MIxmode Frequently Asked Questions

1. I already have a SIEM now what? / How does this work with my SIEM?

The biggest difference between MixMode and a typical SIEM is that the SIEM collects logs of a limited set of data while wire data looks at all data and transactions on the network. Furthermore, a SIEM will never be completely configured as companies are constantly adding new devices, replacing old devices, etc. Oftentimes, companies rarely (or never) keep up on updating the configuration of the SIEM, further reducing their value. Challenges arise when relying solely on log data from a SIEM: Logs can be changed, altered, or adjusted to stop sending information.

2. How does your API work?

Using our robust REST API, user can seamlessly integrate security stacks with MixMode by offloading data into SIEMs, orchestration engines and ticketing systems. We integrate with market-leading tools like Splunk, ServiceNow, LogRhythm, Demisto, ConnectWise, Pager Duty and more.

3. What are the specs on your appliance?

We are a software company. While we do have both SaaS and On-Premises options, we don’t ship appliances as part of our standard course of business.

4. How is it deployed?

MixMode supports both on-premises and SaaS based employments.

5. How does this work with our SOAR?

MixMode can be integrated with your SOAR via our API. Automate and accelerate your search and investigations by using this integration to pull traffic flows, extracted files and PCAPs automatically.

6. How does MixMode make me more secure?

As cyber threats mature protection at the perimeter through traditional means is no longer sufficient. The goal has shifted from penetration prevention to rapid identification, remediation and response. MixMode’s combination of AI anomaly detection and intel-based wire data detections give you visibility and confidence that you will never miss what matters.

7. Do I have to use your UI?

No. MixMode’s AI can be integrated with your existing tooling to act as an intelligence layer and provide anomaly detection as well as alert reduction and precision. MixMode’s AI can be used in traditional SIEMs like Splunk or Sumologic as well as SOARs like Demisto.

8. What sources of data do you ingest?

MixMode can ingest all network data feeds including, Bro/ZEEK, SecurityOnion, Surricata & SNORT. In addition, MixMode can ingest CloudTrail Logs and AWS netflow data.

9. How is your AI different?

MixMode’s AI is patented “Third-Wave AI” (as defined by DARPA). Most Cybersecurity solutions offering “AI-Enabled” systems are what DARPA would call “Second-Wave” or systems that require human rules and tuning. MixMode’s AI was developed over 20 years by Dr. Igor Mezic. It can create a baseline understanding completely on its own in only 7 days (as opposed to 18 months which other systems require on average) and is fully autonomous in its ability to surface threats and anomalies.

10. Where does MixMode fit in my workflow?

There are 2 common workflows for MixMode. 1) Proactive Alerting and 2) Reactive Investigations. MixMode ships with an action-based dashboard that will surface a combination of AI anomalies and intel-based detections that a security analyst should review each day. In addition, MixMode is a powerful forensic tool that can be used to research and identify the scope of a breach or detection from another platform.

11. Does MixMode help with compliance?

MixMode is a valuable tool for verifying your compliance status and ensuring that your tools and protocols are functioning properly. Customers routinely use us to verify their PCI, HIPAA and NIST compliance.

12. More questions? Contact us!

Email info@mixmode.ai or Call (858) 225-2352. You can also send us a message at https://mixmode.ai/contact-us

Get Started Now

Ready to See How MixMode Can Help You Start Automating Threat Detection?

mixmodeoncomp