Conatix cysana (CYberSecurity ANAlytics) applies AI and other advanced technologies to help banks and companies detect insider fraud on their IT networks in real time

About

The Conatix cysana (CYberSecurity ANAlytics) insider threat detection system applies artificial intelligence to analyze everything on the screen of every employee endpoint (computer, tablet, phone) on a bank, company or government agency IT network, second by second, to stop insider fraud as early as possible. Conatix cysana innovates in 3 key areas: Data, Analytics and Interface. We stream the most granular data available, everything on the screen of every endpoint on a bank IT network even with tens of thousands of employees, second by second, all text, image, video in applications and in the browser – unlike other cybersecurity systems that start with highly summarized network-level data. We solve the problem of continuous massive fast data streaming and real-time analysis, on-premise behind the bank’s own firewall. For the interface, rather than issuing thousands of unprioritized text alerts per day to system administrators, we visualize the changing health of the IT network in 3D so both departmental and individual levels can be tracked visually.

Key Benefits

Extremely high protection of client identifying data (CID) and other proprietary data in a bank or company, which fulfills Swiss FINMA conditions and which may limit corporate liability under GDPR. Quick start availability as a preinstalled and preconfigured virtual appliance. Simple and limited number of required installation steps and internet connections: No server-side installation required. Easy rollout department by department or even device by device as required. Plug and play: No alteration of the company server or network is required to install the client-side interceptor. Real-time decryption of encrypted websites immediately and reliably within the browser on each individual device. Reliable interceptor which no action by individual users can circumvent. Automatic monitoring of each individual machine and user on a granular basis, so it is never necessary to separate out data streams from multiple machines. Immediate foolproof traceability of captured data to the specific computer it was intercepted from. The Conatix client-side interceptor does everything that a server-side interceptor does (fast setup, real-time warning, flexible integration with multiple data streaming and analysis systems, availability as a virtual appliance) and more, making it a value-adding enhancement to server-side or network-side interception. If suspicious activities occur, alerts and access denial are immediate. The system is autonomous but also integratable with existing SOC, SIEM and cyber measures.

Applications

moneylaundering, data theft, compliance violations, smart malware, insider fraud, bribery and corruption - early detection and mitigation

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations