JASK, the AI-based security operations platform has announced the general availability of JASK Trident, which uses AI to facilitate machine driven alert triage, malicious behaviors detection, and investigations into those behaviors. According to the company, it will increase operational efficiency in security operations, enabling security operations teams to defend networks with autonomous threat-hunting instead of staying in a reactive posture.
The company itself came out of stealth last month after raising $12 million in a Series A investment round led by Dell Technologies Capital and TenEleven Ventures. At the time of its launch it stated that security operations needs innovation because the gap between attacker capability and what traditional technologies can detect continues to grow.
JASK claims that security operations teams are overwhelmed with thousands of security alerts from a multitude of security point-solutions. Traditional triage and investigation processes for sorting through those alerts rely on slow and time-consuming manual responses. These shortcomings deprive security teams of the crucial agility and speed they need to respond to today’s threats.
“With millions of cybersecurity jobs going unfilled, CISOs and managers of security operations centers across industries like financial, manufacturing, healthcare, and retail are looking for ways to improve their teams’ abilities to mitigate cyberattacks,” said Greg Martin, CEO and Co-Founder, JASK.
“Trident accelerates the rate at which analysts can identify and react to threats and empowers them to make informed decisions faster and with more precision.”
According to JASK, to make security operations more effective, JASK Trident will monitor network end to end, surfacing and triaging the most relevant attacks using advanced AI, while providing a clear picture of the attack surface. It will apply machine learning-based analytics to detect potential malicious behaviors by assets and users across the network and offers modern ad-hoc data exploration and visualization capabilities through “notebooks.” The solution will also allow security analysts to configure any external and internal context enrichment that operationalizes data aggregation to dramatically reduce time to insight.
The company states that the cloud-based solution can be easily deployed and is quick to yield results, increasing operational efficiency by a factor of 10 offering the benefit of helping security analysts spend time on higher-order activities — such as threat hunting — allowing proactive defense rather than a constant reactive posture.
It also claims to reduce the risk of data breaches because security operations teams can accelerate the detection of malicious activities without increasing the need for hiring additional security analysts. Trident will be offering network visibility to support automated threat detection and provide threat detection and analysis across remote offices that may have previously lacked coverage.