Human security

MicroAI Security provides asset protection against cybersecurity intrusions

MicroAI announced MicroAI Security to help protect critical assets, IoT devices, and industrial and manufacturing systems from cybersecurity intrusions.

MicroAI Security provides a revolutionary approach to mitigate these attacks, with a built-in AI algorithm that can detect, alert and visualize cybersecurity intrusions in real time, and run directly on devices connected to the edge and endpoints. . The algorithm teaches a connected device to self-monitor and provide alerts when abnormal behavior is identified.

“Zero Day attacks are operationally crippling and cost an organization millions of dollars to fully recover,” said MicroAI CEO Yasser Khan. “Unfortunately, the spread of these incidents is only increasing, and MicroAI Security provides a really effective approach to detect these attacks.”

MicroAI Security uses a proprietary AI algorithm that is small enough in terms of code size and computation to integrate into almost any microcontroller (MCU) or microprocessor (MPU) in a connected device – such as motors, sensors, pumps, medical devices, inspection equipment and automotive entertainment systems. This device-centric approach enables more immediate, automated, and reliable asset protection than solutions that rely on cloud connectivity.

MicroAI Security creates custom AI intrusion detection models that are unique for each device and deployment. MicroAI Security trains and develops a model of normal device operation, then goes into inference mode for real-time detection of anomalies or cyber intrusions.

Training and inference is performed without human intervention, and once activated, MicroAI can detect and identify even the most covert cybersecurity intrusions, including “zero day attacks”.

This early detection is supported by intelligent workflows that trigger automated alerts and mitigation actions to help minimize exposure and damage. Several types of attacks are mitigated by MicroAI Security, including Distributed Denial of Service (DDOS), ransomware, phishing, and cloud breaches.