Threat Intelligence

04:27 PM
Dark Reading
Dark Reading
Products and Releases

PatternEx Launches Company With First Artificial Intelligent Security Analyst

Unique Artificial Intelligence Solution That Leverages Analyst Intuition to Predict Existing and Emerging Cyber Attacks in Real Time With 10 Times Better Detection Rates and 5 Times Fewer False Positives

SAN JOSE, CA--(Marketwired - February 03, 2016) - PatternEx™, the pioneer in Artificial Intelligence for information security, today launched the company and its PatternEx Threat Prediction Platform that creates "virtual security analysts" that mimic the intuition of human security analysts in real time and at scale. Based on real world datasets, the PatternEx Threat Prediction Platform detects ten times more threats with five times fewer false positives compared with approaches based on Machine Learning-Anomaly Detection technology. The PatternEx solution introduces a new technology called "Active Contextual Modeling™" or ACM, that synthesizes analyst intuition into predictive models. These models, when deployed across global customers, can learn from each other and achieve a network effect in detecting attack patterns.

"The most frustrating thing in InfoSec is that the data to detect malicious behavior often already exists in enterprise infrastructures today," notes Uday Veeramachaneni, PatternEx CEO and co-founder. "The human analysts can detect it, but analysts are difficult to hire and are not scalable. The only way to get real time detection is to be able to mimic those analysts using artificial intelligence based on ACM technology."

The ACM technology transforms raw data into behaviors, and synthesizes analyst intuition into predictive models; the Platform then leverages these models to make real time predictions about specific threat vectors. The more attacks the system predicts, the more feedback it receives from the analysts, which in turn improves the accuracy of future predictions.

"Machine learning models are good at establishing baselines and detecting anomalies to those baselines, but they are not capable of knowing if those anomalies represent good or bad behavior unless humans tell them so," comments Avivah Litan, Gartner VP Distinguished Analyst in her report on user and entity behavior analytics published last September.*

As the platform learns a predictive model from one customer environment, this knowledge can be transferred between enterprises to detect threats globally and converge on new attacks at faster speeds for all customers, commonly known as a network effect.

"Artificial Intelligence holds great promise for InfoSec," says Tim Mather, Chief Information Security Officer for Cadence Design Systems. "In addition to being able to detect threats without relying on rules, AI could enable a network effect whereby an attack pattern detected at one organization can be transferred to another organization in the network. At Cadence, we are piloting the PatternEx Threat Prediction Platform for Data Exfiltration and early results are encouraging."

The PatternEx solution includes a number of novel components combined into a single platform:

  • a big data platform designed for large data volumes and real time response
  • an ensemble of algorithms designed to detect rare behaviors with the goal of identifying new attacks
  • a mechanism to obtain feedback from security analysts and continuously update models with the provided feedback.
  • an active learning feedback loop that continuously improves detection rates over time
  • a repository of threat intelligence that can be shared among enterprises

Ultimately, PatternEx customers gain more visibility, detection, control of malicious behavior for both fraud and breach, without the confusing noise of false positives and the increased security staff they demand. In addition, the PatternEx Threat Prediction Platform is easy to integrate and deploy into existing security architectures.

The Threat Prediction Platform is available as software on premise, in the cloud, or in a private cloud. The Platform is the result of two years of development by a team of AI, security, and distributed systems experts.

*Gartner, Market Guide for User and Entity Behavior Analytics, Avivah Litan, 22 September 2015

About PatternEx:

PatternEx's Threat Prediction Platform is changing the nature of Information Security. Powered by patent-pending Active Contextual Modeling™ technology, the Platform combines artificial intelligence and analyst intuition in a revolutionary methodology that teaches software to identify malicious intent to defend against cyber attacks in real time, at scale across the enterprise. PatternEx is headquartered in Silicon Valley.

For more information go to

Follow PatternEx: Twitter and LinkedIn

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.