11/9/2017 12:08:15 PM
SlashNext launches AI internet threat protection system
Web Threat Protection,Web Anti-Virus Platform,Web Security Platform
https://appdevelopermagazine.com/images/news_images/SlashNext-Launches-AI-Internet-Threat-Protection-System-App-Developer-Magazine_c91g82cj.jpg
App Developer Magazine

SlashNext launches AI internet threat protection system



Christian Hargrave Christian Hargrave in Security Thursday, November 9, 2017
35,295

AI Internet access threat protection solution has been released by SlashNext to help fill the gaps that other web security platforms may miss.

SlashNext announced the company’s broad market release of the SlashNext Internet Access Protection System to protect organizations from cross platform social engineering and phishing, malware, exploits and callback attacks. The system goes beyond first generation signature-based and second generation sandbox-based technologies and deploys artificial intelligence and cognitive thinking to stop these Internet attacks targeting unsuspecting employees as their entry points.

Automatic software updates and enhanced security offered in modern browsers prevent most software exploits such as buffer overruns and privilege escalations, but social engineering and phishing attacks exploit human vulnerabilities by deceiving victims into taking actions that will breach their company and their connected client’s networks. In fact, social engineering and phishing attacks are the fastest growing security threat for organizations today, representing 43% of all Internet access threats, nearly double that of malware and viruses, according to the Verizon Data Breach Digest.  

“Social engineering and phishing attacks are becoming the prime attack vector since cyber-criminals realize unsuspecting people create the easiest way to bypass traditional anti-virus and sandbox technologies,” said Fran Howarth, Senior Analyst with Bloor Research. “A new approach to Internet threat detection is needed. SlashNext answers that need, using cognitive computing technologies that mirror human learning to enable systems to stop Internet threats targeting a variety of operating systems such as Windows, Linux, OSX, Android and iOS.”

SlashNext threat detection features include:

  • A cross platform protocol analysis engine that processes gigabits of Internet bound traffic in real-time to extract a complex set of artifacts. These artifacts are essentially the telltale signs of a malicious attack

  • The artifacts are further processed by a cognitive computing machine that uses massive cloud computing power to convert these features into clear Indicators of Compromise (IOCs)

  • The IOCs are then handed over to hundreds of reasoning engines that behave like a team of decision-makers working together to reach a single verdict, “100% Malicious” or “Not Malicious”

  • Once a decision is made, the final outcome is shared back with all the decision makers as part of a peer feedback mechanism that gives the system its unique self-learning capability.


Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE

The necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM and Linux on z Systems. 

A new way to manage your development projects

Learn the best ways to organize your app development projects, and keep code straight, clients happy, and breathe a easier through launches.
 

The Latest Nerd Ranch Guide (3rd Edition) to Android Programming

Write and run code every step of the way, using Android Studio to create apps that integrate with other apps, download and display pictures from the web, play sounds, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development.

Starting your own app business?

How to create a profitable, sustainable business developing and marketing mobile apps.



Comments

There are no comments yet, be the first to leave your remarks.

Leave a Reply