Cybersecurity Threat Detection
Losses due to cybercrime in 2018
Increase in cybercrime from 2019 to 2020
Average total cost of a data breach
Dramatically improve cybersecurity detection and prevention with the next generation, software-agnostic Lucata computing technology for powering graph analytics and high performance big data analytics. Lucata enhances the speed and accuracy of cybersecurity detection and prevention systems, whether utilizing a graph or a relational database.
Improved Cybersecurity Threat Detection and Prevention Speed and Accuracy
Cybersecurity attacks inflict an astounding amount of damage on institutions worldwide and there are no signs of slowing. Traditional approaches are not fast or accurate enough to stop these attacks and, when they succeed, it takes an average of 280 days to detect and contain a breach.
Detecting complex cyber threats requires integrating and traversing data from multiple sources in fractions of a second. There can be terabytes of log data generated each day from various data sources and the graph analytics often have to traverse 6 or more hops. At this scale, cybersecurity solutions using traditional hardware platforms will not achieve the response times necessary to prevent breaches.
Furthermore, threat detection systems built on relational databases struggle to detect fraud in minutes or even hours. This is because relational databases, which store information in separate tables with one for each type of network entity, require multiple joins in fractions of a second to uncover anomalous connections.
Faster Cybersecurity Threat Detection and Prevention with Lucata
Whether the cybersecurity system uses a graph database or a relational database, Lucata can improve the speed of existing cybersecurity solutions by 2 to 3 orders of magnitude on databases up to web-scale size, enabling real-time breach detection.
Many forms of breach detection and prevention can be accelerated and enhanced by deploying the Lucata architecture to power cybersecurity solutions.
Detect patterns of behavior linked to breaches
These patterns can include reading from a restricted file after bypassing a firewall or a user copying files to a mobile disk
Detect anomalies in network behavior
These behaviors can consist of footprinting, when a bad actor probes the network for vulnerabilities, or flooding detection, which is a denial of service (DDoS) attack
Extract machine learning feature set
Features can include the number of shortest paths from denylisted users to new users or analyzing new users with the k-nearest neighbor algorithm
Many forms of breaches can be detected and prevented. However, the damage may be inflicted too quickly to be stopped, especially using traditional methods. Lucata provides the hardware platform to accelerate detection systems. A single Lucata Pathfinder chassis can perform a complex as-of join on 3.8 million rows of data in 210ms, compared to an x86 Intel processor which takes 2 minutes. Whether you are using a relational database or a graph database, Lucata accelerates cybersecurity solutions. Furthermore, when the security solution uses a graph database, Pathfinder will expand the size of the graphs that can be analyzed to scale 42 and beyond, catching even edge cases using full breadth-first search (BFS).
Lucata Enables Effective Cyber Threat Detection at Massive Scale
The next generation performance you need for graph analytics on databases with 1 trillion nodes and beyond with no data pruning or database sharding. Identify cyber threats by analyzing deeper into your data than ever possible before.
Lucata Powers a New Era in Cybersecurity
Cybercrimes wreak an astounding amount of damage and infiltrators are only becoming more sophisticated. To detect breaches in real-time, a cybersecurity detection system must perform complex analytics in milliseconds. Lucata’s breakthrough technology is compatible with any security system. Pathfinder accelerates and expands the capabilities of cybersecurity systems, enabling the detection and prevention of even the most advanced cyber attacks.