Anomaly detection and user and entity behavior analytics
Uncovering patterns and changes in those patterns is at the very heart of anomaly detection. In cybersecurity, this established baseline and deviation from it are what create the use case of anomaly detection. Once there’s been an anomaly and an action is required from the system, we can then move toward rectifying it somehow. Often, cyber attacks come from within networks and have clever ways of hiding their tracks, but with advanced pattern recognition that’s used for anomaly detection, AI systems can see when some actor/user is behaving in ways that don’t make sense for a normal user.
As we went through some of the use cases for various verticals, you’re likely seeing patterns of your own emerge in terms of some of the underlying tech used to power those applications of AI. One of these overarching use cases is encapsulated in UEBA, which is, in many ways, an undercurrent for many of the use...