

We’re getting 99% plus efficacy in detecting threats on these gigabit networks using deep learning, and that’s an order of magnitude better than what others are using currently.” What we were really surprised at is how effective is really was. And so we knew that deep learning would have some effectiveness in detecting these threats. “Current defenses use signatures and sandboxes, and they get overwhelmed by these malware variants. “Over the last ten years, attackers have been using AI to automate malware generation, and these instances of malware propagate throughout the internet and attack companies,” Islam says. Machine learning accelerates so many aspects of modern business, but businesses aren’t the only ones with the technology at their disposal. We really needed to start from scratch, to do our own research, and see how we can combine machine learning and network security together.” “Using deep learning in network security is really a new idea. “Deep learning is very powerful to model complex decision boundaries, and network security is a problem that’s a perfect fit for it,” says Shuo Deng, machine learning scientist at Blue Hexagon. “We’ve been using the AWS platform to generate our models using deep learning.” Deep learning, the means by which algorithms create a neural network that can subsequently learn and make decisions on its own, was initially used for image processing, but Blue Hexagon applies it to new ends. “We’ve developed the world’s first real-time, deep learning–based threat detection platform,” says Nayeem Islam, CEO and co-founder of Blue Hexagon. Sunnyvale, Calif-based Blue Hexagon, however, thinks it’s cracked the problem. And even if your business deploys state-of-the-art signature-based detection systems and malware sandboxing, it can quickly get overwhelmed by a daily deluge of new threats. In 2017 alone, over 120 million new malware samples were detected. Hackers and cyber criminals are currently creating malware at an unprecedented level to infiltrate websites around the world, disrupt business, steal company secrets, shut down sites, and take customers’ information. Business technology may be growing increasingly complex, but when it comes to cybersecurity, it remains a game of cat and mouse.
