AI + Big Data Security System

ITM
Threat Behavior Analysis
- Anomalous Behavior Detection
- Accurate Behavior Backtracking
- Expert System
- Anomaly Risk Score
Data Security Labs
URL Library
- URL Security Analysis
- Dynamic Content Category
- Dynamic Security Category
- Expert Model Repository
UCSS
Event Behavior
- DLP Incident
- SWG Incident
- MAG Incident
ASWG
Protocol
- Web
- P2P
- Instant Messaging
- Stream Media
Network Data Flow
Network Behavior
- Number of Connections
- Data Size
- Data Frequency
Endpoint
Endpoint Behavior
- Anomaly Process
- Extension Change
- Local File Sharing
- USB Transmission
- VPN Connection
- Screen Capture
- Screen Recording
Data-Centric Security Architecture
