Apart from game-changing security technologies, market movement indicates that machine learning is a product feature. Credit: Thinkstock Around 2010, security analytics technologies started to integrate big data science and open-source technologies like Hadoop (and HDFS), Pig, Mahout, etc. The goal? Ingest, process, and apply new types of algorithms to security data to supplement human intelligence for finding needles in growing haystacks of security data. The U.S. Department of Energy was an early pioneer in this area with a project called Orca from the Oak Ridge National Lab. Since then, big data security analytics sort of morphed into machine learning, which led to the creation of a new security technology category: user and entity behavior analytics (UEBA). UEBA was designed to monitor user behaviors such as logins, remote access, network connections, etc., model “normal” behavior, and then detect anomalies that may indicate an attack in progress. UEBA proponents claimed that based upon this new capacity, new machine learning-based technology were destined to become a huge market as it replaced SIEM as the system of record for security analytics and operations.When I heard the UEBA story for the first time, I had to ask a common question: Do machine learning-based security tools constitute a new type of product, or will machine learning technology simply turn into a product feature built into existing security technologies?Companies build up their machine learning muscle via acquisitionsAs of this week, the market seems to have spoken. Yesterday, RSA acquired Fortscale, a UEBA veteran. RSA plans to make Fortscale a machine learning analytics feature set for its NetWitness platform. (It should also be noted that even as an independent company, Fortscale was often used as a machine learning backend to other security technologies, such as authentication and DLP.) Similarly, VMware scooped up E8 Security last week to add machine learning algorithmic muscle to its Workspace ONE modern endpoint management platform. These recent deals are far from a market anomaly, the trend has been happening for many years. Splunk acquired Caspida in 2015 to marry UEBA analytics with SIEM. HP grabbed Niara in 2017 as a security complement to Aruba network access capabilities. Bay Dynamics and Symantec have teamed up to add machine learning analytics to DLP. The list goes on and on.It’s also worth noting that machine learning has found its way into other security technologies — as a feature set. Network behavior analytics (i.e. Darktrace, Palo Alto Network’s Magnifier, Vectra Networks, etc.) all greatly leverage machine learning algorithms to spot and analyze anomalous network connections. The same can be said for the endpoint security crowd. Traditional AV vendors such as McAfee, Sophos, Symantec, Trend Micro, and Webroot have all added machine learning capabilities to bolster their ability to detect and block targeted and zero-day exploits and malware. So, does this mean that stand-alone products based upon machine learning are goners? No. The intersection between artificial intelligence (AI) and security technology is still in its genesis phase, and we are in a cycle of massive innovation right now, driven by cloud computing, open source, big data technologies, AI, etc. Given this, CISOs should remain open minded about new types of more revolutionary security technologies that aren’t simple adjuncts to what they’ve done in the past. Yup, there will be plenty of innovation around machine learning-based security tools, but the market is still sending a clear message to entrepreneurs and investors: Except for game-changing types of security technologies, machine learning appears to be a feature and not a product. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe