Aramis by Aizoon

by aizoOn

THE ARAMIS PLATFORM

aramis

How does it work

The Four Pillars

COLLECT

Data fuels the Aramis engine.

Passive network probes are strategically positioned at various nodes within the network, depending on the throughput of the monitored flows and the amount of data transferred. Each sensor collects information from the network segment in which it is installed, analyses it in real time and sends the first results to the local server.

Additional: each sensor can be deployed with a “honey pot” for deception purposes.

ENRICH

Cyber Intelligence is the nitrous.

On the local server the data received from the probes are enriched with information from sources such as OSINT and Threat Intelligence as well as using information specific for the customer environment.

CORRELATE

Empower and orchestrate the mixture.

aramis constantly performs two kind of analysis on the collected data:
- Continuous Modulation of its analytics based on the dynamic variation of the measured risks.
- Analysis through the AI Engine of the behavior of each single network
node, in order to detect any possible anomaly.

VISUALIZE

Identify and act — on time.

The information is represented in the dashboards with an effective
"cognitive visualization" approach allowing to promptly highlight
any minimum deviations from repetitive patterns. These graphics,
thanks to their zoom and drill down capabilities, afford analysts with
a powerful tool for the identification and analysis of alarms.

RISK AWARENESS

Cybercrime is expected
to cost the world over $6 trillion
per year by 2021

The faster the data breach can be identified and contained, the lower the costs.
In this year’s study, organizations reduced the days to identify data breaches from an average
of 201 days in 2016 to 191 days in 2017.

(Cost of Data Breach Study: Global Overview – Ponemon Institute, June 2017)

DISCOVER
ARAMIS IN ACTION

aramis as a

PLATFORM

Get your own appliance
do the monitoring yourself.

The platform deployment is composed of a local physical
appliance and one or more probes (both physical and
virtualised) depending on your infrastructure.

BOOK A DEMO

aramis as a

SERVICE

Get our team to monitor
your environment 24/7.

Our Intelligence driven security operation center, I-SOC, based in Europe, US and Australia, is able to monitor your environment 24/7. We will not only spot potential threats, but we will give you our expert advice on the actions to take. Not just detection but intelligence driven incident response.

BOOK A DEMO
WHY IS ARAMIS DIFFERENT

It is based on the observation of network traffic and acts passively.

It has no agents installed on clients.

It does not base its analysis on pre-established rules.

Advanced Cyber Analytics designed to apply the discovery techniques of a security analyst over all network traffic.

Machine Learning engine is unsupervised and doesn’t need tuning.

It allows you to carry out continuous improvement actions.

It highlights situations that other instruments are not able to perceive because they are specifically designed to detect only well known anomalies.

The offering is flexible and can be tailored to client’s needs.

TECH INSIGHTS

Want to discover more?

Find out how aramis machine learning technology,
threat intelligence capabilities and data mining
techniques can add value to your organization.

DISCOVER