Story image

New cloud tech helps businesses avoid data breaches

05 Dec 2017

Today, security teams are under more pressure than ever before to protect their organisations - as cyber threats continue to increase in complexity, intelligence and volume.

On top of this, enterprises are faced with a major challenge – finding enough qualified security people to do the job.

Additionally, security teams just can’t afford to spend time on extensive manual threat-hunting exercises or sourcing and managing additional security product.

So, what do they do?

Introducing CloudAI – an exciting new piece of technology from LogRhythm.

CloudAI is an advanced cloud-based security analytics offering that uses artificial intelligence (AI) to detect advanced threats that employ unknown attacks and unknown methods.

The tech can automate an extensive range of tasks – including incident response, platform administration and, of course, threat detection.

This provides security teams with instant visibility into emerging and active under-based threats.

What’s particularly exciting is that CloudAI is powered by self-evolving analytics – which means the platform actually learns and evolves as it works to continuously improve the accuracy of threat detection and minimise response time.

When combined with artificial intelligence techniques, such as unsupervised machine-learning, Cloud AI detects emerging and advanced threats based on the deep analysis of observed activities and behavioral shifts.

Ultimately, CloudAI’s high-accuracy threat detection is designed to reduce false positives and associated alarm fatigue, enabling security personnel to focus on prioritised risks and high-value tasks, driving greater efficiency in the security operations center (SOC).

CloudAI expands the company’s existing user and entity behavior analytics (UEBA) offerings and works in conjunction with LogRhythm’s existing scenario-based analytics solutions as well as an extensive library of field-proven threat models.

As a result, CloudAI can detect the known tactics, techniques and procedures of threat actors, providing customers with increased protection from threats that use both known and unknown methods.

Simply put, CloudAI helps security teams do their jobs better. 

As Tyler Warren, the senior security architect from Prologis, a real estate investment company, puts it, “My team simply can’t afford to waste time pursuing false positives. CloudAI does the time-consuming work for us, allowing us to focus on the things that really matter.”

Warren says, “CloudAI has allowed us to become more successful in detecting user-based threats that would have previously eluded us without the benefit of blind luck or manually sifting through an avalanche of forensic data.”

So, what are you waiting for?

Click here to get started with LogRhythm today. 

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.