We are passionate about our customers and inspired by our team
We are passionate about our customers and inspired by our team
Take control of your cybersecurity
Stay in control
Actionable
Insights
Smart AI
24/7
Support
Fine Grained
Recovery
Modern & Future Proofed
Cover All
Dimensions
SIEM Integration
Our demos
Scale as your business grows
Integer pulvinar augue porta scelerisqe facilisis. Nunc ultrices nibh ut velit.
Stay in control
Smart Wallet
Fast & Easy
Monitoring
Frequently Asked Questions
In the event of a simulated penetration test, Predictable Security will generate alerts as expected. We can work with our customers to limit the alerts that are sent to their SIEM in the event of a pen test.
As soon as you run your CI/CD pipeline you may download base images from external repositories that may introduce compromised containers. The system will see any change in behavior of these containers as soon as the external repositories are accessed from your container host or when the updated containers start running.
The system protects your cloud workload by consuming low level data from virtual networks, container hosts and hypervisors that run any containers or VMs that runs the customer’s work loads. This stream of low level data is then transformed and run through our correlators to do the necessary inference and stream out the predictions. We can therefore monitor and protect any part of a customer’s workload on the cloud.
We provide progress as a number between 0 and 1, the steps that got us to the current progress and possible future events that may follow as well as how that brings us closer to possible successful attacks. We also provide the Monitored Resource (for example the VM number or container name) that the prediction is for.
This is a good way to make predictions because the algorithm does this very efficiently in comparison to other machine learning techniques such as neural networks.
It runs inference on every event streamed into the system. Inference is essentially a set of patent pending traversal operations on the underlying graph representing the trained model.
No, we can install the system remotely or with minimal on-site effort pending organisation size, complexity, SIEM integration and customisations.
No, we run our sensors in the hypervisor or the container host.
We have 3 options:
- We can install a SIEM for you;
- We can send alerts to an email address; or
- You can view attacks-in-progress on our user interface.
The product is not an intrusion detection system but a sophisticated intrusion prediction system that is based on a unique patent pending symbolic machine learning approach.
The product is not an intrusion prevention system but a sophisticated intrusion prediction system that is based on a unique patent pending symbolic machine learning approach.
An IDS is reliant on known events in order to identify a threat or attack. In order to determine an event that is a threat or attack (bad event), an IDS relies on signatures that are based on known threats or attacks (bad event). Predictable Security relies on our patent pending predictive capability to determine if the event that is in progress or being processed will lead to an attack or a bad outcome.
Predictable Security can act as a compliment to your existing IDS by adding that predictive capability to your environment . As an example, Predictable Security has the ability to consume alerts from your existing IDS and further enhance its capability.
It provides predictive capability to determine if the current event will lead to an attack or bad outcome. If you take into consideration that an attacker can linger around for an average of 180 days, meaning that zero day is actually not day zero but day 180. Predictable Security will monitor all events, essentially determining all activities that could lead to a bad outcome thus possibly detecting 0 day vulnerabilities before they happen.
We can feed the predictions to syslog-compliant forwarders that integrate with most major SIEM. We can also integrate into any SIEM that provides an industry standard interface such as REST and will continue to build out our list of supported SIEMs available upon request.