Deutsch | English

AI Platform for Cyber Analytics and Hybrid SecOps

Look Under the Hood of a Next Generation Cyber Defense Platform
What makes the solution tick ?

Traditional SIEM-based security monitoring cannot detect complex, targeted, or unknown attacks. It is unable to analyse a high volume of varied data. In short: it is unable to defend you from next-generation cyberattacks.

In response, we have evolved beyond SIEM, and built a truly comprehensive MDR service powered by our next-generation AI platform—AIsaac

AIsaac runs on a Hortonworks Big Data platform and uses next-generation algorithms to detect complex, targeted, and unknown attacks. With AIsaac, we can continuously analyse your organization’s data to detect your attacks in near real-time. Once a threat is detected, AIsaac accelerates and fully orchestrates your fast, accurate, and effective response to remediate your threats in minutes, not months.

Today, AIsaac offers the industry’s only fully integrated platform that enhances a full suite of “left-of-hack-to-right-of-hack” Cyber Defense services.

AIsaac enhances detection and response at every stage of a threat’s lifecycle:

Threat Anticipation

Proactively defends you against your most relevant threats. Mines over 100 TB of global threat data daily. Identifies emerging global threats. Correlates each threat’s impact against your assets, and learn which threat is most likely to strike.

Threat Hunting

Analyses terabytes of data in seconds. Deploys 550+ AI models and use cases. Detects unknown threats, and hidden campaigns, that traditional security misses within your endpoint data, user data, network data, and application data.

Security Monitoring

Constantly monitors the risk level of your assets, users, and external IPs to identify your greatest threats. Reviews historical alerts via probabilistic models to identify assets, and uncovers deeper links between alerts between existing rules-based systems.

Incident Analysis

Quickly removes irrelevant noise. Only flags likely incidents. Scores context, behaviour, and threat intelligence data to prioritize alerts. Automates asset forensics, attacker attribution, attack chain creation, and identification of patient zero to confirm or reject incidents.

Incident Response

Responds rapidly to incidents. Deploys hundreds of playbooks to swiftly remediate threats. Centralizes, orchestrates, and automates the four key incident response processes—containment, recovery, mitigation, and control improvement. Reduces dwell time from weeks to under one day..

Breach Management

Manual breach management is slow, and often does not uncover the full extent of an attack. By deploying AIsaac, we are able to facilitate the collection of critical data, investigate and contain the full scope of any discovered breaches, and automate proven playbooks for data breach management.

Client Testimonials

  • Paladion’s AI-driven MDR service gives us world-class security at a fraction of the price we’d pay if we tried to build out equal cyber defenses on our own. They’ve become a true partner with our in-house team—not just another vendor—and they guide us through both the strategic and tactical ins-and-outs of maintaining truly world-class security services.

    VP of Information Security
    Global Professional Services Firm

  • QualityKiosk Technologies is one of the world’s largest independent quality assurance providers. We sought a world-class cyber security provider that could enhance our online defense capabilities in an increasingly complex cyber space. We found this in Paladion’s Managed Detection and Response service. Paladion was able to swiftly deploy their technology and services across our vast network. We see a significant improvement in our threat detection maturity with their MDR threat hunting, and our in-house IT teams no longer need to spend their efforts analyzing and remediating complex cyber threats. Paladion has provided us the much-needed security assurance with their MDR service.

    Mukund Dadarkar, Head IT and CISO
    Quality Kiosk

  • Paladion’s AI-driven MDR service has powerfully augmented our existing security posture. They tailored their security services to meet our specific needs and deployed their services quickly and simply. They both increased the speed of our detection and response, and done so with a very high-touch, people-first approach that our internal security team loves.

    Chief Information Officer.
    Fortune 500 Manufacturing Company

  • Recently, we’ve suffered more cyber attacks. Even worse, these attacks are more complex and harder to detect. We finally realized we could no longer effectively manage our security on our own. That’s when we turned to Paladion. They supported us with proven, effective security experts (who we couldn’t find on our own), and a powerful AI-driven platform that keeps up with the flood of potential threats we deal with daily. We couldn’t have done this on our own.

    Chief Information Security Officer
    Leading Healthcare Organization

  • We operate in a highly regulated industry, that’s very complex and a huge target for cyber criminals. Paladion has identified holes in our existing security structures, solved our most complex security issues, and done so with extreme sensitivity to helping us maintain compliance. They provide full reporting in the event of anything resembling a security event, and keep us operational, and in good stead with our regulators, no matter what happens.

    Head of Global Technology
    Fortune 100 Financial Services Firm

  • We had a good handle on all of the normal, known attacks coming our way. But Paladion detected threats that no one had discovered yet… including a few threats that had been lurking inside our system for almost a year that our traditional security measures hadn’t detected. Since partnering with Paladion, we no longer worry about all those “unknowns” threats we didn’t we were ignoring. "

    Senior IT Director
    National Retail Chain

Register for a one-on-one platform demo with our cybersecurity specialists

Data Theft by Undetected Malware

Responds Two days after we deployed our services for a large bank with 250,000+ endpoints, we detected a previously undetected data-theft keylogger. The malware was sending information to an external URL that had not received a blacklist score from any threat intelligence feed. However, our AI models detected anomalous beaconing behavior within terabytes of netflow traffic by utilizing information gain theory (entropy of sets) and a multivariate gaussian model. We discovered the malware had been planted five months prior, and had been sharing key logs captured from infected systems in repeated, smaller chunks at regular intervals the entire time.

What Paladion Found

  • Malware beaconing behaviour within multiple client endpoints
  • Data-theft keylogger malware variant operative over prior five months that had not been detected by existing security
  • IOCs of the new variant found and scanned across all endpoints

Drive-By-Download Infection

Within a financial institution, we detected a drive-by-download-based infection of multiple systems. Employees of the financial institution were offered a company-sponsored course at an educational institute. They visited the educational institute’s website to acquire course details, and to register. However, the educational institute’s website had been compromised and was distributing malware, and the financial institution’s employees downloaded the malicious file using drive-by-download. Multiple systems with browser vulnerabilities at the financial institution were infected.

Our watering-hole model identified this compromised behavior through analysis of proxy traffic, netflow traffic, and EDR data. It utilized non-parametric statistical model and behavior profiling to detect the infection.

What Paladion Found

  • The sudden, compromised behaviour of multiple users.
  • Traced the infection to the website distributing
  • Identified the compromised educational institute as the source of the infections

Multiple Data Exfiltration Activities

We have detected multiple data exfiltration activities, within multiple customer environments. We have successfully detected changes in data transfer behavior by comparing user’s past profiles, peer comparison analysis, and non-equal clustering techniques.

What Paladion Found

  • The data transfer of 900MB of confidential data to an AMazon S3 storage bucket, performed by a disgruntled employee.
  • The theft of 60MB to a microblogging website,, stolen in smaller chunks via slow confirmed slow data exfiltration.
  • Data exfiltration of files with different extensions through a secure channel, to private dropbox folders and multimedia sites.

Low-Noise Targetted Attacks

We helped to detect previously-undetected low-noise targeted attacks within multiple customer sites. Our attack association model—built on a modified version of market basket analysis—identified anomalous attack behavior from detected targeted attacker IPs. Our model’s association techniques clustered together all attacks occurring on one day. We then separated out attacks anomalous to all other attacks observed in that day, and identified the involved attacker’s IP.

What Paladion Found

  • A targeted attack utilizing a DNS protocol, involving an IP from China
  • Unauthorized probing activities from a discontinued security service provider

Crypto Mining Operations

We detected multiple compromised endpoints running the Trojan NsCpuCNMiner32.exe, and software that uses the infected computer’s CPU to mine the Monero digital currency. The Trojan spreads as an executable (called Photo.scr). When started, it copies itself to every drive on the infected computer, and then extracts an executable (called NsCpuCNMiner32.exe) to the %Temp% folder to launch the executable. When launched, it co-opts all available CPU processing power to mine the Monero digital currency.

What Paladion Found

  • Programs running the command line “C:\Users\> user name> \ App Data\ Roaming\ Images\ NsCpu CNMiner32.exe”
  • Measured 1% expectancy identifying the program as a top outlier.
  • A program hashcode that has been blacklisted by a dozen AV vendors.

Remote Access Trojan (RAT)

We have unearthed multiple RATs planted and operationalized in our clients’ networks. These RATs attempted to create a back door within each network, and gain administrative control over the infected computer. Most RATs were unintentionally downloaded within a seemingly-innocuous user-requested program.

We leveraged our AI to determine these program’s bayesian expectancy. We then fed low-expectancy programs into our neural networks, which matched its program sequence against relevant, known malware families and classified them as bad.

What Paladion Found

  • Services running the command line “c:/windows/help/ismosee.exe”
  • Measured 1% expectancy identifying the program as a top outlier, with a code pattern in the binary that closely resembled known RAT tools
  • Through reverse-engineering, we revealed this program exhibited multiple Trojan-like behaviours (including remote access, computer slow-down, Windows directory access, constantly modified files in the Windows directory, external data transmission).

Binary Impersonation

We detected multiple fake programs running under the name of legitimate Windows processes. To identify these binary impersonations, we leveraged our hashcode distribution analysis technique. We uncovered programs running the command line “C:\Users\ conserve.cfsjnpt.ACMHO\ AppData\ Roaming\ svchost.exe”, running from the inappropriate directory, and thus identified as an outlier. Through reverse engineering, we revealed the executable was creating a resource fork file commonly used to hide data. We observed multiple forms of anomalous behaviour.

Gartner's Guide to MDR - Peer Insights

AI by the Numbers

How Paladion stops next–generation threats in minutes–not months

The age of AI-driven cyberthreats has arrived. AI-driven cybersecurity is now a necessity.

In response, many security providers are scrambling to offer their own version of AI-driven cybersecurity. Unfortunately, many are simply MSSPs, and other last-generation providers, layering an off-the-shelf AI platform to make their outdated services appear relevant.

In contrast, Paladion’s AI-driven MDR service is built on solid ground. We leverage 17+ years of experience delivering cyber defense to over 700 clients in a diverse range of industries and geographies. Our AI platform—AIsaac—delivers high-speed detection by deploying comprehensive techniques that include supervised, unsupervised, deep learning, and NLP. AIsaac augments our 1,000+ globally-located cybersecurity experts, allowing them to process billions of events.

The result: Paladion executes detection & response across the full lifecycle of a threat in minutes— not months.

To detect and stop next-generation attacks threatening your organization, contact Paladion today to schedule your free demo and consultation.

Combat Sophisticated Cyber Threats with AIsaac