Views:
May 4, 2026—Risk events powered by TrendAI™ Zero Day Initiative™ now appear in Vulnerability Management and Threat and Exposure Management when a zero-day vulnerability affecting software in your environment is identified. ZDI-powered events generate before a CVE is publicly disclosed, giving you time to prepare, monitor, and isolate affected assets ahead of any patch.
To help protect your assets, post-exploitation detection models monitor flagged assets for suspicious behavior such as shell drops or lateral movement, and trigger workbench alerts when activity is observed. For network-based vulnerabilities, virtual patching is available through TippingPoint Intrusion Prevention rules that block exploitation attempts at the network level while you wait for a vendor patch. For Windows application vulnerabilities, application blocking lets you prevent vulnerable application versions from launching on protected endpoints.
To use Application Blocking, endpoints must be protected by TrendAI Vision One™ Endpoint Security with Windows endpoint protection enabled.
For more information, see Vulnerability Management.
Cyber Risk Exposure ManagementContinuous Risk ManagementVulnerability Management
Cyber Risk Exposure ManagementContinuous Risk ManagementThreat and Exposure Management