AI + Big Data Security System

内部威胁防护体系(ITP)

ITM

Threat Behavior Analysis

  • Anomalous Behavior Detection
  • Accurate Behavior Backtracking
  • Expert System
  • Anomaly Risk Score

Data Security Labs

URL Library

  • URL Security Analysis
  • Dynamic Content Category
  • Dynamic Security Category
  • Expert Model Repository

UCSS

Event Behavior

  • DLP Incident
  • SWG Incident
  • MAG Incident

ASWG

Protocol

  • Web
  • Email
  • P2P
  • Instant Messaging
  • Stream Media

Network Data Flow

Network Behavior

  • Number of Connections
  • Data Size
  • Data Frequency

Endpoint

Endpoint Behavior

  • Anomaly Process
  • Extension Change
  • Local File Sharing
  • USB Transmission
  • VPN Connection
  • Screen Capture
  • Screen Recording

Data-Centric Security Architecture

Data-Centric Security Architecture