Platform guide
...
Threat Informed Defense
Deployment Strategies
Parallel Deployment
1min
In the parallel defense deployment, both the Threat-Informed Defense Model and the Original Model operate simultaneously. When a user sends a request, it passes through the API gateway and load balancer before reaching the Pre-processor.
In the Pre-processor, the data is processed before being sent to the Original Model. However, the processed data is also forwarded to the Defense Model. The Defense Model sends a control signal to the post-processor, which also receives the prediction value from the Original Model. Additionally, the Defense Model sends telemetry data to the SIEM tool through a connector.
This parallel deployment and control at the Post-processor stage ensures that there is no impact on the accuracy of the model.
![Document image Document image](https://images.archbee.com/9GPi9YtROlYnoq5fgmmJ8/cEZkGMTn7AHRUj2n1poDH_defenseparalleldeployment-parallel-deploymentdrawio.png?format=webp)
Updated 17 Jan 2024
![Doc contributor](https://s3.amazonaws.com/archbee-animals/fox.png)
Did this page help you?