Jump to content
AIT Logo

Cyber Security

Here at the AIT Center for Digital Safety & Security, we are aware that in this diverse world of countless emerging new cyber threats, 100% cyber security is an impossibility. But we can help businesses and administrations alike to enhance the resilience of their critical networks and IT infrastructures, and to protect their assets to the highest extent possible.

That’s why our scientists are working on leading-edge machine-learning technologies and solutions appropriate to serve the future cyber defence ecosystem in order to tackle cyber threats arising from the emergence of comprehensive ICT networks with their increasing interconnectedness and unclear attack surfaces. For example, AIT has developed Automatic Event Correlation for Incident Detection technology (AECID), a patented solution inspired by approaches from the domain of bio-informatics, to build up system behaviour models to understand relevant events and their interrelationships. Our self-learning solution for adaptive network log stream processing can help to detect, classify and cluster frequently occurring patterns in log files and events, and to eventually distinguish the known good from unknown malicious activities in the IT infrastructures of enterprises.

abstract brain network

CAIS Cyber Attack Information System

Distributed ICT systems are now ubiquitous and complex. In the future, the security of ICT systems can no longer be guaranteed using traditional methods and procedures.

Network servers racks with skyline

Cyber Range

The AIT experts are working on the latest cybersecurity technologies to protect our digital systems against the increasing cyber threats. In addition to security by design, new encryption technologies and artificial intelligence, a central focus is also on the operation of a modern cyber training center


Cyber Security

AIT´s Cyber Security experts can help businesses and administrations alike to enhance the resilience of their critical networks and IT infrastructures


Cyber Range

A cyber range is used as a safe, realistic environment to train, conduct and analyze security incidents in scenarios independently of production systems


AECID

"AECID" stands for "Automatic Event Correlation for Incident Detection" and is an intelligent cyber security tool

Contact Request

Required fields are marked with an *.