We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
The latest "AI Visual Security" solution combines CPC’s years of IT security expertise and operational best practices, with the latest innovation technologies (e.g., Visual Computing, Artificial Intelligence, Big Data Analytics, etc.) and powerful algorithms, to develop out-of-box security solutions to counter cybersecurity threats with AI-Powered VISUAL security services for future enterprises (“SEEING”), rapid identification of malware variants (“QUICK”) and CATCHING the malware family in FAST ways.

“Hide and Seek”Malware vs“Mix and Match”Visual Security

“Hide and seek” malware creates “botnets” by quietly infecting massive numbers of devices using advanced communications. CPC’s team created real novel breakthrough by turning evasive malware into graphic images.  They “mixed and matched” computer vision with AI algorithms, resulting in breakthrough malware classification.

CPC’s AI algorithm for malware classification uses Machine Learning and Visual Computing to identify malware, without reading file contents, without taking time to observe behavior, or even require very much computation. CPC’s technique cleverly processes suspicious files with a 3D RGB color image algorithm. Then a specialized “autoencoder” and a “weakly supervised learning network” discover hidden features of suspicious files. Small visual images can represent the entire original data, and are easily managed. The amazing breakthrough is when the CPC method uses AI-enhanced computer vision to “view” transformed images, detecting malware. In other words, this is “facial recognition” for malware, successful even when malware “hides” using disguises. CPC’s new method can use GPUs to handle image tasks, freeing up the main CPUs. CPC’s new method can more efficiently and effectively tackle increasing, more frequent and complex threats, with thorough analysis of past threats and behaviors so as to prevent them in the future. AI Visual Security can also identify upcoming mutated threats because even mutated threats under the same family could still be easily identified before they pose any risk.

Intelligent Threat Visualization for Evolving Threats Identification

    • High algorithm efficiency to shorten the data processing time
    • Able to process huge amount of data analysis scenarios in the digital world
    • Effectively prevent new evolving threats

Seotud tooted

Asset Identification Service Asset Identification Service

Asset Identification Service

Assessment Services

Vulnerability Assessment ServiceVulnerability Assessment Service

Vulnerability Assessment Service

Assessment Services

Penetration Test ServicePenetration Test Service

Penetration Test Service

Assessment Services

Code Review ServiceCode Review Service

Code Review Service

Assessment Services

Võtke ühendust
Ettevõtte nimetus:
Kontaktisiku nimi:


E-posti aadress:

Kinnitamiseks lohistage

Tooted ja Teenused
Euroopa lahendused Võrgustiku loomine Infoturve Pilvelahendused Pilvandmekeskus Internetiteenused Haldatavad teenused
Arhitektuur, projekteerimine ja ehitus Autotööstus BFSI Logistika ja transport Tootmine Õigus- ja raamatupidamisteenused Jaemüük Healthcare
Tehnoloogia ja teenused
Konsultatsiooniteenused Klienditeenindus
Teenuste brozüürid Uued pakkumised Videod Valge raamat Edulood Blogi
Meie firma Globaalsed ökosüsteemi partnerid Uudised Akrediteerimised ja auhinnad Karjäär
Võtke ühendust


Tehniline abi +372 622 33 90

Võtke ühendust

Jälgi meid

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Täname Teid päringu eest.

Võtame Teiega peagi ühendust.
Kuidas saada ühendust
Helistage meile

372 622 33 99

Kirjutage meile

Saatke meile oma küsimus