AUTO-UPDATED

Tuskira replaces centralized detection model with real-time, distributed approach

Tuskira launches a new security engine that detects cyber threats instantly at their source rather than relying on slow, centralized data systems.

Key points

  • Decentralized detection: Instead of sending all data to one central location, Tuskira’s new engine analyzes data where it lives, making threat detection faster and cheaper.
  • Reduced manual work: The system automates the creation and management of security rules, moving away from the slow, human-led processes of traditional security operations.
  • Unified threat mapping: It uses a "context graph" to connect different data points—like user identities and network assets—to spot complex, multi-stage attacks.
  • AI-driven filtering: The platform automatically validates alerts to filter out "noise" and false alarms, allowing security teams to focus only on genuine threats.
  • Seamless integration: The engine works with a company’s existing security tools, allowing for immediate response actions without needing a massive infrastructure overhaul.
Why it matters

Traditional security systems are struggling to keep up with the speed of modern AI-powered cyberattacks. By moving detection to the source, Tuskira helps companies identify and stop breaches in real-time, significantly reducing the time and cost required to secure complex digital environments.

Help Net Security Published by Industry News
Read original