本网站使用Cookies 以优化阁下的用户体验。继续浏览网页,以示阁下同意本站使用Cookies。详情请参阅Cookie政策私隐政策

确定
The latest "AI Visual Security" solution combines CPC’s years of IT security expertise and operational best practices, with the latest innovation technologies (e.g., Visual Computing, Artificial Intelligence, Big Data Analytics, etc.) and powerful algorithms, to develop out-of-box security solutions to counter cybersecurity threats with AI-Powered VISUAL security services for future enterprises (“SEEING”), rapid identification of malware variants (“QUICK”) and CATCHING the malware family in FAST ways.

“Hide and Seek”Malware vs“Mix and Match”Visual Security

“Hide and seek” malware creates “botnets” by quietly infecting massive numbers of devices using advanced communications. CPC’s team created real novel breakthrough by turning evasive malware into graphic images.  They “mixed and matched” computer vision with AI algorithms, resulting in breakthrough malware classification.

CPC’s AI algorithm for malware classification uses Machine Learning and Visual Computing to identify malware, without reading file contents, without taking time to observe behavior, or even require very much computation. CPC’s technique cleverly processes suspicious files with a 3D RGB color image algorithm. Then a specialized “autoencoder” and a “weakly supervised learning network” discover hidden features of suspicious files. Small visual images can represent the entire original data, and are easily managed. The amazing breakthrough is when the CPC method uses AI-enhanced computer vision to “view” transformed images, detecting malware. In other words, this is “facial recognition” for malware, successful even when malware “hides” using disguises. CPC’s new method can use GPUs to handle image tasks, freeing up the main CPUs. CPC’s new method can more efficiently and effectively tackle increasing, more frequent and complex threats, with thorough analysis of past threats and behaviors so as to prevent them in the future. AI Visual Security can also identify upcoming mutated threats because even mutated threats under the same family could still be easily identified before they pose any risk.

Intelligent Threat Visualization for Evolving Threats Identification

    • High algorithm efficiency to shorten the data processing time
    • Able to process huge amount of data analysis scenarios in the digital world
    • Effectively prevent new evolving threats

相关产品

资产梳理服务资产梳理服务

资产梳理服务

评估服务

漏洞评估服务漏洞评估服务

漏洞评估服务

评估服务

渗透测试服务渗透测试服务

渗透测试服务

评估服务

代码审查服务代码审查服务

代码审查服务

评估服务

联络我们
公司名称:
联络人姓名:
职位:
联系电话:

-

邮箱:
备注

请向右滑动验证

产品与服务
网络连接 信息安全管理 云端运算方案 云数据中心 互联网服务 管理服务 欧洲解决方案
解决方案
建筑、工程及建造 汽车 银行、金融服务及保险业 物流及运输 制造 法律和会计服务 零售 医疗保健
技术与服务
咨询服务 客户服务
资源中心
产品单页 最新优惠 视频 白皮书 成功案例 网志
关于我们
我们公司 合作伙伴 新闻中心 认证及奖项 职位招聘
联络我们

一般查询 / 销售热线 +60 3 2280 1500

客户服务热线 +60 03 2280 1488

联络我们

关注我们

Copyright © 中信国际电讯(信息技术)有限公司 CITIC Telecom International CPC Limited

恭喜您提交信息成功


我们会尽快与您联系!
需要帮忙?联络CPC聊天机械人
浏览器支持:IE11、Firefox、Chrome和Safari 的最新版本
条款及细则
欢迎来到中信国际电讯(信息技术)有限公司。阁下与CPC聊天机器人的对话内容可能会被记录,以作培训、质量监控和纠纷处理之用。如阁下点击「继续」并使用CPC聊天机器人,即表示阁下接受并同意受本公司之私隐政策约束,并同意本站使用Cookies。详情请参阅Cookie政策私隐政策
继续