Page 85 - CSEW
P. 85

Cognitive Threat Analytics: Automatically

      Identify a Possible Breach






                                                                                      11 111 0 010 01100 01000   Reduced time
                        11 111 0 010 01100 01000                                     010 01000 11110 100   0110  to discovery
                        01000 01000111  0100  11                                      11 111 0 010 01100 01000   Active, continuous
                                                                                                                 monitoring to stop the
                                                                                      01000 01000111  0100  11   spread of an attack
                                                                                     010 01000 11110 100   0110
                                                                                      01000 01000111  0100  11
                                                                                                                 Normal… or not?
                                                                                     010 01000 11110 100   0110  Spots symptoms of
                                                                                      11 111 0 010 01100 01000   infection using behavioral
                                                                                                                 anomaly detection
                                                                                      01000 01000111  0100  11   algorithms and trust
                                                                                      01000 01000111  0100  11   modeling
                                                                                     010 01000 11110 100   0110
                                                                                      11 111 0 010 01100 01000   Security that learns
                                                                                                                 Uses machine learning and
                                                                                                                 big data analytics to learn
                                                                                                                 from what it sees
                                                                                                                 and adapt over time


                                                                                                                 No more rule sets
                         Behavior                       Machine                          Anomaly                 Discovers threats on its
                                                                                                                 own…just turn it on
                         Analysis                       Learning                        Detection



      © 2016 Engage ESM All Rights Reserved                                                                                             94
   80   81   82   83   84   85   86   87   88   89   90