About

About2019-10-01T20:59:19+00:00

We are passionate about our customers and inspired by our team

We are passionate about our customers and inspired by our team

Take control of your cybersecurity

Stay in control

Actionable
Insights

Smart AI

24/7
Support

Fine Grained
Recovery

Modern & Future Proofed

Cover All
Dimensions

SIEM Integration

Our demos

Scale as your business grows

Integer pulvinar augue porta scelerisqe facilisis. Nunc ultrices nibh ut velit.

Stay in control
Smart Wallet
Fast & Easy
Monitoring

Frequently Asked Questions

What happens when we run a pen test?2019-08-30T13:31:55+00:00

In the event of a simulated penetration test, Predictable Security will generate alerts as expected. We can work with our customers to limit the alerts that are sent to their SIEM in the event of a pen test.

How does it work with my existing CI/CD pipeline?2019-08-30T13:32:08+00:00

As soon as you run your CI/CD pipeline you may download base images from external repositories that may introduce compromised containers. The system will see any change in behavior of these containers as soon as the external repositories are accessed from your container host or when the updated containers start running.

How does it protect my cloud workload?2019-10-17T08:31:27+00:00

The system protects your cloud workload by consuming low level data from virtual networks, container hosts and hypervisors that run any containers or VMs that runs the customer’s work loads. This stream of low level data is then transformed and run through our correlators to do the necessary inference and stream out the predictions. We can therefore monitor and protect any part of a customer’s workload on the cloud.

How much detail does it provide with regards to the prediction?2019-08-30T13:32:45+00:00

We provide progress as a number between 0 and 1, the steps that got us to the current progress and possible future events that may follow as well as how that brings us closer to possible successful attacks. We also provide the Monitored Resource (for example the VM number or container name) that the prediction is for.

Why is symbolic machine learning a good way to make predictions?2019-08-30T13:33:47+00:00

This is a good way to make predictions because the algorithm does this very efficiently in comparison to other machine learning techniques such as neural networks. 

How does it do the prediction?2019-08-30T13:34:02+00:00

It runs inference on every event streamed into the system. Inference is essentially a set of patent pending traversal operations on the underlying graph representing the trained model. 

Does it require a lengthy installation process?2019-08-30T13:34:15+00:00

No, we can install the system remotely or with minimal on-site effort pending organisation size, complexity, SIEM integration and customisations.

Is it visible to attackers?2019-08-30T13:34:32+00:00

No, we run our sensors in the hypervisor or the container host.

I don’t have a SIEM, how will I be alerted?2019-08-30T13:34:43+00:00

We have 3 options: 

  1. We can install a SIEM for you;
  2. We can send alerts to an email address; or
  3. You can view attacks-in-progress on our user interface.
Is the product an IDS?2019-08-30T13:35:05+00:00

The product is not an intrusion detection system but a sophisticated intrusion prediction system that is based on a unique patent pending symbolic machine learning approach.

Is the product an IPS?2019-08-30T13:35:22+00:00

The product is not an intrusion prevention system but a sophisticated intrusion prediction system that is based on a unique patent pending symbolic machine learning approach.

How does it differ from an IDS?2019-08-30T13:35:40+00:00

An IDS is reliant on known events in order to identify a threat or attack. In order to determine an event that is a threat or attack (bad event), an IDS relies on signatures that are based on known threats or attacks (bad event). Predictable Security relies on our patent pending predictive capability to determine if the event that is in progress or being processed will lead to an attack or a bad outcome.

Will it replace my IDS?2019-10-17T06:17:08+00:00

Predictable Security can act as a compliment to your existing IDS by adding that predictive capability to your environment . As an example, Predictable Security has the ability to consume alerts from your existing IDS and further enhance its capability.

How does it deal with zero day vulnerabilities?2019-08-30T13:36:18+00:00

It provides predictive capability to determine if the current event will lead to an attack or bad outcome. If you take into consideration that an attacker can linger around for an average of 180 days, meaning that zero day is actually not day zero but day 180. Predictable Security will monitor all events, essentially determining all activities that could lead to a bad outcome thus possibly detecting 0 day vulnerabilities before they happen.

How will it integrate with my SIEM?2019-08-30T13:36:33+00:00

We can feed the predictions to syslog-compliant forwarders that integrate with most major SIEM. We can also integrate into any SIEM that provides an industry standard interface such as REST and will continue to build out our list of supported SIEMs available upon request.

White Paper

One Pager

Presentation

Get Started with Predictable Security

    Looking for help? Get in touch with us

    AS SEEN IN