Loading...
You are here:  Home  >  Education Resources For Use & Management of Data  >  Data Daily | Data News  >  Current Article

InterCloud Launches New Machine Learning Security and Forensics Solution, X-Barrier

By   /  July 18, 2017  /  No Comments

by Angela Guess

A recent press release reports, “InterCloud Systems, Inc., a leading provider of cloud networking orchestration and automation solutions and services announced the release of its Health Care network Security and Forensics Solution – X-Barrier.  X-Barrier is a part of InterCloud’s suite of network management and automation products for Next-Gen Software Defined Networks (SDN) and traditional network environments. X-Barrier specifically targets the network security vulnerability of the Healthcare vertical where network and device security vulnerability can potentially be a matter of life and death. X-Barrier utilizes a new approach to network threat detection, which is based on Machine Learning (ML) and Artificial Intelligence (AI).  Analysis of network connection data is performed by utilizing non-deterministic algorithms, which allows detection of both known and unknown network threats and attacks.  X-Barrier does not require any pre-configuration as it utilizes a self-learning approach to data analysis and constantly adjusts its detection models.”

The release goes on, “X-Barrier functionality includes several major items: pro-active network protection, outside and inside network threat detection, reactive threat quarantine and permanent isolation. Pro-active protection is based on segmentation of organization’s INTRANET into separate areas. Each area has its own firewall perimeter and access rules. Network connections between the areas is restricted and constantly monitored by X-Barrier. Pro-active protection functions of X-Barrier are specifically modeled to segment and protect a typical Healthcare facility network layout where network zones have very different security requirements. X-Barrier segregates network domains of Operating Rooms, Patient Room networking equipment and other zones where network vulnerabilities could be life threatening, from other network zones such as clerical desktops where network security requirements can be less strict.”

Read more at Globe Newswire.

Photo credit: InterCloud

You might also like...

Using Your Data Corpus to Further Digital Transformation

Read More →