Blogs

Understanding AI cybersecurity: How does Fletch’s AI engine work

Product

Understanding AI cybersecurity: How does Fletch’s AI engine work

Understanding AI cybersecurity: How does Fletch’s AI engine work

Finn Callaghan

Aug 5, 2024

AI cybersecurity is overloaded with chatbots and artificial intelligence add-ons. These are typically features added as an afterthought to hop on the AI bandwagon. None deliver the true potential of AI cybersecurity. 

The latest upgrades in AI cybersecurity are those that are predictive and proactive, enabled by layers of artificial intelligence. Fletch is a powerful example of AI cybersecurity changing how professionals think about the industry. 

 

Understanding AI Cybersecurity

AI cybersecurity is a broad term everyone uses to describe any type of artificial intelligence or machine learning in their security tools. This makes it difficult to distinguish cybersecurity companies with generic add-on AI features from companies with specialty cybersecurity AI. 

The former can be defined as AI that adds little to cybersecurity practices outside of the tool it’s a part of. One common example is the addition of a cybersecurity chatbot that can only give answers using its existing internal data. 

In contrast, specialty AI is artificial intelligence designed specifically to do cybersecurity tasks. This might be a predictive cybersecurity AI engine that forecasts potential threats or provides information using open source threat intelligence in real time. 

The bottom line: When researching AI cybersecurity tools, be alert for the difference between generic AI addons and solutions with AI at their core. It may be hard to spot at first glance, but should be apparent when assessing actual capabilities.

 

How does Fletch’s AI engine work?

Fletch began as an AI cybersecurity concept originally designed to proactively identify and address specific types of threats before formal identifiers, such as CVEs (Common Vulnerabilities and Exposures), are issued. We observed that many large companies, despite their size, lack the resources to effectively identify and mitigate the right potential cybersecurity risks to defend proactively.

At its core, Fletch’s AI engine builds semantic relationships between various elements, including technology, geography, and industry. Unlike traditional methods, which often rely on formal threat identifiers, Fletch’s AI engine detects threats based on contextual cues and correlations. For instance, it often identifies vulnerabilities in specific software or plugins before they are officially recognized.

This advanced technology is what makes Fletch’s AI cybersecurity predictive and proactive.

Fletch is different from the many SaaS cybersecurity products that offer AI as an add-on. Fletch is architected to be AI-first and designed to provide an experience that is user-friendly and secure.  

Fletch doesn’t run on your infrastructure or endpoints and it’s lightweight. Putting AI on your endpoint has proven to be  an unsavory recipe (see 2024 CrowdStrike incident 2.0 for example). 

Use Fletch to identify threats that don't target your endpoints but rather target your SaaS apps or the industry and geo that pertain to your business. You can prime Fletch with some of your data or connect your existing products. It will enable you to know what is coming your way before it reaches your endpoints. 

Avoid any AI that uses your data publicly: Fletch creates private instances for each customer and doesn’t use customer data to train. Everything is built to be private and secure. We don't rely on public chat bots such as ChatGPT.

 

How Fletch AI cybersecurity works

Fletch’s AI engine is composed of layers of AI. To put it simply, there are two key elements that need to be integrated for actionable results: external threat detection and internal data correlation.

Externally, the Fletch landscape AI agent scours the internet for open source threat intelligence, analyzing forums, blogs, social media, and other sources to identify what threats are trending now. Trending threats are defined as those in the landscape that are actively being exploited. Fletch’s AI engine assesses the credibility of sources and extracts relevant information to classify the threat landscape rapidly.

Internally, Fletch’s predictive artificial intelligence correlates external threat data with the user's own data, to build a personalized threat profile based on the user's technology stack, geographic location, industry, and existing vulnerabilities and malwares. Fletch then applies generative AI to provide tailored advice and recommendations to mitigate potential risks before they happen.

Generative AI can be unpredictable, non deterministic. Predictive AI is deterministic and predicts outcomes. They are two different types of AI. At Fletch, we use generative AI for narrative and implement guardrails to ensure it provides consistent answers. On the other end, we use traditional natural language techniques and technologies to crawl, aggregate, dedupe, and merge data. We use predictive AI to quantify the information and we mix different techniques to deliver a product with many layers of AI working together.  By using a fine-tuned mixture of expertise, Fletch harnesses the power of multiple industry leading models to deliver never-been-seen-before capabilities within a cybersecurity AI platform.

The big difference that really matters is that Fletch is working to keep you ahead of the game before a cyberthreat goes mainstream, while all the other tools wait for threat signatures to be assigned after a threat hits. This is the true power of the predictive AI cybersecurity that Fletch can empower you with.

 

Advantages of AI cybersecurity

By combining the speed and efficiency of machine learning with human expertise, Fletch’s AI cybersecurity offers a truly powerful AI-enabled solution to the challenges faced by today's cybersecurity teams.

  1. Fast, proactive, and timely: Fletch enables teams to identify and prioritize threats before they hit and much faster than traditional methods, minimizing response times.

  2. Personalized advice: By matching external threats with internal data, Fletch’s AI engine can provide highly specific advice and communications tailored to the user's environment.

  3. No agents needed: Fletch does not require agents to be installed on any of your systems so it’s not in your infrastructure, nor on your endpoints, and processes info securely without bogging down your systems in any way.

  4. Complements existing tools: Fletch integrates with standard vulnerability management and EDR tools to prioritize alerts that are most pressing and actively targeting each individual endpoint.

 

Takeaway

Fletch’s Artificial Intelligence represents a significant advancement in AI cybersecurity, maximizing team capacity and staying ahead of emerging threats. Unlike some tools that claim to be AI cybersecurity solely because they have an AI feature, Fletch is built from the ground up to automate cybersecurity's busy work. It prioritizes your alerts, forecasts your threats, and offers you the advice you need and can use, without overloading you with endless alerts.

 

Want to see the power of Fletch’s AI cybersecurity? Sign up for Fletch.

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access