www.3133.com拉斯维加斯(股份)有限公司

We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
The latest "AI Visual Security" solution combines CEC’s years of IT security expertise and operational best practices, with the latest innovation technologies (e.g., Visual Computing, Artificial Intelligence, Big Data Analytics, etc.) and powerful algorithms, to develop out-of-box security solutions to counter cybersecurity threats with AI-Powered VISUAL security services for future enterprises (“SEEING”), rapid identification of malware variants (“QUICK”) and CATCHING the malware family in FAST ways.
“Hide and Seek”Malware vs“Mix and Match”Visual Security

“Hide and seek” malware creates “botnets” by quietly infecting massive numbers of devices using advanced communications. CEC’s team created real novel breakthrough by turning evasive malware into graphic images.  They “mixed and matched” computer vision with AI algorithms, resulting in breakthrough malware classification.

CEC’s AI algorithm for malware classification uses Machine Learning and Visual Computing to identify malware, without reading file contents, without taking time to observe behavior, or even require very much computation. CPC’s technique cleverly processes suspicious files with a 3D RGB color image algorithm. Then a specialized “autoencoder” and a “weakly supervised learning network” discover hidden features of suspicious files. Small visual images can represent the entire original data, and are easily managed. The amazing breakthrough is when the CEC method uses AI-enhanced computer vision to “view” transformed images, detecting malware. In other words, this is “facial recognition” for malware, successful even when malware “hides” using disguises. CEC’s new method can use GPUs to handle image tasks, freeing up the main CPUs. CEC’s new method can more efficiently and effectively tackle increasing, more frequent and complex threats, with thorough analysis of past threats and behaviors so as to prevent them in the future. AI Visual Security can also identify upcoming mutated threats because even mutated threats under the same family could still be easily identified before they pose any risk.

Intelligent Threat Visualization for Evolving Threats Identification
    • High algorithm efficiency to shorten the data processing time
    • Able to process huge amount of data analysis scenarios in the digital world
    • Effectively prevent new evolving threats

Contact Us

Company Name:
Contact Name:
Title:
Tel:
Email:
Remark

Please slide to verify

Products & Services
Private Network Information Security Cloud Solutions Cloud Data Center Internet Services Managed Portal
Solutions
Automobile Finance Retail Manufacturing Real Estate Healthcare Others
Technology & Services
Consulting Services customer-services
Resources Center
Videos Product Leaflets New Offering White Paper Success Stories
About Us
Our Company Our Partners News Center Accreditation & Awards Careers Procurement
Contact Us

Sales Hotline4006517550

Contact Us

Copyright @ China Enterprise ICT Solutions Limited.

Need help? Chat with ChinaEntercom Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to China Enterprise ICT Solutions Limited ("China Entercom"). Your conversation with ChinaEntercom Robot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using ChinaEntercom Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue
The Showcase of China Entercom
XML 地图