aizoongroup.com aizoon.com.au aizoon.us
Logo Top Aizoon

KNOW, PROTECT, EMPOWER. DON’t LEARN malware

React sooner, recognise, not just identify

aramis brochure
aramis_dome
SHOW MORE

A DIFFERENT APproach

In a world where threats are evolving at an unprecedented pace, it is crucial to have a comprehensive view of your networks and systems.

Aramis allows you to monitor your network accurately, promptly and smoothly no matter the complexity of your organisation.

Aramis uses a specifically designed Machine Learning Engine and Deterministic Rules to enable organisations to identify unknown threats inside their perimeter by fostering human analysis through pre-attentive dashboards.

Aramis, Know A Different Aproach

KNOW

The detection process does not require vendor-specific or malware knowledge. The key factor is the knowledge of your environment trends and behaviour.

Aramis, Protect A Different Aproach

PROTECT

Aramis proprietary logic is designed to reduce the “dwell time” passing from the infection to the identification and eradication of malware to hours instead of days or weeks.

Aramis, Empower A Different Aproach

EMPOWER

Aramis does not rely on signature triggering; it highlights the presence of malicious behaviour, enabling the analyst to immediately identify and classify threats by collating the data presented in the pre-attentive dashboard.

HOW ARAMIS WORKS

COLLECT

Sensors are placed in various nodes of the network depending on the size and the magnitude of information flow. Each sensor gathers the data from its segment of the network, analyses it in real-time as it flows and sends the results of the statistical analysis to a NoSQL database.

ENRICH

Inside the NoSQL database, data is enriched with information coming from the aramis Cloud Service. The Cloud Service collects intelligence from various OSINT sources and from internally managed sources.

How to aramais Works 2 How to aramais Works 2

CORRELATE

aramis constantly runs two kinds of analyses on the stored data:

  • Deterministic Rules, tailored to the customer Risk perception, are able to spot and highlight risky conducts.
  • The Machine Learning Engine analyses the behaviour of each machine and correlates the current behaviour with its usual behaviour, highlighting even the slightest deviation.
How to aramais Works 3 How to aramais Works 3

VISUALIZE

Using pre-attentive graphs, humans can spot deviations from repetitive patterns much faster than computers, especially when there’s a lot of data to visualise. This particular ability is called cognitive ability. Our dashboards make use of pre-attentive processing to foster this kind of analysis, allowing at the same time in-depth analysis when needed, thanks to zooming, drill-down and filtering capabilities.

FOUR PILLARS

Aramis guide lines

Identify threats inside a network by highlighting the deviations from the network’s normal behaviour

Foster human analysis using pre-attentive dashboards and graphics

Take advantage of specifically designed Bayesian Network Artificial Intelligence Engine

Collect data passively without altering the current network layout

MALWARE LAB

Aramis, Malware Lab Image

The aramis Lab studies and classifies the behaviour of the most advanced malware. The Lab was built to constantly improve aramis' malware identification capabilities.

SOLUTIONS

To accomodate our client' needs we do propose aramis both as a Product, so that we can support in developing Cyber Security competences on your own, and as a Service, so you can feel protected at any time.​​

ARAMIS AS A SERVICE

Service Aramis

ARAMIS AS A PRODUCT

Product Aramis