A New Approach to Security Detection

To resolve the problems described above, the SlashNext Active Cyber Defense System and iPoint Networks uses neither signatures nor sandboxes. Instead, artificial intelligence algorithms extract a complex set of “features” from the entire infection sequence to determine if a flow is malicious or not. Because these features are not solely dependent on the actual object (or payload), we inherently do not
suffer from the same limitations as signature or sandbox based systems – making our detection
capabilities substantially more difficult to evade. Additionally, because the majority of our detection
logic resides in the cloud and we have strict control of every network that routes traffic to our
cloud, there is no way for a cyber-criminal to devise a test suite that checks whether our cloud will
discover his malicious code or not.

Leave a Reply

Your email address will not be published.

I accept that my given data and my IP address is sent to a server in the USA only for the purpose of spam prevention through the Akismet program.More information on Akismet and GDPR.