HackDig : Dig high-quality web security articles for hackers

Artificial Intelligence, disruptive innovation in cybersecurity

2020-10-22 06:27
technologies-adaptive-defense

In the current reality in which the sheer number, professionalization, and sophistication of adversaries has forced organizations to bolster security policies and develop specific processes to prevent, detect, investigate, contain, and eradicate technologically advanced cyberattacks, Artificial Intelligence has burst onto the cybersecurity scene.

AI has, in recent years, infiltrated almost every walk of human life, or at least those in which data is an essential component. This technology, which aims to emulate the cognitive functions of human intelligence, enables a system to process and interpret information, learn from it, and use and adapt that knowledge to achieve the goals for which it was designed. Cybersecurity is an area that has been improved by this technology, but it has also been affected in other ways. While substantial improvement has been made to information management processes, digital threats have also increased due to the dynamic capacity that AI offers.

Discover Panda Adaptive Defense 360 Technologies

Time: a critical concept

Lack of knowledge is one of the great advantages that plays in favour of adversaries targeting cyberattacks at businesses. If an organization does not have sufficient IT professionals or specialized solutions to respond to advanced cybersecurity issues, it is highly likely that it has already suffered intrusions or attacks that it has yet to notice. By applying Artificial Intelligence and Deep Learning algorithms in cybersecurity, companies can gain time, which is a critical concept. As we have seen that detecting suspicious behavior or an intrusion as it happens is not always possible, where a cyberattack has already begun to deploy, keeping mean time to respond (MTTR) as low as possible will be key to mitigating risks and minimizing potential damage.

Zero-Trust Application Service

It is clear then that the application of artificial intelligence in cybersecurity processes is varied and it is without doubt a technology that will improve detection and prevention processes, as well as delivering effective tools to reduce risk exposure times. At Panda Security, a WatchGuard Brand, our response to the most advanced cybersecurity demands is through cloud-based solutions and services such as the Zero-Trust Service, which leverages the cybersecurity benefits of AI. A managed service is included as part of the Panda Adaptive Defense and Adaptive Defense 360 license which, by classifying all objects either as trusted or malware, only permits trusted items to be run on an endpoint.

The Zero-Trust Application Service has three key components:

  1. Continuous monitoring of endpoint activity from a cloud-native platform.
  2. Automatic classification based on IA: the real-time IA classification system is self-sufficient and scalable to large volumes of files, without depending on end user input.
  3. Risk-based application control. This refers to the operating modes of the protection agent running on endpoints. The two protection levels are hardening mode and lock mode.

AI forms the basis of the most advanced cybersecurity and cyberthreat intelligence solutions, and the relationship between this technology and Panda Collective Intelligence is key to the operation of the new protection model, increasing the efficacy of the Zero-Trust Application Service. This cloud repository is continuously fed by the AI system as well as expert analysts, and receives constant queries from Panda Security solutions and services before any processes are executed.

Find out more about the Powerful Detection and Reliable Mitigation of Adaptive Defense 360 Technology here.

The post Artificial Intelligence, disruptive innovation in cybersecurity appeared first on Panda Security Mediacenter.


Source: byc-noitavonni-ecnegilletni-laicifitra/esnefed-evitpada/retnecaidem/ne/moc.ytirucesadnap.www

“Artificial Intelligence, disruptive innovation in cybersecurity”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Tools

Tag Cloud