TrendAI™ Companion is an AI-powered cybersecurity adviser integrated into TrendAI Vision One™ to assist in investigating, analyzing, and responding to security incidents and alerts.
Companion provides quick access to threat intelligence, attack surface insights, and
vulnerability data, and can help your organization monitor cloud and container environments,
track compliance, and assess overall security posture. Companion also supports SOC
investigations, endpoint and identity visibility, and email protection analysis.
To get started, click the Companion icon (
) and type a prompt in the session window.
What Companion can do for you
|
Action
|
Description
|
Sample user prompt
|
|
Investigate threats and campaigns
|
Ask about active threat campaigns, threat actors, TTPs, IoCs, and intelligence reports,
including whether your environment is impacted.
|
What are the top ten active threat campaigns currently and is my environment impacted?
|
|
Assess your attack surface
|
List exposed assets including devices, accounts, IPs, cloud assets, and local applications,
and identify high-risk users.
|
List the exposed assets in my organization.
|
|
Prioritize vulnerabilities
|
Find CVEs affecting your assets, identify the most vulnerable resources, and get remediation
guidance.
|
What are the vulnerabilities currently affecting my assets?
|
|
Review cloud security posture
|
Check connected cloud accounts, cloud security check findings, top risky checks, compliance
scores, and trends across frameworks.
|
Give me a list of connected cloud accounts and assess my compliance pass rate across
frameworks.
|
|
Monitor container security
|
View Kubernetes and ECS clusters, running container images, and detected image vulnerabilities.
|
Give me a list of my Kubernetes and ECS clusters, as well as running container images.
|
|
Investigate Workbench alerts
|
Retrieve alert details, impact scope, and IoCs to accelerate SOC investigations.
|
Investigate this Workbench alert (alert ID) for me.
|
|
Check endpoint and identity activity
|
Query who signed into endpoints, review endpoint task status, and look up failed sign-ins.
|
Check who signed into this endpoint (endpoint ID) during the last seven days and tell
me which users had failed sign-ins.
|
|
View email protection coverage
|
List email accounts, domains, and servers under your email protection solutions.
|
Analyze my current email protection coverage and list the accounts, domains, and servers.
|
|
Analyze sandbox reports
|
Search sandbox analysis reports by file hash.
|
Analyze this file hash (hash ID) in my sandbox analysis report.
|
|
Get real-time information
|
Companion searches the internet to supplement answers with current external data.
|
What are the current AI trends in 2026?
|
|
Manage and plan credit usage
|
Review your credit balance and estimated drawdown for the current month, compare actual
and planned usage, and get recommendations on how to maximize security coverage based
on your credit requirements.
|
What is my estimated credit drawdown for the current month?
|
