You are here:  Home  >  Education Resources For Use & Management of Data  >  Data Daily | Data News  >  Current Article

InterCloud Launches New Machine Learning Security and Forensics Solution, X-Barrier

By   /  July 18, 2017  /  No Comments

by Angela Guess

A recent press release reports, “InterCloud Systems, Inc., a leading provider of cloud networking orchestration and automation solutions and services announced the release of its Health Care network Security and Forensics Solution – X-Barrier.  X-Barrier is a part of InterCloud’s suite of network management and automation products for Next-Gen Software Defined Networks (SDN) and traditional network environments. X-Barrier specifically targets the network security vulnerability of the Healthcare vertical where network and device security vulnerability can potentially be a matter of life and death. X-Barrier utilizes a new approach to network threat detection, which is based on Machine Learning (ML) and Artificial Intelligence (AI).  Analysis of network connection data is performed by utilizing non-deterministic algorithms, which allows detection of both known and unknown network threats and attacks.  X-Barrier does not require any pre-configuration as it utilizes a self-learning approach to data analysis and constantly adjusts its detection models.”

The release goes on, “X-Barrier functionality includes several major items: pro-active network protection, outside and inside network threat detection, reactive threat quarantine and permanent isolation. Pro-active protection is based on segmentation of organization’s INTRANET into separate areas. Each area has its own firewall perimeter and access rules. Network connections between the areas is restricted and constantly monitored by X-Barrier. Pro-active protection functions of X-Barrier are specifically modeled to segment and protect a typical Healthcare facility network layout where network zones have very different security requirements. X-Barrier segregates network domains of Operating Rooms, Patient Room networking equipment and other zones where network vulnerabilities could be life threatening, from other network zones such as clerical desktops where network security requirements can be less strict.”

Read more at Globe Newswire.

Photo credit: InterCloud

You might also like...

Case Study: Unilog Leverages Data Preparation to Monetize Upstream Data

Read More →
We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept