Page 85 - CSEW
P. 85
Cognitive Threat Analytics: Automatically
Identify a Possible Breach
11 111 0 010 01100 01000 Reduced time
11 111 0 010 01100 01000 010 01000 11110 100 0110 to discovery
01000 01000111 0100 11 11 111 0 010 01100 01000 Active, continuous
monitoring to stop the
01000 01000111 0100 11 spread of an attack
010 01000 11110 100 0110
01000 01000111 0100 11
Normal… or not?
010 01000 11110 100 0110 Spots symptoms of
11 111 0 010 01100 01000 infection using behavioral
anomaly detection
01000 01000111 0100 11 algorithms and trust
01000 01000111 0100 11 modeling
010 01000 11110 100 0110
11 111 0 010 01100 01000 Security that learns
Uses machine learning and
big data analytics to learn
from what it sees
and adapt over time
No more rule sets
Behavior Machine Anomaly Discovers threats on its
own…just turn it on
Analysis Learning Detection
© 2016 Engage ESM All Rights Reserved 94