Microsoft Just Upgraded Sentinel With An Ai-powered Data Lake - Here's How It Works

Trending 1 month ago
gettyimages-2205047627
NurPhoto/Contributor/Getty

Microsoft is launching a caller agentic AI strategy to thief cybersecurity professionals negociate and protect their organizations' data, nan institution said Tuesday.

Microsoft Sentinel, a proprietary Security Incidents and Event Management (SEIM) platform, which debuted successful 2019, now comes pinch a information reservoir -- that is, a centralized repository that tin shop system and unstructured information without immoderate benignant of reformatting. 

Also: Microsoft fixes 2 SharePoint zero-days nether attack, but it's not complete - really to patch

The new-and-improved Sentinel is being promoted by Microsoft arsenic a information statement and aggregation instrumentality that tin thief cybersecurity teams negociate nan progressively immense quantities of information required to build and deploy caller AI tools. 

The institution is besides tapping into nan taste caché surrounding agents, aliases AI systems that tin interact pinch outer integer devices and autonomously execute tasks without definitive prompting from quality users.

"This is nan paradox of modern security: nan much information you have, nan harder it becomes to usage it effectively," nan institution said successful a property release. "And without unified, semipermanent visibility, moreover nan astir precocious AI models can't present to their afloat potential. Siloed information intends missed threats, delayed investigations, and underutilized tools. Microsoft Sentinel information reservoir was purpose-built to lick this situation and provides nan instauration for agentic defense."

The caller information reservoir -- disposable now successful preview -- provides a azygous interface wrong Microsoft Defender done which users tin position information information from Sentinel, arsenic good arsenic from different third-party providers. The strategy uses a built-in AI strategy to analyse information risks crossed each of these various sources successful existent time, flagging imaginable vulnerabilities and iteratively strengthening an organization's cybersecurity infrastructure complete time.

The extremity is to supply cybersecurity professionals pinch a much expansive and fine-grained level of visibility into nan afloat spectrum of their information data, while astatine nan aforesaid clip automatically taking action to optimize protection from outer threats.

Also: How to upgrade an 'incompatible' Windows 10 PC to Windows 11 - 2 free options

"This isn't conscionable a caller product, it's a caller architecture for information operations," nan blog station said.

The proliferation of powerful AI devices successful caller years has produced a cybersecurity arms race: while these systems coming caller possibilities for fraudsters and scam artists -- who usage them to brute-force passwords and mimic nan voices of existent people, conscionable to sanction a mates of examples -- they're besides being utilized to fortify protections against cyberattacks.

A caller study conducted by Mastercard, for example, recovered that galore financial services companies person saved millions of dollars done AI-powered cybersecurity methods.

Get nan morning's apical stories successful your inbox each time pinch our Tech Today newsletter.

Editorial standards
More