{"id":6267,"date":"2022-05-18T16:05:23","date_gmt":"2022-05-18T08:05:23","guid":{"rendered":"https:\/\/www.cloudfall.cn\/?page_id=6267"},"modified":"2022-12-28T12:07:49","modified_gmt":"2022-12-28T04:07:49","slug":"redkernel","status":"publish","type":"page","link":"https:\/\/www.cloudfall.cn\/en\/?page_id=6267","title":{"rendered":"Redkernel"},"content":{"rendered":"\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">What is UEBA<\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Gartner\uff1a\u00a0User and Entity Behavior Analytics (UEBA), typically spans a certain time and scope to construct standard profiles and behaviors of users and entities (hosts, applications, network traffic and data stores). Activities that are anomalous to these standard baselines are indicated as suspicious, and packaged analysis of these anomalies can help identify threats and potential events.<\/li><li>UEBA solutions are converging with SIEM solutions, which are increasingly adding advanced analytics such as machine learning; while UEBA requires more collection, storage and platform capabilities.<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-15.png\" alt=\"\" class=\"wp-image-6324\" width=\"607\" height=\"356\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-15.png 1602w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-15-1500x882.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-15-768x452.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-15-1536x903.png 1536w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Why UEBA is needed ? <\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>According to the security consulting firm&#8217;s report, for the ratio of insider to outsider threats to the enterprise is approximately: 75% vs 25%<\/li><li>Cost and frequency of insider threats have increased dramatically over the past two years. the average cost of an insider threat incident in 2019 was $11.45 million, up nearly 31% from $8.76 million in 2018, and the number of threat incidents was 4,716, up 47% from 3,200 in 2018<\/li><li>Common enterprise pain points: missing data sources for insider threats \/ missing user behavior perspective \/ static rule-based prone to a lot of false positives and noise \/ missing long-cycle analysis algorithm capabilities<\/li><\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-16.png\" alt=\"\" class=\"wp-image-6326\" width=\"529\" height=\"337\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-16.png 1378w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-16-768x490.png 768w\" sizes=\"(max-width: 529px) 100vw, 529px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Redkernel UEBA<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">Cloudfall Redkernel aims to focus on insider threats and unknown threats based on users&#8217; existing data base and through pre-built machine learning algorithms and models. At the same time, through the long-term operation and improvement of the analyst team, the models and scenarios are constantly tuned and improved to make UEBA truly usable and intelligent.<\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Redkernel relies on public cloud and cloud-native technologies and does not require users to take on huge local computing resources or expertise in information security and machine learning.<\/li><li>Advanced analysis models and static association rules combine to set a baseline for normal user and entity activity to detect deviations from that baseline, the peer group&#8217;s baseline, and the organization.<\/li><li>Sensitive data loss and detection of insider threat risk signals.<\/li><\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\"><strong>Common application pain points<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>UEBA relies heavily on advanced analytical methods, and it is difficult for companies to effectively assess the skills and capabilities of their suppliers.<\/li><\/ul>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>For enterprise users, even for a single scenario and use case, UEBA deployment can be more time and labor intensive than the vendor promises. <\/li><\/ul>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Most enterprises do not use and operate SIEM solutions well and lack the data base, detection system, expert knowledge and other related conditions<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/image-17.png\" alt=\"\" class=\"wp-image-6329\" width=\"375\" height=\"222\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-17.png 1734w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-17-1500x891.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-17-768x456.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/image-17-1536x912.png 1536w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Redkernel Lite<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">In the era of big data, traditional manual analysis can no longer meet the needs of enterprise users who need to process massive amounts of data every day. RedKernel Lite, as an intelligent algorithm engine, can help enterprise users combine with their own data platforms to provide flexible anomaly detection capabilities through a PaaS-based approach.<\/p>\n\n\n\n<p style=\"font-size:15px;font-style:normal;font-weight:300\">RedKernel Lite relies on public cloud and cloud-native technologies for rapid deployment, expansion and use, and does not require user expertise in machine learning. As a product for enterprise users, RedKernel supports all types of databases commonly used in the industry and provides a simple and easy-to-use web-based operating platform.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized wp-duotone-e42121-ffffff-4\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/E2fFHVfts0.jpg\" alt=\"\" class=\"wp-image-6271\" width=\"655\" height=\"450\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/E2fFHVfts0.jpg 2086w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/E2fFHVfts0-1500x1033.jpg 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/E2fFHVfts0-768x529.jpg 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/E2fFHVfts0-1536x1058.jpg 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/E2fFHVfts0-2048x1411.jpg 2048w\" sizes=\"(max-width: 655px) 100vw, 655px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\"><strong>Main Functional Modules<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Redkernel supports automated feature engineering and model tuning, as well as various types of data. The built-in anomaly detection models support supervised, semi-supervised and unsupervised models, and algorithmic models across multiple categories such as time series prediction models, machine learning models and deep learning models. With the increasing emphasis on model interpretability, all of Redkernel&#8217;s built-in models provide model interpretability, which not only helps users better understand model prediction results, but also provides corroboration for model credibility.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-9 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-1f86a42210e8b5d3c3342ffa68e99653 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#cd797b;color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h3 class=\"has-text-align-center has-white-color has-text-color has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300\">User entity behavior analysis<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-5 wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<ul class=\"has-white-color has-text-color\" style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Combination of static rules and advanced analysis<\/li><li>Dynamic grouping and individual training<\/li><li>Multiple pre-built machine learning algorithms and models<\/li><li>Multi-tenant support<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-a8b630189aec144e99ec1b085b0fd3ce is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#f7b183;color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h3 class=\"has-text-align-center has-text-color has-medium-font-size wp-block-heading\" style=\"color:#6f7376;font-style:normal;font-weight:300\">Data source configuration<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-css-opacity has-background is-style-wide\" style=\"background-color:#6f7376;color:#6f7376\"\/>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-7 wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<ul class=\"has-text-color\" style=\"color:#6f7376;font-size:15px;font-style:normal;font-weight:300\"><li>Flexible support for multiple data sources input<\/li><li>Support offline training before predictive analysis<\/li><li>Support multi-scene output<\/li><li>API support<\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-14 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-20beb976a6efa74fd0c702c6cac025de is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#f7b183;color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h3 class=\"has-text-align-center has-text-color has-medium-font-size wp-block-heading\" style=\"color:#6f7376;font-style:normal;font-weight:300\">Feature Engineering<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-css-opacity has-background is-style-wide\" style=\"background-color:#6f7376;color:#6f7376\"\/>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-10 wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<ul class=\"has-text-color\" style=\"color:#6f7376;font-size:15px;font-style:normal;font-weight:300\"><li>Data processing, automatic detection, automatic cleaning<\/li><li>Support for extracting additional fine granularity features<\/li><li>Support for feature encoding, automatic selection of codes<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-b62caba15457e8813ca7e05aa5edce3c is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#cd797b;color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h3 class=\"has-text-align-center has-white-color has-text-color has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300\">Anomaly detection model<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-12 wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<ul class=\"has-white-color has-text-color\" style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Flexible calls and interpretations<\/li><li>Time series prediction<\/li><li>Machine learning models<\/li><li>Deep learning models<\/li><\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is UEBA Gartner\uff1a\u00a0User and Entity Behavior Analytic [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6267"}],"collection":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6267"}],"version-history":[{"count":41,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6267\/revisions"}],"predecessor-version":[{"id":6599,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/6267\/revisions\/6599"}],"wp:attachment":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}