Intelligent CIO Europe Issue 07 | Page 61

////////////////////////////////////////////////////////////////////// FEATURE: ARTIFICIAL INTELLIGENCE Rabih Itani, Regional Business Development Manager – Security, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company to breach the network. Machine learning is a fundamental part of an AI system. Machine learning enables AI to detect patterns in all sorts of data sources and create behaviours based on recognised patterns. How does machine learning improve security? IT teams today are faced with a moving security target. From the devices used by employees to do work, to the locations we work in and the people we send data to, our activities change day by day. It is important to understand, keep up with and protect against these moving goalposts. As is clear nowadays, security is number one on the agenda for CIOs around the world as they move to protect their organisations against the malevolent attackers who are looking to breach the network and typically, steal personal data. This can be a tall order for most IT staff that cannot predict the subtle changes that might take place within their network day-to-day. These could include hundreds of new devices signing up to the network, from employee-owned mobile phones to older temperate sensors, newly connected as part of an IoT strategy. www.intelligentcio.com The scale of the challenge is often just too vast when asking human IT teams to manage the data being shared by incoming and existing devices, which can easily reach into the thousands for a large enterprise. This is where machine learning comes into its own. Using machine learning for UEBA (User Entity and Behavioural Analytics), IT managers can create standard profiles for each device on the network. Sales managers get access to Salesforce anytime, anywhere, finance teams get access to Financial Information Systems using specific devices at specific locations and so on. The profile of each user becomes quickly personalised and as soon as a user or entity behaves in a way that strays outside of their profile, the machine sees it and raises the risk score of that user or entity and may accordingly send an alert, which in many cases will require the user/entity to re-authenticate. In the case of a malevolent attack, the intruder will be isolated from the rest of the network, to limit any potential damage that might have occurred. Machines are capable of analysing millions of individual packets of data, plus thousands of system logs and possibly business context data (such as HR records), making a truly MANY ARTICLES ARE ALREADY PREDICTING THE DEMISE OF HUMAN WORKERS AS A RESULT OF AI MAKING INROADS INTO OUR LIVES BECAUSE WE ARE ON THE VERGE OF TRUE ARTIFICIAL INTELLIGENCE. INTELLIGENTCIO 61