Cybersecurity

In order to cut off attackers, cybersecurity solutions need to capture detailed blueprints of cyber-physical infrastructure, threats and attacks, and provide defenders with interactive visualizations for exploration and answers to questions which require an understanding of how everything is connected.

Requirements

Cybersecurity platforms and tools must be able to model and process every aspect of a company's cyber-physical presence and interactions, especially as digital infrastructure becomes more expansive and potential threats more sophisticated.

Attack Surface Management (ASM)

Map and reduce an attack surface whose size and complexity is growing as a result of the cloud, the Internet of Things (IoT) and hybrid work models.

Threat Detection and Response (TDR)

Reduce exposure time by identifying threats via signature and behavior detection and automating remediation, even advanced persistent attacks and evasive threats.

Cyber Threat Intelligence (CTI)

Aggregate information on indicators of compromise and the tactics, techniques and procedures used in cyberattacks, even as attackers continue to evolve them.

Identity and Access Management (IAM)

Protect sensitive information and ensure compliance with data privacy laws by restricting access to resources and applications, whether by humans or machines.

Challenges

It's getting harder for security teams to keep up with change, whether it's the adoption of emerging technologies or the sudden shift to remote working – as is detecting attacks and identifying potential targets in increasingly interconnected environments.

Rapid evolution

It's difficult to incorporate new types of infrastructure, vulnerabilities and users on fly because relational databases are not well suited to evolving applications.

Growing complexity

As cybersecurity models expand to capture digital, physical and social attack surfaces and threats, relational databases fail to capture the relationships between them.

Hidden patterns

The knowledge contained in a complete cybersecurity data model is critical to security operations, but relational databases are unable to help surface it.

Siloed information

All too often cybersecurity data is stored in different databases or schemas, one per tool, making it impossible to infer valuable data from both direct and indirect relationships.

TypeDB Solution

TypeDB provides cybersecurity software and teams with a database capable of storing every detail and connection that exists within their domain, both digital and physical, and applying logic and reason to help extrapolate critical information from it.

Extensible type system

Add new types of infrastructure, threats, attacks and users on demand, upon discovery and without having to modify existing queries.

Inheritance and polymorphism

Query on abstract types (e.g., all injection attacks) rather than having to know and specify all possible types (e.g., SQL injection) with joins.

Relations as a core type

Identify the connections between attackers and assets, from assets reachable by a compromised server to the next steps in a complex attack.

Built-in reasoning

Let the reasoning engine traverse relations to find relevant information (e.g., assets a user has indirect access to) without specifying them.

Further Learning

Download sample projects to get up and running in minutes, and check out the latest blogs from our research engineers.