Mobile

5/11/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Versive Detects Advanced Cyber Campaigns Automatically with Advanced AI

Versive Security Engine Assists Security Teams by Uncovering Previously Invisible Threats in Enterprise Networks

SEATTLE – Versive, the global leader in adaptive decision science, today announced the general availability of the Versive Security Engine, an automated threat-hunting system built on Versive’s enterprise-scale artificial intelligence platform. Unlike traditional tools, Versive exposes ongoing adversary campaigns automatically by connecting suspicious or malicious activity, from across the network and over time, into coherent, contextualized, and actionable Threat Cases. This unprecedented level of automation multiplies the value of existing staff and transforms cyber defenses, enabling overwhelmed security teams to cope with the increasing onslaught of hostile actors targeting critical data and high-value business assets inside networks and control systems.

"Malicious actors already operating inside networks are fast becoming the top machine-scale problem in business and government today," said Versive CEO Joe Polverari. "As one of the foremost innovators in artificial intelligence, our team recognizes the unrivaled power of data science, machine learning, and automation to solve these high-stakes cybersecurity challenges. Today’s launch is the result of extensive development efforts between our platform team, customers, and top minds in the fields of cyber defense and national security. Any organization can now leverage the power of advanced machine learning to gain an advantage over cyber threats by using the Versive Security Engine, built on true AI innovation and tailored to meet progressive security teams’ demands."

Named to the prestigious AI 100 list of the most promising privately-held artificial intelligence companies, Versive, formerly known as Context Relevant, has successfully addressed multiple, mission-critical use cases across the Fortune 500 with its pioneering AI platform, including fraud mitigation, risk management, and compliance. The Versive Security Engine was developed in exclusive collaboration with cybersecurity luminaries, including former White House national security advisor, Richard Clarke, and renowned network security expert, Peiter "Mudge" Zatko.

"The Engine distills the most valuable practices used by professional threat hunters and makes them machine-scale and automatic. By automating the detection and correlation of the core goals and behaviors shared by all advanced adversaries, the Engine makes it impossible for them to hide," said Zatko.

Applying the Versive Platform to cyber defense, the Versive Security Engine provides significant benefits:

Improves visibility by using standard data sources from across the business—including supplementary cybersecurity products—to fully recognize connected systems and  "normal" network behavior.

Rapidly and automatically detects multi-stage adversary campaigns by recognizing and correlating behaviors associated with the adversary’s mission across the customer environment.

Visualizes and prioritizes risks through intuitive, contextual Threat Cases that map the connections between suspicious behaviors across the network and over time, giving security analysts an incredibly high degree of confidence in activity and necessary actions.

Delivers flexible outputs and results that customers can interact with via the Versive Security Engine UI, or by using the Engine’s open API to harness its power through existing security dashboards.

Grows smarter and adapts over time, as an organization’s environment matures and evolves, thanks to the adaptive machine learning at the core of the Versive Platform.

Deploys simply and elegantly on open-source technology.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Mobile Malware Incidents Hit 100% of Businesses
Dawn Kawamoto, Associate Editor, Dark Reading,  11/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.