{"id":1855,"date":"2021-02-22T07:52:11","date_gmt":"2021-02-22T00:52:11","guid":{"rendered":"https:\/\/www.aml-systems.co.th\/th\/?page_id=1855"},"modified":"2022-08-26T17:41:58","modified_gmt":"2022-08-26T10:41:58","slug":"deepinstinct","status":"publish","type":"page","link":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/","title":{"rendered":"Deep Instinct"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1855\" class=\"elementor elementor-1855\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28ed78e elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28ed78e\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-c656f0e\" data-id=\"c656f0e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad88d4d elementor-widget elementor-widget-text-editor\" data-id=\"ad88d4d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tPrevention Starts with Deep Instinct\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bfb5ff elementor-widget elementor-widget-text-editor\" data-id=\"9bfb5ff\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The cyber threat landscape is deep, varied, and constantlyevolving with new malicious tactics, delivery methods, and known as well as unknown malware. Most security platforms emphasize detection and remediation, focusing on assessing and responding once a breach has occurred and damage has been done. But this is a \ufb02awed and outdated approach to cyber defense.<\/p><p>With more than 350,000 new malware variants discovered each day and ransomware attacks \u2013 and their payouts \u2013 at an all-time high, it\u2019s time to rethink threat detection and response. At Deep Instinct, we <strong>predict<\/strong> security<br \/>risks others can\u2019t see and we <strong>prevent<\/strong> threats that others can\u2019t stop.<\/p><p>The Deep Instinct Prevention Platform is grounded in the world\u2019s \ufb01rst and only purpose-built deep learning cybersecurity framework. Powered by a deep neural network brain that mimics the logic and learning of the human brain, the Deep Instinct Prevention Platform anticipates and prevents attacks with unmatched speed andaccuracy. We stop attacks before they happen, identifying malicious \ufb01les in &lt;20ms and preventing attacks pre-execution.<\/p><p>Our prevention\u2013\ufb01rst approach provides a proactive security posture that protects your organization\u2019s hybridnetwork while maintaining the lowest false positives in the industry. Regardless of your current security posture,you need Deep Instinct too.<\/p><p>We\u2019re so con\ufb01dent in our approach that we <strong>promise<\/strong> to stop 100% of ransomware and back it up with an industry-leading $3M warranty backed by Munich Re. We take our commitment to our customers a step further by also<br \/>o\ufb00ering a false-positive guarantee of &lt;0.1%.<\/p><p>We prevent malware. Guaranteed.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-596f426\" data-id=\"596f426\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19121c5 elementor-widget elementor-widget-image\" data-id=\"19121c5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"537\" height=\"645\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI.jpg\" class=\"attachment-medium_large size-medium_large\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI.jpg 537w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI-250x300.jpg 250w\" sizes=\"auto, (max-width: 537px) 100vw, 537px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc1f791 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc1f791\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-93f424c\" data-id=\"93f424c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8606f60 elementor-widget elementor-widget-image\" data-id=\"8606f60\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"384\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/3-slide-1-768x384.png\" class=\"attachment-medium_large size-medium_large\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/3-slide-1-768x384.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/3-slide-1-300x150.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/elementor\/thumbs\/3-slide-1-150x150.png 1600w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/3-slide-1.png 800w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7657011 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7657011\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a643c9\" data-id=\"0a643c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0f10dd elementor-widget elementor-widget-heading\" data-id=\"c0f10dd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><br>The Deep Instinct Advantage<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b711061 elementor-widget elementor-widget-text-editor\" data-id=\"b711061\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Deep Instinct is the most sophisticated solution for threat prevention on the market today. Our end-to-end prevention ensuresthat threats never reach the endpoint to execute. Our deep learning deterministic and predictive algorithms detect suspicious and malicious threats with unmatched precision and e\ufb03cacy.<\/p><p>The Deep Instinct advantage extends beyond just total threat protection.<\/p><p>Many cybersecurity vendors are deploying machine learning (ML)-based solutions that either protect too much\u2014\ufb02ooding yourteam with false positives\u2014or lack the power and precision to predict and prevent unknown, zero-day threats. Our vast neuralnetwork has been trained for years on hundreds of millions of \ufb01les to prevent threats autonomously, allowing your highly-skilled,highly-specialized security operators to spend less time responding to and managing false positives, and more time focusing on thesecurity threats that matter. Our technology makes your team smarter, faster, and more agile.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f83015 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f83015\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-422132c\" data-id=\"422132c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-574f73c elementor-widget elementor-widget-image\" data-id=\"574f73c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Proactive-300x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Proactive-300x300.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Proactive-150x150.png 150w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Proactive-768x768.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Proactive-800x800.png 800w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Proactive.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-99281a3\" data-id=\"99281a3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d969e1f elementor-widget elementor-widget-image\" data-id=\"d969e1f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Broad-300x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Broad-300x300.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Broad-150x150.png 150w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Broad-768x768.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Broad-800x800.png 800w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Broad.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d44858a elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"d44858a\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-78d5023\" data-id=\"78d5023\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-678e54a elementor-widget elementor-widget-image\" data-id=\"678e54a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/No-Security-300x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/No-Security-300x300.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/No-Security-150x150.png 150w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/No-Security-768x768.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/No-Security-800x800.png 800w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/No-Security.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a21e4e1\" data-id=\"a21e4e1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b85828 elementor-widget elementor-widget-image\" data-id=\"8b85828\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Low-Main-300x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Low-Main-300x300.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Low-Main-150x150.png 150w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Low-Main-768x768.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Low-Main-800x800.png 800w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/Low-Main.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-90d2035 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"90d2035\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb5bd7b\" data-id=\"bb5bd7b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03a79e5 elementor-widget elementor-widget-heading\" data-id=\"03a79e5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><br>Deep Learning is Superior to Machine Learning<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3175ff1 elementor-widget elementor-widget-text-editor\" data-id=\"3175ff1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Machine Learning algorithms are subject to human fallibility and su\ufb00er from low detection rates and high false positives, while alsosu\ufb00ering from accuracy issues 50%\u201370% of the time. According to researchers, ML algorithms may help you some of the time, butthey are dependent on human training to stay up to date. If the training data is paired to the wrong set of features, the resultingmodel can be highly unreliable1. ML-based security tools are also being increasingly targeted by bad actors to bypass controls andex\ufb01ltrate data undetected or alter the inferences and poison the data.<br \/><br \/>Deep Instinct\u2019s multi-layered approach begins with our Deep Neural Network that provides 99% accuracy with less than &lt;0.1% offalse positives. Deep learning self-learns as it ingests data, providing improved performance over time \u2013 detecting and preventingmore hard-to-detect threats with a high degree of accuracy. Not dependent on manual engineering, deep learning does not requirefrequent updating to maintain prevention e\ufb03cacy.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f7b03e4 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f7b03e4\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f0815f0\" data-id=\"f0815f0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2c453e elementor-widget elementor-widget-image\" data-id=\"f2c453e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/unnamed-file.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/unnamed-file.png 800w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/unnamed-file-300x150.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/unnamed-file-768x384.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a38503b elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a38503b\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7931c30\" data-id=\"7931c30\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a889ba elementor-widget elementor-widget-heading\" data-id=\"0a889ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Why Speed Matters: The Chronology of a Ransomware Attack<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc9c457 elementor-widget elementor-widget-text-editor\" data-id=\"cc9c457\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Deep Instinct detects and prevents malware pre-execution in &lt;20 milliseconds, 10 times faster than real time. Prevention is possiblewith the right partner. Our customers recognize that preventing breaches saves time,money, and reputation.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97c2320 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97c2320\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d1446ce\" data-id=\"d1446ce\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ff03c9 elementor-widget elementor-widget-image\" data-id=\"0ff03c9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"256\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/flow-768x256.png\" class=\"attachment-medium_large size-medium_large\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/flow-768x256.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/flow-300x100.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/flow-1024x341.png 1024w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/flow.png 1200w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76237a3 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76237a3\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f5c06e\" data-id=\"2f5c06e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4147023 elementor-widget elementor-widget-heading\" data-id=\"4147023\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><br>The Deep Instinct Prevention Platform<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fda844 elementor-widget elementor-widget-text-editor\" data-id=\"4fda844\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Deep Instinct both prevents threats at the endpoint and extends prevention without requiring an agent to ensure \ufb01le integrityof your cloud storage and custom applications, while protecting your network by eliminating threats at your web gateway. DeepInstinct for Endpoint: Prevention-\ufb01rst approach to stop more threats, faster.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d1761d2 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d1761d2\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8bfcae4\" data-id=\"8bfcae4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63247e3 elementor-widget elementor-widget-heading\" data-id=\"63247e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><br>Augmenting Your Existing Security Investments<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48ffc94 elementor-widget elementor-widget-text-editor\" data-id=\"48ffc94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Deep Instinct enhances the security tools you might already own, like EDR, toimprove their e\ufb00ectiveness, drasticallyreduce false positives, and limit theburden on your SOC team \u2013 allowing youto get more from your existing security.For example, we help optimize EDR withactionable intelligence, cover o\ufb04ineassets with higher e\ufb03cacy, and removecloud dependency vulnerabilities. Ourdeep classi\ufb01cation lets SOC teams knowexactly what they are dealing with.<br \/>Some of our customers decide that DeepInstinct can replace some of their moretraditional AV solutions or complementthem to provide even higher levels ofprotection.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c1e3fc\" data-id=\"2c1e3fc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61f7489 elementor-widget elementor-widget-image\" data-id=\"61f7489\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI-prevent-platform-300x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI-prevent-platform-300x300.png 300w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI-prevent-platform-150x150.png 150w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI-prevent-platform-768x768.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI-prevent-platform-800x800.png 800w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI-prevent-platform.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cd9181b elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cd9181b\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f42735f\" data-id=\"f42735f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8980600 elementor-widget elementor-widget-image\" data-id=\"8980600\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"300\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/brand-1-200x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/brand-1-200x300.png 200w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/brand-1-683x1024.png 683w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/brand-1-768x1152.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/brand-1-1024x1536.png 1024w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/brand-1.png 1200w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7f0446f\" data-id=\"7f0446f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36e035d elementor-widget elementor-widget-image\" data-id=\"36e035d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"300\" src=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/industry-rec-200x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/industry-rec-200x300.png 200w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/industry-rec-683x1024.png 683w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/industry-rec-768x1152.png 768w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/industry-rec-1024x1536.png 1024w, https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/industry-rec.png 1200w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Prevention Starts with Deep Instinct The cyber threat landscape is deep, varied, and constantlyevolving with new malicious tactics, delivery methods, and known as well as unknown malware. Most security platforms emphasize detection and remediation, focusing on assessing and responding once a breach has occurred and damage has been done. But this is a \ufb02awed and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":13,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1855","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.5.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deep Instinct - AML-Systems Co.,Ltd.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Instinct - AML-Systems Co.,Ltd.\" \/>\n<meta property=\"og:description\" content=\"Prevention Starts with Deep Instinct The cyber threat landscape is deep, varied, and constantlyevolving with new malicious tactics, delivery methods, and known as well as unknown malware. Most security platforms emphasize detection and remediation, focusing on assessing and responding once a breach has occurred and damage has been done. But this is a \ufb02awed and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/\" \/>\n<meta property=\"og:site_name\" content=\"AML-Systems Co.,Ltd.\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-26T10:41:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/\",\"url\":\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/\",\"name\":\"Deep Instinct - AML-Systems Co.,Ltd.\",\"isPartOf\":{\"@id\":\"https:\/\/www.aml-systems.co.th\/th\/#website\"},\"datePublished\":\"2021-02-22T00:52:11+00:00\",\"dateModified\":\"2022-08-26T10:41:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aml-systems.co.th\/th\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What We Do\",\"item\":\"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Deep Instinct\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aml-systems.co.th\/th\/#website\",\"url\":\"https:\/\/www.aml-systems.co.th\/th\/\",\"name\":\"AML-Systems Co.,Ltd.\",\"description\":\"AML-Systems Co.,Ltd.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aml-systems.co.th\/th\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deep Instinct - AML-Systems Co.,Ltd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/","og_locale":"en_US","og_type":"article","og_title":"Deep Instinct - AML-Systems Co.,Ltd.","og_description":"Prevention Starts with Deep Instinct The cyber threat landscape is deep, varied, and constantlyevolving with new malicious tactics, delivery methods, and known as well as unknown malware. Most security platforms emphasize detection and remediation, focusing on assessing and responding once a breach has occurred and damage has been done. But this is a \ufb02awed and [&hellip;]","og_url":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/","og_site_name":"AML-Systems Co.,Ltd.","article_modified_time":"2022-08-26T10:41:58+00:00","og_image":[{"url":"https:\/\/www.aml-systems.co.th\/th\/wp-content\/uploads\/2022\/08\/DI.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/","url":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/","name":"Deep Instinct - AML-Systems Co.,Ltd.","isPartOf":{"@id":"https:\/\/www.aml-systems.co.th\/th\/#website"},"datePublished":"2021-02-22T00:52:11+00:00","dateModified":"2022-08-26T10:41:58+00:00","breadcrumb":{"@id":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/deepinstinct\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aml-systems.co.th\/th\/"},{"@type":"ListItem","position":2,"name":"What We Do","item":"https:\/\/www.aml-systems.co.th\/th\/what-we-do\/"},{"@type":"ListItem","position":3,"name":"Deep Instinct"}]},{"@type":"WebSite","@id":"https:\/\/www.aml-systems.co.th\/th\/#website","url":"https:\/\/www.aml-systems.co.th\/th\/","name":"AML-Systems Co.,Ltd.","description":"AML-Systems Co.,Ltd.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aml-systems.co.th\/th\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/pages\/1855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/comments?post=1855"}],"version-history":[{"count":195,"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/pages\/1855\/revisions"}],"predecessor-version":[{"id":3906,"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/pages\/1855\/revisions\/3906"}],"up":[{"embeddable":true,"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/pages\/13"}],"wp:attachment":[{"href":"https:\/\/www.aml-systems.co.th\/th\/wp-json\/wp\/v2\/media?parent=1855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}