Our technology is different.

It is the result of over 10 years of research into security analytics for protecting large, complex, distributed systems from stealthy, multi-stage attackers.

Since inception, we have been continually recognised in awards and competitions. This includes shortlisting in the prestigious Lloyds Science of Risk Prize, selection into the first GCHQ Cyber Accelerator and Finalist in the Cyber Security Awards.

 

How It Works

There is no black-box magic here.

Our technology applies advanced security analytics underpinned by a Bayesian inference engine. Medulla aggregates uncertain, fragmented indicators of attack on an asset, in real time, to provide live intelligence of suspicious activity visible on your network and assets. Peer and historical anomaly engines augment the analytics by detecting when an asset starts behaving differently from a group of homogeneous peers or starts to demonstrate changes in trends to its cyber risk profile. All this is done in a way that is deterministic and entirely traceable, so evidence of the attack trail can be rapidly reconstructed to validate the warning or extract threat intelligence.

Security based on risk. Medulla is built on a probabilistic engine that quantifies the risk of an attack and predicts the likelihood of loss. This directs security operations to prioritise early intervention based on the severity of the observed threat on that asset. A set of tools including threat visualisation, risk metrics and event tracing ensure the management of cyber risk is clear, traceable and relevant to your organisation.

Intelligence at scale.  Medulla is designed from the outset for extreme scale. We have built a platform ready for volume, based on analytics with very low computation footprint. Our largest deployment today already handles over 1 billion security events a day. This power gives you the capability to handle the widest possible aperture, for the widest possible visibility, at low computation cost.

 
How-it-works.png