Trend Micro has unveiled a new cyber resilience model that utilizes digital twin technology and agentic AI, enabling organizations to proactively defend against cyber threats by simulating IT and OT environments in real-time.
The model, built on Nvidia’s accelerated computing stack and AI Enterprise software, creates continuously updated simulations of enterprise systems, providing a virtual testbed for security teams to model attacker behavior and experiment with new tools without disrupting operations. These virtual environments allow organizations to test new security tools in a virtual clone of their infrastructure or simulate critical failure events to understand potential disruptions across connected systems.
The cyber resilience model supports a range of scenarios, including adversary simulations, business continuity testing, and investment decision modeling. By facilitating threat simulation, defense validation, and policy adjustments before actual attacks occur, the model enables organizations to stay ahead of adversaries and harden their environments. Trend Micro emphasizes that this marks a shift from periodic assessments to continuous, intelligent simulation, transitioning security practices from static and reactive to dynamic and predictive.
Beyond threat simulation, the model also supports informed security investments and operational planning. Decision-makers can evaluate new tools, policies, or architecture changes in the simulated environment to assess their impact before implementing them in live systems. This allows organizations to make informed decisions and optimize their security posture.
According to Rachel Jin, chief enterprise platform officer at Trend Micro, “Enterprises are struggling to defend complex, dynamic infrastructure environments from highly adaptive, AI-powered adversaries. Rapid shifts in threat actor tactics and IT infrastructure mean reactive, point-in-time risk assessments are no longer fit for purpose. Our digital twin technology empowers customers to simulate threats and safely validate security controls without touching production systems, to finally close the gap between digital transformation and defensive readiness.”




