![]() Meaning, most of the remediation happens after the fact. Despite many advances in cybersecurity, it remains primarily reactive. ![]() Spunk’s senior vice president and Chief technology officer said with the Morpheus framework, the company can rapidly prototype new capabilities and offload compute-intensive tasks to GPUs to benefit its customers.Ĭybersecurity breaches have gone up drastically, especially post-pandemic. The NVIDIA Morpheus framework helps provide a flexible and scalable platform for anomaly detection capable of adapting with the ever-changing cyber-threat landscape.” “Providing real-time, dynamic network maps will help identify areas where we can further strengthen our posture and serve as a foundation for enhancing ML-based anomaly detection. “Defending complex and evolving environments requires constant visibility,” said Adam Mishler, chief information security officer at Best Buy. NVIDIA collaborates with leading platforms and technology partners to optimize their data centre solutions for the NVIDIA Morpheus AI platform. The deep learning and machine learning models can be used in a Morpheus pipeline to detect leaked sensitive information, shady profiles, and phishing attempts. Developers can use the models through common deep learning frameworks like Caffe or Theano. Additionally, BlueField DPU goes beyond static security logging to incorporate a sophisticated dynamic real-time telemetry model. By incorporating the framework into a third-party cybersecurity offering, communication networks can benefit from the world’s best AI computing. NVIDIA BlueField DPU offloads accelerate and isolate mission-critical data centre infrastructure functions. Morpheus is a perfect solution for gathering real-time network data from any DPU-powered server in the data centre. ![]() The technologies work together to address all parts of the cybersecurity workflow. A pub/sub model (currently Kafka) is leveraged to send data to and results from the inference pipeline. Morpheus is built on technologies, including RAPIDS, Cyber Log Accelerators (CLX), Triton Inference Server, TensorRT, and cuStreamz. The Morpheus inference pipeline (left side). The actions allow continuous, real-time, and variable feedback to the NIC that can impact policies, rewrite rules, adjust sensing, etc. Morpheus generates actions from raw inference results that are routed back to the NIC. For sensitive information detection and phishing detection, this is often full packet data. Telemetry agents running on the NVIDIA DPU channel data to Morpheus. Morpheus can perform real-time inference across massive amounts of cybersecurity data and receive network telemetry from the NVIDIA BlueField-2 Smart NIC.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |