sb-au logo
Story image

New cloud tech helps businesses avoid data breaches

05 Dec 2017

Today, security teams are under more pressure than ever before to protect their organisations - as cyber threats continue to increase in complexity, intelligence and volume.

On top of this, enterprises are faced with a major challenge – finding enough qualified security people to do the job.

Additionally, security teams just can’t afford to spend time on extensive manual threat-hunting exercises or sourcing and managing additional security product.

So, what do they do?

Introducing CloudAI – an exciting new piece of technology from LogRhythm.

CloudAI is an advanced cloud-based security analytics offering that uses artificial intelligence (AI) to detect advanced threats that employ unknown attacks and unknown methods.

The tech can automate an extensive range of tasks – including incident response, platform administration and, of course, threat detection.

This provides security teams with instant visibility into emerging and active under-based threats.

What’s particularly exciting is that CloudAI is powered by self-evolving analytics – which means the platform actually learns and evolves as it works to continuously improve the accuracy of threat detection and minimise response time.

When combined with artificial intelligence techniques, such as unsupervised machine-learning, Cloud AI detects emerging and advanced threats based on the deep analysis of observed activities and behavioral shifts.

Ultimately, CloudAI’s high-accuracy threat detection is designed to reduce false positives and associated alarm fatigue, enabling security personnel to focus on prioritised risks and high-value tasks, driving greater efficiency in the security operations center (SOC).

CloudAI expands the company’s existing user and entity behavior analytics (UEBA) offerings and works in conjunction with LogRhythm’s existing scenario-based analytics solutions as well as an extensive library of field-proven threat models.

As a result, CloudAI can detect the known tactics, techniques and procedures of threat actors, providing customers with increased protection from threats that use both known and unknown methods.

Simply put, CloudAI helps security teams do their jobs better. 

As Tyler Warren, the senior security architect from Prologis, a real estate investment company, puts it, “My team simply can’t afford to waste time pursuing false positives. CloudAI does the time-consuming work for us, allowing us to focus on the things that really matter.”

Warren says, “CloudAI has allowed us to become more successful in detecting user-based threats that would have previously eluded us without the benefit of blind luck or manually sifting through an avalanche of forensic data.”

So, what are you waiting for?

Click here to get started with LogRhythm today. 

Story image
IBM integrates Okta identity solutions to cloud offerings
“We’re excited to formalise the partnership to provide our joint customers with the technology to help secure their organisations.”More
Story image
Marriott International reports breach affecting 5.2 million customers
Marriott said in statement that an ‘unexpected’ amount of guest information may have been accessed in mid-January this year, using the login credentials of two employees at one of the company’s franchise properties.More
Download image
How to make authentication as painless as possible
Multi-factor authentication seems to be the standard in top-end security authentication systems. But even MFA has its drawbacks. Find out how RSA SecurID provides the best authentication out there. More
Story image
PMT Security launches body-temp scanning solution for enterprise, Seadan to distribute
"It was a no-brainer for us to choose our trusted partners Seadan. We engaged and took advice from them during the decision-making process to find the best UNV product to bring to market."More
Story image
Interview: Ping Identity exec on why security system updates are critical during COVID-19
Techday spoke with Ping Identity country manager for A/NZ and Japan, Ashley Diffey, on how zero-trust is favourable over perimeter-based security, and what the changes in work mean for businesses in a post-COVID-19 world.More
Link image
Take advantage of free multi-factor authentication as you work remotely
Cybersecurity is shaping up to be one of the most important areas to consider while working from home. Leverage biometrics and password authentication for free with RSA.More