Intelligent Tech Channels Issue 16 - Page 50

EDITOR’S QUESTION Cloud based artificial intelligence Security vendors are deploying artificial intelligence solutions into the cloud to use a wider base of analytics and improve threat detection, writes Ross Brewer at LogRhythm. H ow is artificial intelligence making an impact on your security solution portfolio? Ross Brewer, Managing Director and Vice President, EMEA, LogRhythm. O rganisations face a growing number of increasingly complex and ever-evolving threats – and the most dangerous threats are often the hardest to discover. Take the insider threat or stolen credentials, for example. We have seen many high-profile attacks stem from the unauthorised use of legitimate user credentials, which can be extremely difficult to expose. The perimeter-based model of yesterday is insufficient for the mammoth task of protecting a company’s assets. Instead, we are starting to see a shift towards automation and the application of cloud-based artificial intelligence, which is fast becoming critical in the fight against modern cyber threats. A recent IDC report predicted that the artificial intelligence software market would grow at a CAGR of over 39% by 50 2021, whilst separate research from the analyst firm stated that the future of artificial intelligence requires the cloud as a foundation, with enterprise cloud first strategies becoming more prevalent over the same period. The cloud is, without doubt, transforming security by enabling easy and rapid customer adoption, saving time and money, and providing companies with access to a class of artificial intelligence- enabled analytics that are not otherwise technically practical or affordable to deploy on-premise. Plug-and-play implementation lets security teams focus on their mission instead of spending valuable time implementing and maintaining a new tool. What is more, when deployed in the cloud, artificial intelligence can benefit from collective intelligence and a broader perspective to maximise intelligence. Imagine incorporating real-world insight into specific threats in real time. This will advance the ability of artificial intelligence-powered analytics to detect even the stealthiest or previously unknown threats more quickly, and with greater accuracy than ever before. By combining a wide array of behavioural models to characterise shifts in how users interact with the IT environment, cloud-based artificial intelligence technology is helping organisations pursue user-based threats, including signatureless and hidden threats. Applying cloud-based artificial intelligence throughout the threat lifecycle will automate and enhance entire categories of work, as well as enable increasingly faster and more effective detection of real threats. Take analytics, for example. Hackers are constantly •Ω½±Ω₯ΉœΡ‘•₯ȁхΡ₯Μ…Ή)Ρ•‘Ή₯ΕՕ́Ѽ•Ω…‘”•α₯ΝΡ₯ΉœΑΙ½Ρ•Ρ₯Ω”)…Ή‘•™•ΉΝ₯Ω”΅•…ΝΥΙ•Μ°Ρ…ɝ•Ρ₯Ήœ)Ή•ά…Ή•α₯ΝΡ₯ΉœΩΥ±Ή•Ι…‰₯±₯Ρ₯•Μ…Ή)ΥΉ±•…Ν‘₯Ήœ…ΡΡ…¬΅•Ρ‘½‘́ё…Ё‘…Ω”)Ή•Ω•Θ‰••ΈΝ••Έ‰•™½Ι”Έ) ±½Υ…ΙΡ₯™₯₯…°₯ΉΡ•±±₯•Ή”₯́‰•₯ΉΉ₯Ήœ)ΡΌΑ±…䁅Έ₯΅Α½ΙΡ…ΉΠΙ½±”₯Έ‘•Ρ•Ρ₯Ήœ)Ρ‘•Ν”•΅•Ι₯ΉœΡ‘Ι•…ΡΜΈQ‘”Ρ•‘Ή½±½δ₯Μ)ΑΙ½…Ρ₯Ω”…ΉΑΙ•‘₯Ρ₯Ω”°έ₯Ρ‘½ΥЁё”Ή••)™½ΘΝ•ΥΙ₯Ρ䁅Ή%PΑ•ΙΝ½ΉΉ•°ΡΌ½Ή™₯ΥΙ”)…ΉΡΥΉ”ΝεΝΡ•΅Μ°…ΥΡ½΅…Ρ₯…±±δ±•…ΙΉ₯Ήœ)έ‘…Ё₯́Ή½Ι΅…°…Ή•Ω½±Ω₯ΉœΡΌΙ•₯ΝΡ•Θ)•Ω•ΈΡ‘”΅½ΝЁΝΥ‰Ρ±”‘…Ή•Μ₯Έ•Ω•ΉΡ́…Ή)‰•‘…Ω₯½Υȁ΅½‘•±ΜΡ‘…ЁΝ՝•ΝЁ„‰Ι•… )΅₯‘Ё‰”½ΥΙΙ₯ΉœΈ) ±½Υ΅‰…Ν•…ΙΡ₯™₯₯…°₯ΉΡ•±±₯•Ή”)•ΝΝ•ΉΡ₯…±±δ‘•±Ά͕ΥΙ₯Ρ䁅Ή…±εΝΡ́ΥΠ)ёɽ՝ Ρ‘”Ή½₯Ν”…Ή‘•Ρ•ΠΝ•Ι₯½ΥΜ)Ρ‘Ι•…Ρ́•…Ι±₯•Θ₯ΈΡ‘•₯ȁ±₯™•ε±”ΝΌΡ‘…Π)Ρ‘•δ…Έ₯΅΅•‘₯…Ρ•±δ‰”Ή•ΥΡΙ…±₯Ν•Έ%Π)ΑΙ½Ω₯‘•ΜΙ…Α₯Ρ₯΅”΅ΡΌ΅Ω…±Υ”Ρ‘ɽ՝ )±½Υ‘•±₯Ω•Ι䁅ΉΑΙ½΅₯͕́Ѽ•±₯΅₯Ή…Ρ”)½Θ…՝΅•ΉΠ„½ΉΝ₯‘•Ι…‰±”ΉΥ΅‰•Θ½˜)Ρ₯΅”΅½ΉΝΥ΅₯Ήœ΅…ΉΥ…°Ρ‘Ι•…Ё‘•Ρ•Ρ₯½Έ)…ΉΙ•ΝΑ½ΉΝ”•α•Ι₯Ν•ΜΈQ‘₯́…±±½έΜ)Ν•ΥΙ₯ΡδΡ•…΅ΜΡΌ‘Ι₯Ω”Ι•…ѕȁ•™™₯₯•Ήδ)‰δ™½ΥΝ₯Ήœ½ΈΡ‘”‘₯‘•Θ΅Ω…±Υ”…Ρ₯Ω₯Ρ₯•Μ)Ρ‘…ЁɕΕΥ₯Ι”‘₯Ι•Π‘Υ΅…ΈΡ½Υ ΈƒΎ ˆ)%ΝΝΥ”€ΔΨ)%9Q11%9PQ  !991L