com.