Press Releases

XM Cyber Unveils AI Chat Interface, Empowering Users with Robust and Real-Time Security Insights

Getting your Trinity Audio player ready...

New Generative AI feature will provide automated support to allow direct access to the rich data lake within XM Cyber.

HERZLIYA, Israel – February 27, 2024 – XM Cyber, the leader in hybrid cloud exposure management, today announced the launch of their generative AI-powered chat interface empowering customers to harness the full power of XM Cyber’s vast security insights without the need for extensive technical expertise. The new feature allows customers to gain direct access to the rich data lake within XM Cyber. With the new GenAI capability, users can simply ask questions in their own phrasing and get answers from the system. The GenAI capability enables automatic discovery of different insights regarding the environment, such as machines where the EDR isn’t running. Using the new capability, organizations can easily investigate these insights

XM Cyber consolidates extensive data from diverse sources, including servers, workstations, IaaS cloud providers (Azure, GCP, AWS), PaaS like Kubernetes, and more. This varied data pool guarantees comprehensive security insights, surpassing the limitations of narrower solutions. The introduction of XM Cyber’s AI chat interface streamlines the navigation of this vast volume of insights, allowing users to effortlessly extract valuable information through a simple language interface. Unlike other solutions, the XM Cyber AI interface stands out by offering real-time and fresh data, eliminating the need for exhaustive retraining with every dataset change. This ensures a high degree of accuracy and up-to-date results, a distinctive feature in the realm of security solutions. With the ability to access real-time, fresh data and export AI-generated results, users can rely on a streamlined and efficient experience.

“We are thrilled to introduce this new AI chat interface, which marks a significant leap forward in user interaction with our cybersecurity solutions,” said Boaz Gorodissky, CTO & Co-Founder at XM Cyber. “The robustness and real-time capabilities of this feature empower our users to derive actionable insights effortlessly, ensuring their security posture remains at the forefront of the ever-evolving threat landscape.”

XM Cyber will continue to expand the AI chat interface by adding more data sources, potentially encompassing all the information collected by the company. The roadmap includes executing complex queries on big data, querying full-length long vectors, and seeking remediation advice specific to customer data and posture. Additionally, users can anticipate inquiring about attack techniques information, assessing risks to critical assets, and conducting choke point analysis, further enhancing the capabilities of XM Cyber’s AI interface.

To learn more about XM Cyber and its generative AI capabilities, please visit: https://www.xmcyber-staging.com/.   

 

About XM Cyber  

XM Cyber is a leading hybrid cloud exposure management company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP, and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might advance, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, Asia Pacific and Israel. 

 

Media Contact

Danielle Scotto for XM Cyber

ICR Lumina

[email protected] 

OS nameNotes
Fedora 40 and 41
Fedora Rawhide
Debian unstableNo stable versions affected
Alpine edge
Arch Linux
openSUSE
KaliVersions updated between 3.26-3.29 are impacted
How does Continuous Threat Exposure Management (CTEM) integrate with existing cybersecurity frameworks?

The Continuous Threat Exposure Management (CTEM) framework is designed to complement and enhance existing cybersecurity frameworks by providing a continuous, real-time approach to threat management. Traditional frameworks often emphasize periodic assessments and audits to identify vulnerabilities and manage risks. In contrast, CTEM focuses on an ongoing evaluation and mitigation process. It integrates with these frameworks by fitting into the risk management and mitigation strategies already in place, augmenting them with a more dynamic approach. This includes real-time monitoring and analysis, automated threat detection, and proactive threat hunting. By doing so, it ensures that the security posture of an organization is always up-to-date with the latest threat landscape, making existing frameworks more effective in addressing security challenges.

What specific technologies or tools are commonly used in a CTEM program to monitor and assess threats continuously?

In a Continuous Threat Exposure Management (CTEM) program, a variety of technologies and tools are employed to continuously monitor and assess threats. These typically include advanced threat detection systems, which use algorithms to detect anomalies and potential threats in real-time. Security Information and Event Management (SIEM) systems are also crucial, aggregating and analyzing log data from various sources within the organization to identify suspicious activities. Vulnerability assessment tools are used to regularly scan the IT environment for known vulnerabilities, while penetration testing tools simulate cyber-attacks to identify weaknesses. Furthermore, configuration management tools ensure that systems are configured correctly and consistently, minimizing security gaps. Together, these technologies provide a comprehensive view of an organization’s threat landscape, enabling proactive management and mitigation of risks.

mxcyber

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.