• United States



Contributing Writer

Machine learning: Security product or feature?

Apr 06, 20183 mins
Machine LearningSecurity

Apart from game-changing security technologies, market movement indicates that machine learning is a product feature.

big data data scientist artificial intelligence machine learning
Credit: Thinkstock

Around 2010, security analytics technologies started to integrate big data science and open-source technologies like Hadoop (and HDFS), Pig, Mahout, etc. The goal? Ingest, process, and apply new types of algorithms to security data to supplement human intelligence for finding needles in growing haystacks of security data. The U.S. Department of Energy was an early pioneer in this area with a project called Orca from the Oak Ridge National Lab. 

Since then, big data security analytics sort of morphed into machine learning, which led to the creation of a new security technology category: user and entity behavior analytics (UEBA). UEBA was designed to monitor user behaviors such as logins, remote access, network connections, etc., model “normal” behavior, and then detect anomalies that may indicate an attack in progress. UEBA proponents claimed that based upon this new capacity, new machine learning-based technology were destined to become a huge market as it replaced SIEM as the system of record for security analytics and operations.

When I heard the UEBA story for the first time, I had to ask a common question: Do machine learning-based security tools constitute a new type of product, or will machine learning technology simply turn into a product feature built into existing security technologies?

Companies build up their machine learning muscle via acquisitions

As of this week, the market seems to have spoken. Yesterday, RSA acquired Fortscale, a UEBA veteran. RSA plans to make Fortscale a machine learning analytics feature set for its NetWitness platform. (It should also be noted that even as an independent company, Fortscale was often used as a machine learning backend to other security technologies, such as authentication and DLP.) Similarly, VMware scooped up E8 Security last week to add machine learning algorithmic muscle to its Workspace ONE modern endpoint management platform. 

These recent deals are far from a market anomaly, the trend has been happening for many years. Splunk acquired Caspida in 2015 to marry UEBA analytics with SIEM. HP grabbed Niara in 2017 as a security complement to Aruba network access capabilities. Bay Dynamics and Symantec have teamed up to add machine learning analytics to DLP. The list goes on and on.

It’s also worth noting that machine learning has found its way into other security technologies — as a feature set. Network behavior analytics (i.e. Darktrace, Palo Alto Network’s Magnifier, Vectra Networks, etc.) all greatly leverage machine learning algorithms to spot and analyze anomalous network connections. The same can be said for the endpoint security crowd. Traditional AV vendors such as McAfee, Sophos, Symantec, Trend Micro, and Webroot have all added machine learning capabilities to bolster their ability to detect and block targeted and zero-day exploits and malware.

So, does this mean that stand-alone products based upon machine learning are goners? No. The intersection between artificial intelligence (AI) and security technology is still in its genesis phase, and we are in a cycle of massive innovation right now, driven by cloud computing, open source, big data technologies, AI, etc. Given this, CISOs should remain open minded about new types of more revolutionary security technologies that aren’t simple adjuncts to what they’ve done in the past. 

Yup, there will be plenty of innovation around machine learning-based security tools, but the market is still sending a clear message to entrepreneurs and investors: Except for game-changing types of security technologies, machine learning appears to be a feature and not a product.

Contributing Writer

Jon Oltsik is a distinguished analyst, fellow, and the founder of the ESG’s cybersecurity service. With over 35 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies. Jon focuses on areas such as cyber-risk management, security operations, and all things related to CISOs.

More from this author