While others boast about their threat intelligence through raw numbers of feeds, Whalebone Aura uses a security engine that draws from over 10 years of academic research and practical experience, public and private threat feeds, combined with machine learning to identify lurking threats other products miss. We also use unique means to optimize these feeds to deliver the most effective security, while maintaining the lowest false positive rate of comparable telecom security tools.
Whalebone uses more than 50 different public and proprietary threat intelligence feeds to identify likely threats, including those from local CERTs, malware analysts, security feed providers, and others. We integrate threat feeds for specific countries to better secure local users. We also include our own feeds of threats that our internal threat intelligence team identified.
Several malware techniques, including Domain Generation Algorithms and DNS tunneling attacks, are difficult to spot by common threat intelligence feeds since they are designed to avoid traditional detection methods – and are unknown to security tools that rely on lists. Whalebone Aura deploys several proprietary machine learning techniques to identify these hidden attacks in real time.
Many security providers treat all threat intelligence equally, regardless of their source, frequency, recency, or accuracy. Whalebone constantly optimizes feed data, independent of its source to identify relevant threats, without damaging the user experience by blocking safe sites or links.
Cybersecurity is only as good as its most recent update. Some security providers update their data twice a day, four times a day, or even six times a day. This leaves gaps in threat intelligence that can be exploited by malicious actors to compromise user devices. Thanks to Whalebone Aura’s unique hybrid deployment, updates happen in real time, continuously throughout the day, so users always have the most current security information, protecting them from threats.