本網站使用Cookies 以優化閣下的用戶體驗。繼續瀏覽網頁,以示閣下同意本站使用Cookies。詳情請參閱Cookie政策私隱政策

確定
The latest "AI Visual Security" solution combines CPC’s years of IT security expertise and operational best practices, with the latest innovation technologies (e.g., Visual Computing, Artificial Intelligence, Big Data Analytics, etc.) and powerful algorithms, to develop out-of-box security solutions to counter cybersecurity threats with AI-Powered VISUAL security services for future enterprises (“SEEING”), rapid identification of malware variants (“QUICK”) and CATCHING the malware family in FAST ways.

“Hide and Seek”Malware vs“Mix and Match”Visual Security

“Hide and seek” malware creates “botnets” by quietly infecting massive numbers of devices using advanced communications. CPC’s team created real novel breakthrough by turning evasive malware into graphic images.  They “mixed and matched” computer vision with AI algorithms, resulting in breakthrough malware classification.

CPC’s AI algorithm for malware classification uses Machine Learning and Visual Computing to identify malware, without reading file contents, without taking time to observe behavior, or even require very much computation. CPC’s technique cleverly processes suspicious files with a 3D RGB color image algorithm. Then a specialized “autoencoder” and a “weakly supervised learning network” discover hidden features of suspicious files. Small visual images can represent the entire original data, and are easily managed. The amazing breakthrough is when the CPC method uses AI-enhanced computer vision to “view” transformed images, detecting malware. In other words, this is “facial recognition” for malware, successful even when malware “hides” using disguises. CPC’s new method can use GPUs to handle image tasks, freeing up the main CPUs. CPC’s new method can more efficiently and effectively tackle increasing, more frequent and complex threats, with thorough analysis of past threats and behaviors so as to prevent them in the future. AI Visual Security can also identify upcoming mutated threats because even mutated threats under the same family could still be easily identified before they pose any risk.

Intelligent Threat Visualization for Evolving Threats Identification

    • High algorithm efficiency to shorten the data processing time
    • Able to process huge amount of data analysis scenarios in the digital world
    • Effectively prevent new evolving threats

相關產品

資產梳理服務資產梳理服務

資產梳理服務

評估服務

漏洞評估服務漏洞評估服務

漏洞評估服務

評估服務

滲透測試服務滲透測試服務

滲透測試服務

評估服務

代碼審查服務代碼審查服務

代碼審查服務

評估服務

聯絡我們
公司名稱:
聯絡人姓名:
職位:
聯繫電話:

-

電郵:
備註

請向右滑動驗證

產品與服務
網絡連接 信息安全管理 雲端運算方案 雲數據中心 互聯網服務 管理服務 歐洲解決方案
解決方案
建築、工程及建造 汽車 銀行、金融服務及保險業 物流及運輸 製造 法律和會計服務 零售 醫療保健
技術與服務
咨詢服務 客戶服務
資源中心
產品單頁 最新優惠 視頻 白皮書 成功案例 網誌
關於我們
我們公司 全球生態圈夥伴 新聞中心 認証及獎項 職位招聘
聯絡我們

一般查詢 / 銷售熱線 +852 2170 7401

客戶服務熱線 +852 2331 8930

聯絡我們

關注我們

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

恭喜您提交信息成功


我們會盡快與您聯絡!
需要幫忙?聯絡CPC聊天機械人
瀏覽器支援:IE11、Firefox、Chrome及Safari 的最新版本
條款及細則
歡迎來到中信國際電訊(信息技術)有限公司。閣下與CPC聊天機器人的對話内容可能會被記錄,以作培訓、質量監控和糾紛處理之用。如閣下點擊「繼續」並使用CPC聊天機器人,即表示閣下接受並同意受本公司之私隱政策約束,並同意本站使用Cookies。詳情請參閱Cookie政策私隱政策
繼續