1 any app real- time any user Unknown Threats
Key Features 2 Global Scale Grid ComputingAutomatic Correlation of Any DataDetection of Behavioral Anomalies in Any App
Acquire: live network, app & 3 rd party data Analyze: correlations & anomalies to find kill chain Automate: defense in-depth & incident response Advanced Persistent Threat Defense 3 AcquireAnalyzeAutomate
A big number 1,461,501,637,330, 902,918,203,684, 832,716,283,019, 655,932,542,976 4
Analysis: Artificial Intelligence at work ClustersCorrelationsClassificationsAnomalies
Flexible: effective for any binary data Incremental: can even discard raw data No Assumptions: real-time data-derived modelling Analysis: Key Features 6
Behavioral anomalies we can find
Thank You – Rob Bird