What’s the advantage of anomaly detections?

Join us this month as in-house expert Craig Chamberlain walks through examples of things anomaly detections can catch that rules-based detections are blind to. He’ll share how he engineers detections for scaling cloud environments and ways to hone them so it’s not just another false-positive alert cannon.

There are a variety of use cases where anomaly detections outperform traditional methods of threat detection, with examples in this discussion focusing around supply chain and third-party access security. Walk away knowing why anomaly detections are the vital parallel function for traditional threat modeling and how to build trust within your team around the science behind statistical analysis.

What you will learn:
  • Uncover alerts found using anomaly detections that were missed by traditional detection methods
  • Use anomaly frameworks to secure supply chain and third party access use cases
  • Understand the advantages, drawbacks, and differences between machine learning, artificial intelligence, and statistical modeling in familiar security use cases

Uptycs live presenters

Craig_Chamberlain
Craig Chamberlain
Director of Algorithmic Threat Detection
Jeremy_Colvin-1
Jeremy Colvin
Technical Product Marketing Manager

Resources for
the modern defender

Prepare for any challenges that lie ahead by choosing
the right tools today.

Research

Gartner Hype Cycle for Application Security, 2022

ResourceBox_img_one
Gartner_icon
Research

Gartner Hype Cycle for Application Security, 2022

ResourceBox_img_one
Gartner_icon
Research

Gartner Hype Cycle for Application Security, 2022

ResourceBox_img_one
Gartner_icon

See Uptycs in action

Start with our free, no-obligation 35-day trial. Get comfortable with Uptycs using synthetic data, then deploy to a live environment.