{"id":59567,"date":"2025-10-21T00:00:00","date_gmt":"2025-10-21T00:00:00","guid":{"rendered":"urn:uuid:3d1d9377-b99a-15fa-05b3-00bc5f930a3a"},"modified":"2025-10-21T00:00:00","modified_gmt":"2025-10-21T00:00:00","slug":"how-trend-micro-empowers-the-soc-with-agentic-siem","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/","title":{"rendered":"How Trend Micro Empowers the SOC with Agentic SIEM"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-agentic-siem:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/25\/soc-agentic-siem.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Security teams today face mounting pressure: too many alerts, too little context, and not enough time. That\u2019s why, to us, the latest <i>IDC MarketScape: Worldwide Extended Detection and Response (XDR) Software 2025<\/i> report is such a significant milestone. Trend has been named as a leader in the report, which we believe validates our proven track record of helping security teams stay ahead of threats.<\/p>\n<p>But the recognition doesn\u2019t stop at XDR. We believe Trend is setting a new standard for proactive security by expanding the boundaries of modern SecOps with Trend Vision One<sup>TM<\/sup><b>&nbsp;Agentic SIEM<\/b>, built natively into the <b>Trend Vision One\u2122<\/b> platform. By uniting XDR and SIEM, we deliver a single platform where teams can collaborate in one view, merge proactive threat hunting with reactive response, and leverage natural language intelligence for faster, clearer decisions. Through this unified approach, Trend empowers security teams to see more, respond faster, and operate with confidence.<\/p>\n<p><b>Why IDC MarketScape Recognized Trend Micro as a Leader in XDR<\/b>\u202f<\/p>\n<p>According to the IDC MarketScape: \u201cThe Trend Vision One\u2122 platform has a long history as a fabric that provides security analytics for security controls and protections, unified risk insights, and detection and response over multiple surfaces supporting cloud, on-premises, and hybrid deployments. Trend Vision One\u2122 can add insights from multiple layers including endpoint, cloud, email, network, data, and identity, with policy monitoring and enforcement to identify indicators of compromise.\u201d\u202f&nbsp;<br \/><i>IDC MarketScape: Worldwide Extended Detection and Response (XDR) Software 2025, #US52994525IDC, September 2025<\/i><\/p>\n<p>Unlike most vendors that rely on a single sensor such as endpoint, Trend delivers <b>six fully native XDR sensors: <\/b>endpoint, network, email, identity, data, and cloud workload. Each of these is enriched by our leading global threat intelligence that covers the most geographically diverse customer base in the industry. This breadth of native coverage provides:\u202f<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>High-fidelity detections<\/b> across the entire attack surface\u202f<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Contextual risk insights<\/b> through CREM (Cyber Risk Exposure Management)\u202f<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Automated response actions<\/b> that save critical time for SOC analysts\u202f<\/span><\/li>\n<\/ul>\n<p>The result: <b>fewer alerts, sharper decisions, and a SOC always ahead of the attack.<\/b>\u202f<\/p>\n<p><b>Introducing <\/b>Trend Vision One<sup>TM<\/sup> <b>Agentic SIEM: <i>The first Agentic SIEM that thinks in language, not just logs<\/i><\/b><\/p>\n<p>With Agentic SIEM, Trend extends the power of our XDR leadership even further. Purpose-built agents act as teammates for SOC analysts, such as the Schema Mapping Agent, which adapts to dynamic logs, and the Threat Hunting &amp; Intelligence Agent, which turns breaking news into trusted answers in minutes. These work alongside a growing ecosystem of specialized agents, with platform embedded SOAR capabilities such as natural language playbook creation, uniting XDR, SIEM, and SOAR seamlessly all in one platform for an end-to-end supported SOC.\u202f<\/p>\n<p>Traditional SIEMs are often noisy, rigid, and resource-intensive. Our <b>Agentic SIEM<\/b> changes the game with:\u202f<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Trend\u2019s native LLM advantage &#8212; <\/b>Treat your schema like a language, using AI to understand the <i>intent<\/i> behind the data and reduce the need for manual rules.\u202f<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>900+ third-party data source integrations<\/b> \u2013 automated onboarding, flexible retention, and seamless enrichment for XDR\u202f<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Effortless threat hunting &#8212; <\/b>Let <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/ai\/companion.html\">Trend Companion<\/a> take you on an AI-driven threat hunting journey, delivering actionable insights at every step of the way<b>\u202f<\/b>\u202f<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>One console for everything<\/b> \u2013 detections, incidents, vulnerabilities, threat actors, and attack details in a single view with an intelligent contextual foundation no other competitor can match.<\/span><\/li>\n<\/ul>\n<p>As one customer puts it:\u202f<\/p>\n<p>\u201cWith Trend\u2019s SIEM and native XDR telemetry, we now have visibility into behaviors that were previously hidden. Agentic SIEM goes beyond simple log collection\u2014it interprets the data. That\u2019s the key difference between chasing alerts and truly understanding what\u2019s happening in your environment, all in one place and fully contextualized.\u201d\u202f&nbsp;<br \/>\u2014 Cody Lee, Director of Cybersecurity, Weatherford Independent School District\u202f<\/p>\n<p><b>A Platform Approach That We Believe Raises the Bar<\/b>\u202f<\/p>\n<p><b>Trend Vision One\u2122<\/b> unifies XDR, SIEM, SOAR, and CREM seamlessly and without compromise. This approach ensures:\u202f<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Comprehensive visibility across native and third-party sources\u202f<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enriched detection and correlation that reduces noise and speeds investigations\u202f<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Operational efficiency that lets teams focus on what truly matters: preventing breaches\u202f<\/span><\/li>\n<\/ul>\n<p>For security leaders, that means lower risk, more effective teams, and a proactive SOC that never slows down.\u202f<\/p>\n<p><b>The Road Ahead<\/b>\u202f<\/p>\n<p>We believe the IDC MarketScape\u2019s recognition of Trend as a <b>Leader in the XDR report <\/b>underscores what many customers already know: Trend Vision One is proven, differentiated, and leading the way in modern SecOps.\u202f<\/p>\n<p>By delivering both <b>XDR leadership<\/b> and <b>Agentic SIEM innovation<\/b> under one platform, Trend is redefining what security operations can be.\u202f<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/explore\/idc-marketscape-xdr\">Read the IDC MarketScape: Worldwide XDR Software 2025 excerpt and see why Trend Micro was recognized as a leader.<\/a> &nbsp;<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/j\/soc-agentic-siem.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By delivering both XDR leadership and Agentic SIEM innovation under one platform, Trend is redefining what security operations can be. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9588,9511],"class_list":["post-59567","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-consumer-focus","tag-trend-micro-research-cyber-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Trend Micro Empowers the SOC with Agentic SIEM 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Trend Micro Empowers the SOC with Agentic SIEM 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-21T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-agentic-siem:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How Trend Micro Empowers the SOC with Agentic SIEM\",\"datePublished\":\"2025-10-21T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/\"},\"wordCount\":778,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/soc-agentic-siem:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Consumer Focus\",\"Trend Micro Research : Cyber Threats\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/\",\"name\":\"How Trend Micro Empowers the SOC with Agentic SIEM 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/soc-agentic-siem:Large?qlt=80\",\"datePublished\":\"2025-10-21T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/soc-agentic-siem:Large?qlt=80\",\"contentUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/soc-agentic-siem:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-trend-micro-empowers-the-soc-with-agentic-siem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Trend Micro Empowers the SOC with Agentic SIEM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Trend Micro Empowers the SOC with Agentic SIEM 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/","og_locale":"en_US","og_type":"article","og_title":"How Trend Micro Empowers the SOC with Agentic SIEM 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-10-21T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-agentic-siem:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How Trend Micro Empowers the SOC with Agentic SIEM","datePublished":"2025-10-21T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/"},"wordCount":778,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-agentic-siem:Large?qlt=80","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Consumer Focus","Trend Micro Research : Cyber Threats"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/","url":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/","name":"How Trend Micro Empowers the SOC with Agentic SIEM 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-agentic-siem:Large?qlt=80","datePublished":"2025-10-21T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-agentic-siem:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/soc-agentic-siem:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-trend-micro-empowers-the-soc-with-agentic-siem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"How Trend Micro Empowers the SOC with Agentic SIEM"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59567"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59567\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}