{"id":90614,"date":"2020-02-20T06:00:43","date_gmt":"2020-02-20T14:00:43","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90614"},"modified":"2023-05-15T23:29:00","modified_gmt":"2023-05-16T06:29:00","slug":"azure-sentinel-uncovers-real-threats-hidden-billions-low-fidelity-signals","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/02\/20\/azure-sentinel-uncovers-real-threats-hidden-billions-low-fidelity-signals\/","title":{"rendered":"Azure Sentinel uncovers the real threats hidden in billions of low fidelity signals"},"content":{"rendered":"

Cybercrime is as much a people problem as it is a technology problem. To respond effectively, the defender community must harness machine learning to compliment the strengths of people. This is the philosophy that undergirds Azure Sentinel. Azure Sentinel is a cloud-native SIEM that exploits machine learning techniques to empower security analysts, data scientists, and engineers to focus on the threats that matter. You may have heard of similar solutions from other vendors, but the Fusion technology that powers Azure Sentinel<\/a> sets this SIEM apart for three reasons:<\/p>\n

    \n
  1. Fusion finds threats that fly under the radar, by combining low fidelity, \u201cyellow\u201d anomalous activities <\/strong>into high fidelity \u201cred\u201d incidents<\/strong>.<\/li>\n
  2. Fusion does this by using machine learning to combine disparate data\u2014network, identity, SaaS, endpoint\u2014from both Microsoft and Partner data sources<\/strong>.<\/li>\n
  3. Fusion incorporates graph-based machine learning and a probabilistic kill chain to reduce alert fatigue by 90 percent.<\/li>\n<\/ol>\n

    \n

    \n\t
    \n\t\t
    \n\n\t\t\t\t\t\t\t
    \n\t\t\t\t\t\"\"\t\t\t\t<\/div>\n\t\t\t\n\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t

    Azure Sentinel<\/h2>\n\n\t\t\t\t\t
    \n\t\t\t\t\t\t

    Intelligent security analytics for your entire enterprise.<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t