Passive network probes are strategically positioned at various nodes within the network, depending on the throughput of the monitored flows and the amount of data transferred. Each sensor collects information from the network segment in which it is installed, analyses it in real time and sends the first results to the local server.
Additional: each sensor can be deployed with a “honey pot” for deception purposes.
Cyber Intelligence is the nitrous.
On the local server the data received from the probes are enriched with information from sources such as OSINT and Threat Intelligence as well as using information specific for the customer environment.
Empower and orchestrate the mixture.
aramis constantly performs two kind of analysis on the collected data:
- Continuous Modulation of its analytics based on the dynamic variation of the measured risks.
- Analysis through the AI Engine of the behavior of each single network
node, in order to detect any possible anomaly.
Identify and act — on time.
The information is represented in the dashboards with an effective
"cognitive visualization" approach allowing to promptly highlight
any minimum deviations from repetitive patterns. These graphics,
thanks to their zoom and drill down capabilities, afford analysts with
a powerful tool for the identification and analysis of alarms.
Cybercrime is expected
to cost the world over $6 trillion
per year by 2021
The faster the data breach can be identified and contained, the lower the costs.
In this year’s study, organizations reduced the days to identify data breaches from an average
of 201 days in 2016 to 191 days in 2017.
(Cost of Data Breach Study: Global Overview – Ponemon Institute, June 2017)
Our Intelligence driven security operation center, I-SOC, based in Europe, US and Australia, is able to monitor your environment 24/7. We will not only spot potential threats, but we will give you our expert advice on the actions to take. Not just detection but intelligence driven incident response.