A Layman's Guide To AI, Machine Learning and Its Importance To Endpoint Security
A Layman's Guide To AI, Machine Learning and Its Importance To Endpoint Security
Making Sense of an
Evolving Technology
Written by
Hal Lonas, CTO, Webroot
David Dufour, SVP Engineering, Webroot
George Anderson, Product Marketing Director, Webroot
Introduction as knowledgeable about how this technology works, or how it helps their
customers either?
“Progress is impossible without change,
The phrase we hear a lot from our customers is ‘it just works’. MSPs focus on
and those who cannot change their minds ‘real-life’ issues (not the how or why, but the what). They want to know, does
cannot change anything.” the technology really work or not?
While patient zero vendors valiantly did more, and managed to stop whole
‘families’ of infection using heuristics and advanced signature detection
techniques, the fundamental problem didn’t go away. Too many devices However, given the amount of ‘hype’ surrounding AI and machine learning,
were getting infected and the cost of remediation was so significant that it’s worth knowing a thing or two about these efforts.
organizations were creating remediation re-imaging budgets just to cover
infection costs. Artificial intelligence and machine learning are not the same thing.
Marketing campaigns and news articles blur the line and often confuse
As an industry, endpoint protection vendors needed to change their minds people into thinking that they are. They are not, and it’s important to
and do something new to change the game. Webroot was the first vendor to know the differences so you can understand how each helps to make your
do so by introducing a totally new cloud-based way of countering malware cybersecurity stronger.
with machine learning at its core.
In October 2011, Webroot launched Webroot SecureAnywhere® in the US What is artificial intelligence?
retail consumer market. It was the first of the so-called ‘next generation’ Artificial intelligence interacts with people, for instance emulating a human
endpoint security solutions, with a revolutionary architecture designed to as a ‘chat bot’. The AI component is that interactive component—the
harness machine learning and high automation to handle the volume and thing you can touch, feel, and see. AI technology is very nascent in its
variety of attacks customers were facing. cybersecurity application and we expect great things from it in the future.
There are of course many hurdles still to be overcome in making a computer
Our considerable experience selling antivirus solutions meant we knew we
act like a human. Right now the programming is restricted to applications
had to change how we thought about predicting, preventing, detecting and
like driverless cars, but that is a defined set of circumstances and a
remediating malware – and the best ways to do all of that given the threat
singular application being programmed, and still it has involved a lot of
landscape we faced. This brief guide will, we hope, provide you with both
software engineering.
a snapshot of what Webroot does today to harness machine learning to
predict, prevent and protect you against malware, plus give you a better True AI would be far more self-learning in its interactions. A good way to
understanding of why this technology is being put to use by next-gen vendors define it is that AI is the creation of software running in a machine that
to try to differentiate themselves in a crowded endpoint security market. can ‘think and act independently’ and, in doing so, completely emulate a
human being.
Computers Replacing Humans
Webroot has been ‘doing machine learning’ for more than a decade, What is machine learning?
and we do consider this a major key differentiator for our own and our You can think of machine learning as artificial intelligence’s nerdy cousin.
threat intelligence partners’ solutions. In fact, it’s highly likely your Machine learning models are designed to analyze data collected behind the
current organization is benefitting from Webroot machine learning via our scenes, with no human interface. Machine learning is the heavy science.
BrightCloud® Threat Intelligence services as we contribute near real-time It’s where all the data crunching takes place.
threat intelligence (TI) data to over 85 other network and security vendors.
A good way to think of machine learning is as a subset of AI focused on
However, for many small to medium-sized businesses (SMBs), that doesn’t using, as some vendors call it, ‘math’. But in reality we are talking about
really seem to matter. They have probably heard the terms artificial algorithms that self-learn and improve their findings and results without
intelligence (AI) and machine learning (ML), but aren’t sure how these being explicitly programmed to do so. Machine learning is now used
advancements are keeping them safe. Then, the many managed service extensively in cybersecurity, but has an effective and proven track record
providers (MSPs) we help to provide SMBs with security services are not with only a few vendors.
2
What about deep learning? Because of Webroot’s very early adoption of machine learning, we have
To be thorough, we need to mention deep learning. It’s another major fully harnessed a fifth-generation machine learning approach to analyze
technology that Webroot uses. Deep Neural Nets have been around and produce rich sources of contextual threat intelligence that directly
since 1975, but only started to emerge around 2007 with the increased increases the accuracy and capabilities of our own and other vendor
availability of affordable and powerful hardware. This subset of machine partners’ security protection.
learning is about improving the ‘training’ of machine learning models further It’s All about Data
by mimicking the human brain with multi-layered neural networks to get
‘better’ models. When it comes to machine learning and AI, it’s important that your vendor
has experience and access to both current and historical data. Webroot is
The best and only way to counter malware today fortunate that, for a company of our size, we have a disproportionately large
If you strip away the superfluous, the issues Webroot and others are trying access to both historical and current data to feed our models.
to solve using machine learning are clear. Malware and other threats are Webroot analyzes half a trillion security events per day, linking and pushing
constantly evolving, their volume is mostly increasing, and the ability to them through our models to enhance our analysis. We have a lot of access
predict and stop zero-day threats is essential. to information that new players in the cybersecurity space simply do not.
Machine learning is currently the best and, from Webroot’s perspective, only Data quality and volume are both vital to training up a model, but so is the
way to tackle these issues. With the right quality and quantity of data you processing power to make it actionable in a timely way.
can train and use machine learning to learn directly from data and predict the Webroot uses AWS as our primary Infrastructure as a Service (IaaS) partner.
likelihood of malware, a behavioral anomaly threat, and lots more. We are currently their tenth largest data business worldwide. We also access
Machine Learning is the best way to do this, as it adapts automatically to the San Diego Supercomputer Center at the University of California that lets
changing and evolving environments, a trait that’s so essential when todays’ us leverage up to 1 terabyte of RAM and 40-50 computing nodes for help
attacks are polymorphic and in constant change to avoid detection. Lastly, with our modeling.
it’s an issue of scale. Because, unlike humans who are limited in capacity, Out of all of this, Webroot publishes over 1,000 machine learning models per
get tired, make mistakes and get overcome by volume, machine learning is day that have typically used over 10 million data points and 20-50 million
tireless, highly scalable and makes far fewer mistakes. model parameters.
4
Conclusion
It’s pretty easy for vendors to claim they use machine learning in some
way. It’s not as easy to collect the right data, get accurate machine
learning deployed, work out how to train and update models, tie in
humans, and to allow customers to glean immediate and meaningful,
actionable data from them.
For the past nearly seven years, Webroot has been effectively and efficiently
protecting millions of consumers and hundreds of thousands of businesses
using machine learning to predict and stop malware and lots of other threat
vectors. The success of our approach is validated by the trust of not only our
customers and their clients, but also many other security and networking
vendors who rely on our machine learning and threat intelligence to help
protect millions of their customers too.
About Webroot
Webroot was the first to harness the cloud and artificial intelligence to protect businesses and individuals against cyber threats. We provide the number one security solution for managed service providers and
small businesses, who rely on Webroot for endpoint protection, network protection, and security awareness training. Webroot BrightCloud® Threat Intelligence Services are used by market leading companies
like Cisco, F5 Networks, Citrix, Aruba, Palo Alto Networks, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected
world. Headquartered in Colorado, Webroot operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity® solutions at webroot.com.
©2018 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, BrightCloud, FlowScape, and Smarter Cybersecurity are trademarks or registered trademarks of Webroot Inc. in the United States and other countries. All other trademarks are properties of their
respective owners. WP _ 110718 _ US 5