//////////////////////////////////////////////////////////////////////
FEATURE: ARTIFICIAL INTELLIGENCE
Rabih Itani,
Regional Business
Development
Manager – Security,
Middle East and
Turkey at Aruba,
a Hewlett Packard
Enterprise company
to breach the network. Machine learning is a
fundamental part of an AI system. Machine
learning enables AI to detect patterns in all
sorts of data sources and create behaviours
based on recognised patterns.
How does machine learning
improve security?
IT teams today are faced with a moving
security target. From the devices used by
employees to do work, to the locations we
work in and the people we send data to, our
activities change day by day. It is important
to understand, keep up with and protect
against these moving goalposts.
As is clear nowadays, security is number one
on the agenda for CIOs around the world
as they move to protect their organisations
against the malevolent attackers who are
looking to breach the network and typically,
steal personal data. This can be a tall order
for most IT staff that cannot predict the
subtle changes that might take place within
their network day-to-day. These could
include hundreds of new devices signing
up to the network, from employee-owned
mobile phones to older temperate sensors,
newly connected as part of an IoT strategy.
www.intelligentcio.com
The scale of the challenge is often just
too vast when asking human IT teams to
manage the data being shared by incoming
and existing devices, which can easily reach
into the thousands for a large enterprise.
This is where machine learning comes into
its own.
Using machine learning for UEBA (User
Entity and Behavioural Analytics), IT
managers can create standard profiles for
each device on the network. Sales managers
get access to Salesforce anytime, anywhere,
finance teams get access to Financial
Information Systems using specific devices
at specific locations and so on. The profile
of each user becomes quickly personalised
and as soon as a user or entity behaves in
a way that strays outside of their profile,
the machine sees it and raises the risk score
of that user or entity and may accordingly
send an alert, which in many cases will
require the user/entity to re-authenticate. In
the case of a malevolent attack, the intruder
will be isolated from the rest of the network,
to limit any potential damage that might
have occurred.
Machines are capable of analysing millions
of individual packets of data, plus thousands
of system logs and possibly business context
data (such as HR records), making a truly
MANY ARTICLES ARE ALREADY
PREDICTING THE DEMISE OF HUMAN
WORKERS AS A RESULT OF AI MAKING
INROADS INTO OUR LIVES BECAUSE
WE ARE ON THE VERGE OF TRUE
ARTIFICIAL INTELLIGENCE.
INTELLIGENTCIO
61