tech talk: forty2.io: leveraging machine learning to protect your web applications against advanced...

19
World ® ’1 6 Tech Talk: forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks Jin Zhang - Founder - Forty2.io – CA Technologies IET02T CA ACCELERATOR

Upload: ca-technologies

Post on 16-Apr-2017

96 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

World®’16

TechTalk:forty2.io:LeveragingMachineLearningtoProtectYourWebApplicationsAgainstAdvancedCyber-AttacksJinZhang- Founder- Forty2.io– CATechnologies

IET02T

CAACCELERATOR

Page 2: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.2 @CAWORLD#CAWORLD

©2016CA.Allrightsreserved.Alltrademarksreferencedhereinbelongtotheirrespectivecompanies.

Thecontentprovidedinthis CAWorld2016presentationisintendedforinformationalpurposesonlyanddoesnotformanytypeofwarranty. The informationprovidedbyaCApartnerand/orCAcustomerhasnotbeenreviewedforaccuracybyCA.

ForInformationalPurposesOnlyTermsofthisPresentation

Page 3: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.3 @CAWORLD#CAWORLD

Abstract

Allorganizationstodayoperateontheweb.AsdataoperationsmoveontotheInternet,companiesmustincreasinglyturntothirdpartyproviderstoprotecttheirapplications,businessandusers.RecentWebApplicationbreachesdemonstratethattraditionalWAFs,CDNs,andDDoSmitigationsolutionshavefailedtokeeppacewiththevolumeandsophisticationoftoday’sautomatedcyber-attacks.Ratherthanrelyingonasinglesecurityprovider,themodernapproachrequiresaDefenseinDepthstrategy,organizedaroundspecializedsecuritylayerstoprotecttheintegrityoftheinformationassetsinanenterprise.InthissessionyouwilllearnhowForty2.io,aCAAcceleratorproject,usesmachinelearningtechniquestodetecttheseautomatedcyber-attacksthatmimichumanlikebehaviorandprovidesprescriptivereal-timeactionableinsights.Itisamust-attendsessionforindividualsresponsiblefortheinfrastructuresecurityoftheircompanies.

JinZhangForty2.io–CATechnologiesFounder

Page 4: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.4 @CAWORLD#CAWORLD

Agenda

SSLACCELERATORAUTHENTICATIONANDLEANSTARTUP

WHATISFORTY2.IO

1

2

Page 5: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.5 @CAWORLD#CAWORLD

AboutCAAccelerator

“Enterprisestartups”

CA’sinnovationengine

Visitca.com/accelerator

Page 6: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.6 @CAWORLD#CAWORLD

FocusonOrganicProductInnovation

§ Listentocustomers

§ USEastandWestincubation

§ Failfast– andsafe

§ Freshblood

§ Reviewprocess,justlikeventurecapitalistsJ

§ Forty2.ioisoneoftheincubationprojects

Page 7: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.7 @CAWORLD#CAWORLD

DigitalTransformation

Creatingsomethingnew—newmarkets,newproductsandnewareasofgrowthandrevenues.

=OpportunitiesforCompaniesThatEmbraceIt

Companieswhoarenotembracing thischangearequicklybecomingirrelevantandwilllikelynolongerplayasignificantroleinthenext5–10years.

Page 8: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.8 @CAWORLD#CAWORLD

DigitalTransformationBringsOpportunitiesandRisk

It’sclearthatDigitalTransformationisvitalforbusiness,inorderfor

themtobepartoftheappeconomy,butthethreatsandrisksina

digitalbusinessislessclear.Evenmanytraditionalbusinesseshave

hugeexistinginvestmentson-premisesbuthavelittletonoexperience

inbigbadworldofcyberspace.

Page 9: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.9 @CAWORLD#CAWORLD

24% of enterprisessufferattack

Thereisanaverageof4.5DDoSattacksperyearforatypicalenterprise

26%ofDDoSattacksleadtodataloss

20%ofbusinesseswith50ormoreemployeeshaveatleastonecyberattack

Anattackcancostupto40,000USDperhour

60percentofthewebtrafficaremadeofbots

Botscanstealimportantinformation,canscrapedata(likepricescrapping)

HowBigAretheThreats?

Page 10: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.10 @CAWORLD#CAWORLD

Protectionofrevenue,brandanddata

MaximizationofITutilization:costsavings,abilitytoservemoretocustomers

Increaseofproductivity:abilitytoidentifyrisksandtheftsquicker

ASolution:forty2.ioforty2.io isananalyticsdrivenappwhichprotectsdigitalbusinesseswithoneclickresolution:

Page 11: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.11 @CAWORLD#CAWORLD

Howforty2.ioCanProtectYourBusiness

Providesreal-timeactionableinsights

Alightweightlayerthatcaningestdata/logsfromyour webserverinrealtime

ProtectdigitalassetsagainstDDoS,botsandothersuchthreats

ProvidesthreatassessmentsandresolutionsforsomeselectedIToperationalparameters

StrengthenexistingITcapabilitybyprotectingspecificallytheapplicationtierinSaaS environment

Page 12: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.12 @CAWORLD#CAWORLD

˃ DatainMotiontoReal-TimeInsights:SupportReal-TimeStreaming

˃ ContinuousIntelligencethroughReal-TimeAnomalyDetection

˃ BusinessContextAwareAlerts

˃ ActionableInsights

˃ IntelligentPrescriptionsystemonOutliers

˃ InstantAlertNotifications

˃ SupportforReal-TimeBotandDDOSDetection

˃ IntuitiveDataVisualization

˃ Seamlesslyscalableglobally(runsonAWS)–noupfrontinvestmentrequired

forty2.ioProvides:

Page 13: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.13 @CAWORLD#CAWORLD

WhatWeLearnedinBuildingforty2.io

Page 14: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.14 @CAWORLD#CAWORLD

DataMatters

§ Howtovalidate

§ WhomdoIwanttointerview

§ Howtoseekrepeatinganswers

Page 15: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.15 @CAWORLD#CAWORLD

LookforNeed,NottoGenerate“Wants”

§ Howtoseekrepeatinganswers

§ Nottoleadthewitness

§ Resisttalkingaboutsolutions

Page 16: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

©2016CA.ALLRIGHTSRESERVED.16 @CAWORLD#CAWORLD

Agileworkshere,too!

MarketResearch

ProfessionalExperience

UserInterview

Page 17: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

17 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

“Shareachallenge”withtheexperts

AshMauryaInnovationexpertandauthorofScalingLean

CAAcceleratorZoneHighlights

*Thursday12:15– 1:30First250attendeesreceiveafree

signedcopy

Questions?

BooksigningwithAshMaurya

Page 18: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

Stayconnectedatcommunities.ca.com

Thankyou.

Page 19: Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applications Against Advanced Cyber-Attacks

19 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

FormoreinformationontheCAAccelerator,pleasevisit:http://ca.com/accelerator