Unintrusive
AI-Powered Cybersecurity

Full Visibility and Protection by using the entire network as a sensor: no probes, devices or agents

Gleam revolutionizes cybersecurity by applying deep learning to create predictive behavior models for each device in the network. The anomaly detection allows to face unknown and future threats. No rules, no signatures, no deployment at all: Pure SaaS exploitation with unlimited scalability.

Why Gleam

Because it's ready for today's challenges and is smart, efficient and scalable

Network Engineering and Security departments need to reduce the complexity, costs, manageability, and impact on networks.

GLEAM represents a paradigm of simplicity, efficiency, and non-intrusion with a reliable and scalable operation that improves as it is used with his granular AI engines model and continuous learning capability.

Your organization should consider GLEAM because:

01_

Behavior based technology

Gleam doesn't need previously known signature or attack patterns for detection. Gleam models with AI the expected behavior of the traffic network and detects subtle changes that are indications of a successful attack.

02_

Unintrusive technology

Gleam use the network telemetry, natively produced by the network devices (routers and switches), to build is behavioral models and detect the anomaly in real time. Start using Gleam is as simple as configuring your routers to start sending the flow data to the Gleam Service.

03_

Security as a Service

The lightweight protocols of network telemetry used by Gleam (Netflow, IPFIX, J-Flow, sFlow) allow an efficient cloud operation (SECaaS) without the need to deploy anything locally or to pay for a heavy data exchange and improves the compliance with regulations.

04_

Multi-Tenant scalable technology

The Gleam big data scalable open technology allow the protection of networks of any size. The multi-tenant architecture is perfect for TELCO/SP business models market with OpenStack and Cloudera support.

05_

Full Network Visibility platform (NTA)

Additionally, Gleam collect all the network telemetry (flow data) and provides a carrier-class Network Traffic Analytics (NTA) for real-time and historical network visibility, understanding and problem-solving.

06_

Last resource

When everything fails, Gleam detects successful intrusions analyzing changes in the devices traffic behavior: propagation, C&C, geolocation, suspicious networks, volumetrics, unlikely destinations, odd working hours, unusual protocols, applications, ports, addresses...

Contact

GLEAM is still working in stealth mode to prepare its launch. However we will be happy to contact you for matters related to media, proposals for collaboration and R & D, investors and venture capital, job candidates or simply, because you feel curious about us.

Stay tuned, exciting news is coming soon! Subscribe to our newsletter.

  • I agree to Gleam's terms and conditions

  • We request your authorization to keep you informed about Gleam, send commercial proposals from Gleam, request your feedback and invite you to participate in Gleam promo, seminaries, events, laboratories o contests.