Gleam revolutionizes cybersecurity by applying deep learning to create predictive behavior models for each device in the network. The anomaly detection allows to face unknown and future threats. No rules, no signatures, no deployment at all: Pure SaaS exploitation with unlimited scalability.
Network Engineering and Security departments need to reduce the complexity, costs, manageability, and impact on networks.
GLEAM represents a paradigm of simplicity, efficiency, and non-intrusion with a reliable and scalable operation that improves as it is used with his granular AI engines model and continuous learning capability.
Your organization should consider GLEAM because:
Gleam doesn't need previously known signature or attack patterns for detection. Gleam models with AI the expected behavior of the traffic network and detects subtle changes that are indications of a successful attack.
Gleam use the network telemetry, natively produced by the network devices (routers and switches), to build is behavioral models and detect the anomaly in real time. Start using Gleam is as simple as configuring your routers to start sending the flow data to the Gleam Service.
The lightweight protocols of network telemetry used by Gleam (Netflow, IPFIX, J-Flow, sFlow) allow an efficient cloud operation (SECaaS) without the need to deploy anything locally or to pay for a heavy data exchange and improves the compliance with regulations.
The Gleam big data scalable open technology allow the protection of networks of any size. The multi-tenant architecture is perfect for TELCO/SP business models market with OpenStack and Cloudera support.
Additionally, Gleam collect all the network telemetry (flow data) and provides a carrier-class Network Traffic Analytics (NTA) for real-time and historical network visibility, understanding and problem-solving.
When everything fails, Gleam detects successful intrusions analyzing changes in the devices traffic behavior: propagation, C&C, geolocation, suspicious networks, volumetrics, unlikely destinations, odd working hours, unusual protocols, applications, ports, addresses...