{"id":5729,"date":"2021-09-04T15:01:55","date_gmt":"2021-09-04T15:01:55","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=5729"},"modified":"2021-09-04T15:01:55","modified_gmt":"2021-09-04T15:01:55","slug":"hardware-enhanced-threat-protection","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/","title":{"rendered":"Hardware-enhanced Threat Protection"},"content":{"rendered":"<p>This product brief introduces Intel\u00ae Threat Detection Technology (Intel\u00ae TDT)\u2014a set of technologies that harness hardware telemetry and acceleration capabilities to help identify threats and detect anomalous activity. Intel TDT uses the data gleaned to help identify polymorphic malware, file-less scripts, cryptomining, and other targeted attacks in real time and with minimal end-user impact. Please contact Abrahams Consulting LLC for more information about Intel TDT.<\/p>\n<p><a href=\"https:\/\/stuf.in\/b74tkj\" target=\"_blank\" rel=\"noopener\">View: Hardware-enhanced Threat Protection<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This product brief, brought to you by Abrahams Consulting LLC, introduces Intel\u00ae Threat Detection Technology (Intel\u00ae TDT)\u2014a set of technologies that harness hardware telemetry and acceleration capabilities to help identify threats and detect anomalous activity. Intel TDT uses the data gleaned to help identify polymorphic malware, file-less scripts, cryptomining, and other targeted attacks in real time and with minimal end-user impact.<\/p>\n","protected":false},"author":2,"featured_media":5728,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-5729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hardware-enhanced Threat Protection - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hardware-enhanced Threat Protection - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"This product brief, brought to you by Abrahams Consulting LLC, introduces Intel\u00ae Threat Detection Technology (Intel\u00ae TDT)\u2014a set of technologies that harness hardware telemetry and acceleration capabilities to help identify threats and detect anomalous activity. Intel TDT uses the data gleaned to help identify polymorphic malware, file-less scripts, cryptomining, and other targeted attacks in real time and with minimal end-user impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-04T15:01:55+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Hardware-enhanced Threat Protection\",\"datePublished\":\"2021-09-04T15:01:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\"},\"wordCount\":73,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\",\"name\":\"Hardware-enhanced Threat Protection - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg\",\"datePublished\":\"2021-09-04T15:01:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg\",\"width\":600,\"height\":799},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hardware-enhanced Threat Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hardware-enhanced Threat Protection - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/","og_locale":"en_US","og_type":"article","og_title":"Hardware-enhanced Threat Protection - TechTonic Times","og_description":"This product brief, brought to you by Abrahams Consulting LLC, introduces Intel\u00ae Threat Detection Technology (Intel\u00ae TDT)\u2014a set of technologies that harness hardware telemetry and acceleration capabilities to help identify threats and detect anomalous activity. Intel TDT uses the data gleaned to help identify polymorphic malware, file-less scripts, cryptomining, and other targeted attacks in real time and with minimal end-user impact.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/","og_site_name":"TechTonic Times","article_published_time":"2021-09-04T15:01:55+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Hardware-enhanced Threat Protection","datePublished":"2021-09-04T15:01:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/"},"wordCount":73,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/","name":"Hardware-enhanced Threat Protection - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg","datePublished":"2021-09-04T15:01:55+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/09\/tdt_product_brief_thumb.jpg","width":600,"height":799},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/hardware-enhanced-threat-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hardware-enhanced Threat Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=5729"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5729\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/5728"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=5729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=5729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=5729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}