{"id":2248,"date":"2017-03-16T12:31:19","date_gmt":"2017-03-16T10:31:19","guid":{"rendered":"http:\/\/www.infocomsecurity.gr\/?page_id=2248\/"},"modified":"2017-03-16T12:31:19","modified_gmt":"2017-03-16T10:31:19","slug":"trend-micro-xgen-machine-learning-technology-against-known-and-unknown-threats","status":"publish","type":"page","link":"https:\/\/www.infocomsecurity.gr\/en\/trend-micro-xgen-machine-learning-technology-against-known-and-unknown-threats\/","title":{"rendered":"Trend Micro XGEN \u2013 Machine Learning technology against KNOWN and UNKNOWN threats"},"content":{"rendered":"<p>Maximize protection with multiple user protection techniques to eliminate security gaps across any user activity and any endpoint. Our connected threat defense framework constantly adapts to protect against future attacks, and evolves to find new ransomware and other unknown threats by automatically sharing threat intelligence amongst the security layers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maximize protection with multiple user protection techniques to eliminate security gaps across any user activity and any endpoint. Our connected threat defense framework constantly adapts to protect against future attacks, and evolves to find new ransomware and other unknown threats by automatically sharing threat intelligence amongst the security layers.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-2248","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/2248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/comments?post=2248"}],"version-history":[{"count":1,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/2248\/revisions"}],"predecessor-version":[{"id":2249,"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/pages\/2248\/revisions\/2249"}],"wp:attachment":[{"href":"https:\/\/www.infocomsecurity.gr\/en\/wp-json\/wp\/v2\/media?parent=2248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}