Mobile

5/11/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Versive Detects Advanced Cyber Campaigns Automatically with Advanced AI

Versive Security Engine Assists Security Teams by Uncovering Previously Invisible Threats in Enterprise Networks

SEATTLE – Versive, the global leader in adaptive decision science, today announced the general availability of the Versive Security Engine, an automated threat-hunting system built on Versive’s enterprise-scale artificial intelligence platform. Unlike traditional tools, Versive exposes ongoing adversary campaigns automatically by connecting suspicious or malicious activity, from across the network and over time, into coherent, contextualized, and actionable Threat Cases. This unprecedented level of automation multiplies the value of existing staff and transforms cyber defenses, enabling overwhelmed security teams to cope with the increasing onslaught of hostile actors targeting critical data and high-value business assets inside networks and control systems.

"Malicious actors already operating inside networks are fast becoming the top machine-scale problem in business and government today," said Versive CEO Joe Polverari. "As one of the foremost innovators in artificial intelligence, our team recognizes the unrivaled power of data science, machine learning, and automation to solve these high-stakes cybersecurity challenges. Today’s launch is the result of extensive development efforts between our platform team, customers, and top minds in the fields of cyber defense and national security. Any organization can now leverage the power of advanced machine learning to gain an advantage over cyber threats by using the Versive Security Engine, built on true AI innovation and tailored to meet progressive security teams’ demands."

Named to the prestigious AI 100 list of the most promising privately-held artificial intelligence companies, Versive, formerly known as Context Relevant, has successfully addressed multiple, mission-critical use cases across the Fortune 500 with its pioneering AI platform, including fraud mitigation, risk management, and compliance. The Versive Security Engine was developed in exclusive collaboration with cybersecurity luminaries, including former White House national security advisor, Richard Clarke, and renowned network security expert, Peiter "Mudge" Zatko.

"The Engine distills the most valuable practices used by professional threat hunters and makes them machine-scale and automatic. By automating the detection and correlation of the core goals and behaviors shared by all advanced adversaries, the Engine makes it impossible for them to hide," said Zatko.

Applying the Versive Platform to cyber defense, the Versive Security Engine provides significant benefits:

Improves visibility by using standard data sources from across the business—including supplementary cybersecurity products—to fully recognize connected systems and  "normal" network behavior.

Rapidly and automatically detects multi-stage adversary campaigns by recognizing and correlating behaviors associated with the adversary’s mission across the customer environment.

Visualizes and prioritizes risks through intuitive, contextual Threat Cases that map the connections between suspicious behaviors across the network and over time, giving security analysts an incredibly high degree of confidence in activity and necessary actions.

Delivers flexible outputs and results that customers can interact with via the Versive Security Engine UI, or by using the Engine’s open API to harness its power through existing security dashboards.

Grows smarter and adapts over time, as an organization’s environment matures and evolves, thanks to the adaptive machine learning at the core of the Versive Platform.

Deploys simply and elegantly on open-source technology.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14332
PUBLISHED: 2018-07-19
An issue was discovered in Clementine Music Player 1.3.1. Clementine.exe is vulnerable to a user mode write access violation due to a NULL pointer dereference in the Init call in the MoodbarPipeline::NewPadCallback function in moodbar/moodbarpipeline.cpp. The vulnerability is triggered when the user...
CVE-2018-1529
PUBLISHED: 2018-07-19
IBM Rational DOORS Next Generation 5.0 through 5.0.2, 6.0 through 6.0.5 and IBM Rational Requirements Composer 5.0 through 5.0.2 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potential...
CVE-2018-1535
PUBLISHED: 2018-07-19
IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus alteri...
CVE-2018-1536
PUBLISHED: 2018-07-19
IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus alteri...
CVE-2018-1585
PUBLISHED: 2018-07-19
IBM Rational Rhapsody Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 and IBM Rational Software Architect Design Manager 5.0 through 5.0.2 and 6.0 through 6.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus alteri...