Complete Cyber Protection
Our IC360 Platform is orchestrated and automated by our advanced Security Orchestration, Automation & Response (SOAR) software connected to leading-edge auto-containment and auto-remediation modules.
The solution covers the entire framework of the internationally accepted ISO27001, NIST 800-53 and the Cyber Security Capability Maturity Model (C2M2) by incorporating the Cyber Standards and Stages of Assess; Prevent; Detect; React; and Remedy.
IC360 is a hybrid of machine intelligence and human intelligence. It is a unique cyber security operating system that uses machine reasoning, machine learning, robotic process automation. It creates the most sophisticated cyber oversight capability available by providing 360-degree coverage of all threat aspects.
The IC360 Platform architecture is built for adaptability and change. It can ingest and parse disparate data sources of intelligence, threat, and remediation information. On the technology side, it can easily integrate with and, if required, replace software modules as the technologies mature. Unlike traditional solutions, clients will never be locked into a single software provider or architecture.
The Cyber Systems Integrator
IC360 operating system uses four levels of AI to determine whether the machine will be allowed to intervene autonomously.
First, we apply a set of rules created for specific client circumstances.
Second, we use Machine Reasoning via a software system that generates conclusions from available knowledge using logical techniques such as deduction and induction (sometimes called fuzzy logic).
Third, we use additional Machine Learning to improve reasoning based on an understanding of the outcome.
Narrow Artificial Intelligence
Finally, we use Narrow Artificial Intelligence for learning and understanding performance based on trends over hours and days rather than seconds & minutes.
The machine will be allowed to automatically intervene if all these criteria are met. This results in an order-of-magnitude improvement in the rate of “false positives” compared to traditional approaches. When the criteria are not met, the case is passed for immediate human intervention; hence the Hybrid approach of human and machine.
Overall this enables IC360 to handle most cases in milliseconds, and the remainder of cases within two minutes, with an error rate that is negligibly small. We use this approach for both Vulnerability Management (auto remediation) and Compromise Management (auto containment).