SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
May 2017
Advanced Machine Learning
Cyber Security Analytics
© 2017 Unisys Corporation. All rights reserved. 22
Unisys Builds Large Advanced Data Analytics
Mission Critical Knowledge Environments
We process more than 1.3 Billion transactions a day and
700,000 queries a day predicting threats against the US.
Unisys has been supporting DHS for more than 15 years.
On a Typical Day, Department of Homeland Security-
Customs and Border Protection (DHS-CBP)
• Processes 932,456 passengers and pedestrians
• Processes 64,483 truck, rail, and sea containers
• Seizes 13,717 pounds of drugs
© 2017 Unisys Corporation. All rights reserved. 33
Unisys Advanced Cyber Intelligence Platform
• Behavioral Anomaly Detection Models
– Models for the prediction of malicious network activity
across the enterprise
– Works with your current Security information and event
management (SIEM)
• Threat Intelligence Engine
– Models providing increased visibility into known threats
– Improved context and intelligence through the correlation
of multiple threat feeds
– Unique partnership with Team Cymru, Recorded Future,
Farsight and Unisys Intelligence Feeds
• Advanced Dynamic Microsegmentation Model
– Utilizes network data to provide near real time
microsegmentation
– Integrates with most Software Designed Security (SDS)
Solutions including Unisys Stealth
Our Cyber Intelligence
Platform can easily be
integrated with your
current Security
Operations Center
(SOC) operations for
increased security
capabilities leveraging
machine learning and
predictive models
© 2017 Unisys Corporation. All rights reserved. 44
Cyber Intelligence Platform
© 2017 Unisys Corporation. All rights reserved. 55
Reconnaissance
Lateral
movement
Command and
control
Exfiltration
Threat behavior use cases
IP address
Host name
URL
UserID
Hash
Registry entry
and file
Discrete indicators of compromiseVulnerabilities
Compliance
Malware
analysis
Open source
intel
Industry
licensed intel
Unisys-specific
intel
Advanced Predictive Model API
MSS Cyber Threat Intelligence
• Normalization
• Threat actor tracking
• Attacker use cases
Managed Security Services (MSS)
Cyber Threat
Intelligence Team
Unisys Cyber Threat
Intelligence Platform
Unisys
SOC Network
© 2017 Unisys Corporation. All rights reserved. 66
Retail Bank Social and
Dark Web Threat Intelligence
Business Problem
• Need for additional threat intelligence and context
for risks to the enterprise
Business Benefits
• Physical threat to locations and executives
• Intelligence on dark web chatter specifically focused
on the brand and banking threats in general
• Exposed network credentials, phishing attempts, CC
numbers and advanced intelligence prior to events
• Integration with current SIM and security tools for
easy implementation into existing processes
Our Solution
• Our unified social and dark web listening solution
eliminates noise and provides a level of intelligence
that has not been available before
© 2017 Unisys Corporation. All rights reserved. 77
Large Utility Client
Advanced ML and Predictive Threat Detection
Business Problem
• Ingest network data from existing SIEM tool and
SOC environment to identify cyber threats before
they occur
Business Benefits
• Identifying network anomalies for both external and
internal threats near-real time
• Expanding the overall capabilities and time to action
for the SOC and Security personnel
• Reduced false positives
• Identification of unknown malicious activities through
advanced anomaly detection
Our Solution
• Our unified cyber security-risk platform —
implementing machine-learning to provide a
comprehensive cyber-threat defense capability
© 2017 Unisys Corporation. All rights reserved. 88
University Network Application Optimization
Business Problem
• Extreme network peaks and degradation in
availability; unidentified issues causing network
failure
Business Benefits
• Network behavioral models identify high demand
peaks and application utilization
• Machine Learning helps to provide insights to
predict potential network issues before they happen
• Optimization of hardware and cloud infrastructure
investment to maintain network performance
Our Solution
• Our network anomaly detection models for
applications and machine learning provide real time
insights and predict patterns of usage through
actionable intelligence
Thank you!
Learn more at: Unisys.com/CybersecurityAnalyticsLearn more at: Unisys.com/CybersecurityAnalytics

Contenu connexe

Plus de Unisys Corporation

Plus de Unisys Corporation (20)

DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“DAS DILEMMA MIT DER GENERATION „DIGITAL“
DAS DILEMMA MIT DER GENERATION „DIGITAL“
 
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
DIE NEUE DIGITALE INFRASTRUKTUR FÜR DIGITALE MITARBEITER DER NÄCHSTEN GENERAT...
 
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
STEHEN DIE ENDBENUTZER DER GENERATION „DIGITAL“FÜR DAS ENDE VON IT-TRANSPAREN...
 
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN. DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
DIE GENERATION DIGITAL UND DIE IT-LÜCKE IN UNTERNEHMEN.
 
Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic Digital Gen: Hybrid IT Infographic
Digital Gen: Hybrid IT Infographic
 
Digital Gen Infographic
Digital Gen InfographicDigital Gen Infographic
Digital Gen Infographic
 
Digital Gen: Security Infographic
Digital Gen: Security InfographicDigital Gen: Security Infographic
Digital Gen: Security Infographic
 
Digital Gen: End User Services Infographic
Digital Gen: End User Services InfographicDigital Gen: End User Services Infographic
Digital Gen: End User Services Infographic
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
 
Managed Security Services Infographic
Managed Security Services InfographicManaged Security Services Infographic
Managed Security Services Infographic
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
 
Digital Generation Infographic
Digital Generation InfographicDigital Generation Infographic
Digital Generation Infographic
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Unisys Border Control / Protection Infographic
Unisys Border Control / Protection InfographicUnisys Border Control / Protection Infographic
Unisys Border Control / Protection Infographic
 
Unisys Security Insights Infographic: France
Unisys Security Insights Infographic: FranceUnisys Security Insights Infographic: France
Unisys Security Insights Infographic: France
 
Unisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: NetherlandsUnisys Security Insights Infographic: Netherlands
Unisys Security Insights Infographic: Netherlands
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Unisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: SpainUnisys Security Insights Infographic: Spain
Unisys Security Insights Infographic: Spain
 
Unisys Security Insights Infographic: China
Unisys Security Insights Infographic: ChinaUnisys Security Insights Infographic: China
Unisys Security Insights Infographic: China
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 

Dernier

Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
shambhavirathore45
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
JohnnyPlasten
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 

Dernier (20)

Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 

Unisys Advanced Machine Learning Cyber Security Analytics presentation

  • 1. May 2017 Advanced Machine Learning Cyber Security Analytics
  • 2. © 2017 Unisys Corporation. All rights reserved. 22 Unisys Builds Large Advanced Data Analytics Mission Critical Knowledge Environments We process more than 1.3 Billion transactions a day and 700,000 queries a day predicting threats against the US. Unisys has been supporting DHS for more than 15 years. On a Typical Day, Department of Homeland Security- Customs and Border Protection (DHS-CBP) • Processes 932,456 passengers and pedestrians • Processes 64,483 truck, rail, and sea containers • Seizes 13,717 pounds of drugs
  • 3. © 2017 Unisys Corporation. All rights reserved. 33 Unisys Advanced Cyber Intelligence Platform • Behavioral Anomaly Detection Models – Models for the prediction of malicious network activity across the enterprise – Works with your current Security information and event management (SIEM) • Threat Intelligence Engine – Models providing increased visibility into known threats – Improved context and intelligence through the correlation of multiple threat feeds – Unique partnership with Team Cymru, Recorded Future, Farsight and Unisys Intelligence Feeds • Advanced Dynamic Microsegmentation Model – Utilizes network data to provide near real time microsegmentation – Integrates with most Software Designed Security (SDS) Solutions including Unisys Stealth Our Cyber Intelligence Platform can easily be integrated with your current Security Operations Center (SOC) operations for increased security capabilities leveraging machine learning and predictive models
  • 4. © 2017 Unisys Corporation. All rights reserved. 44 Cyber Intelligence Platform
  • 5. © 2017 Unisys Corporation. All rights reserved. 55 Reconnaissance Lateral movement Command and control Exfiltration Threat behavior use cases IP address Host name URL UserID Hash Registry entry and file Discrete indicators of compromiseVulnerabilities Compliance Malware analysis Open source intel Industry licensed intel Unisys-specific intel Advanced Predictive Model API MSS Cyber Threat Intelligence • Normalization • Threat actor tracking • Attacker use cases Managed Security Services (MSS) Cyber Threat Intelligence Team Unisys Cyber Threat Intelligence Platform Unisys SOC Network
  • 6. © 2017 Unisys Corporation. All rights reserved. 66 Retail Bank Social and Dark Web Threat Intelligence Business Problem • Need for additional threat intelligence and context for risks to the enterprise Business Benefits • Physical threat to locations and executives • Intelligence on dark web chatter specifically focused on the brand and banking threats in general • Exposed network credentials, phishing attempts, CC numbers and advanced intelligence prior to events • Integration with current SIM and security tools for easy implementation into existing processes Our Solution • Our unified social and dark web listening solution eliminates noise and provides a level of intelligence that has not been available before
  • 7. © 2017 Unisys Corporation. All rights reserved. 77 Large Utility Client Advanced ML and Predictive Threat Detection Business Problem • Ingest network data from existing SIEM tool and SOC environment to identify cyber threats before they occur Business Benefits • Identifying network anomalies for both external and internal threats near-real time • Expanding the overall capabilities and time to action for the SOC and Security personnel • Reduced false positives • Identification of unknown malicious activities through advanced anomaly detection Our Solution • Our unified cyber security-risk platform — implementing machine-learning to provide a comprehensive cyber-threat defense capability
  • 8. © 2017 Unisys Corporation. All rights reserved. 88 University Network Application Optimization Business Problem • Extreme network peaks and degradation in availability; unidentified issues causing network failure Business Benefits • Network behavioral models identify high demand peaks and application utilization • Machine Learning helps to provide insights to predict potential network issues before they happen • Optimization of hardware and cloud infrastructure investment to maintain network performance Our Solution • Our network anomaly detection models for applications and machine learning provide real time insights and predict patterns of usage through actionable intelligence
  • 9. Thank you! Learn more at: Unisys.com/CybersecurityAnalyticsLearn more at: Unisys.com/CybersecurityAnalytics