DeepGuardian

DeepGuardian presents a practical approach to developing a robust threat detection model while upholding data privacy and security for all involved clients. This is achieved by leveraging Federated Learning alongside privacy-preserving techniques like Multi-Party Computation, Secure Aggregation, Differential Privacy, and Homomorphic Encryption. The Federated Anomaly Detection model is designed to be trained by any node within 5G networks, spanning from cloud to edge. Through network flow analysis and Unsupervised Learning techniques, we can assess the likelihood of threats in received communications and respond by promptly blocking and flagging threats for immediate or future mitigation.

Details

Solutions category
Govern
Cybersecurity Supply Chain Risk Management
Risk Management Strategy
Business Impact Analysis
Identify
Asset Mangement
Content Filtering & Monitoring
IT Service Management
Patch Management
Software & Security Lifecycle Management
Vulnerability Management (Analysis)
Risk Assessment
Risk Management solutions & services
Protect
Human Risk Management
Cyber Ranges
Security Awareness Trainings
Identity Management, Authentication, & Access Control
Access Management
Authentication
Authorisation
Identity Management
Intrusion & Anomaly Prevention
Platform Security
Protective Technology
Cloud Security
IoT Security
Sandboxing
Technology Infrastructure Resilience
Respond
Incident Mitigation
Cyber Security Insurance
DDoS protection
Detect
Adverse Event Analysis
Intrusion Detection
Ideal organisation type
Academia
Freelancer/sole proprietor
Large Enterprise
Other
Public administration
Research Center
Small and Medium Enterprise
Deployment mode
Cloud, SaaS, web-based
Desktop Linux
On-premise Linux
DevOps cycle phase
Build: Incorporating security testing during the build process to detect issues early
Code Development: Writing secure code, with built-in checks for vulnerabilities
Deploy: Deploying securely configured applications and infrastructure
Feedback and Compliance: Gathering feedback on security risks, compliance requirements, and addressing any incidents or vulnerabilities detected
Monitor: Continuous monitoring for security incidents, vulnerabilities, and compliance violations
Operate: Ongoing security monitoring, threat detection, and compliance checks in the production environment
Planning: Identifying security requirements alongside development and operational goals
Release: Ensuring security compliance and signing off on all checks before deployment
Testing: Automated security testing, including static and dynamic analysis, vulnerability scans, and penetration testing
Supported languages
English
Portuguese

Training and support

Free trial available:
No
Support
Email/Help Desk
Available trainings
Yes

Ratings & reviews

This solution has not been reviewed yet.

Do you want to leave a rating?

Login or register to proceed

Login Register