Protecting Against AI-Powered Malware Threats: The Varist Hybrid Detection Engine

Protecting-Against-AI-Powered-Malware-Threats-The-Varist-Hybrid-Detection-Enginedata

Varist Unveils Hybrid Detection Engine to Combat AI-Assisted Malware

A novel approach to detecting malware has been unveiled by Varist, a cybersecurity firm, in the form of its Hybrid Detection Engine.

Key Features of the Varist Hybrid Detection Engine

This cutting-edge solution leverages artificial intelligence to identify both known and zero-day threats, thereby providing a robust defense against AI-assisted malware.

  • Hyperscale scanning capabilities, with each instance processing approximately 500 files per second
  • Simulation of threats at speeds 1,000 times faster than conventional sandboxes, while maintaining low costs
  • Detection efficacy with less than 0.001% false positives
  • Analysis of suspicious files in under nine milliseconds
  • Protection at scale, safeguarding over five billion mailboxes worldwide through OEM partnerships

Expert Insights

According to Hallgrímur Th. Björnsson, founder of Varist, traditional methods of detecting unknown malware are no longer effective, as they assume that scanning every file is not feasible and that conventional sandboxing is too slow and costly.

Mike Fleck, a 20-year cybersecurity veteran, notes that the increased use of AI to create and execute malware campaigns could soon overwhelm conventional detection systems.

Benefits of the Varist Hybrid Detection Engine

Varist’s Hybrid Detection Engine addresses the need for a more scalable and cost-effective solution by leveraging a vast malware dataset of over 3 petabytes to deliver accurate detection of known and zero-day threats at the edge.

The engine simulates behavior in real-world environments and assigns risk ratings to help responders prioritize investigations.

Implementation and Integration

Varist’s flexible OEM implementation model enables hyperscalers, SASE, and cybersecurity providers to integrate the Hybrid Detection Engine and begin leveraging AI-scale detection and analysis within hours.

The engine is built with privacy in mind, operating entirely within a customer’s own infrastructure, ensuring that sensitive files never leave the environment.



About Author

en_USEnglish