An analysis model formed based on 360 security big data, operational experience and professional knowledge, which can automatically remove false alarms or false positive alarms from a large number of alarms and identify critical security incidents, making operations and responses more efficient and timely. Smart Intelligent can be integrated with a variety of security devices (SIEM, NDR, WAF, NGFW, etc.) by RESTful API.
  • As the cybersecurity situation nowadays is complex, a large number of alarm logs need to be dealt with every day, among which are false alarms, unimportant alarms and alarms related to critical threats.

    It’s very difficult to ensure the daily process be completed or identify critical incident alarms quickly to make timely response, and the analysts can be very frustrated going through the boring, repetitive daily working process, be prevented from doing any creative work.

    Smart Intelligent can provide a new solution.

Identify Critical Threats
Unlike traditional detection methods, Smart Intelligent can identify critical threats by analyzing the confidentially and relevance of particular alarms using analysis models based on multi-dimensional data.
Close the ‘Skill Gap’
Automatically runs around the clock, Smart Intelligent can help closing the ‘skill gap’ with the help of easy-to-measured professional knowledge from 360 Security Team.
Improve Analysts’ Effectiveness
Helps analysts get rid of the boring, repetitive manual analyzing process and focus on valuable work aiming to improve the whole security situation.
  • Cover Common Scenarios

    Including various types such as analysis of Internet-related attack alarms, analysis of suspicious outbound domains and IPs, can provide identification of false positive alarms, analysis of targeted attacks and recommendations for response decisions for different scenarios.

  • Linked with 360 Security Big Data

    Can directly provide the results of analysis of alarms, and determine the probabilities of unknown incidents from multi dimensions, with the help of large amount of 360 security big data.

  • Detailed Evidence

    Including basic network information, related samples, pDNS, certificates, historical incidents and related OSINT linked with certain IPs or domains, for the use of further investigation.

Threat Intelligence subscription
360 Threat Intelligence Platform
360 Local Security Team