Platform guide
...
Threat Informed Defense
Deployment Strategies
Series Deployment
1min
In the Defense Deployment series, the Threat-Informed Defense Model is deployed sequentially just before the Original Model. When a user sends a request, it passes through the API gateway and load balancer before reaching the Pre-processor.
The processed data is then sent to the Defense Model. Based on the control signal received from the Defense Model, a decision is made whether to forward the request to the Original Model, block it, or take other necessary actions.
Telemetry data is sent to SIEM tools through a connector, similar to parallel deployment. However, due to the series deployment and control at the defense level, there may be a decrease in the accuracy of the Original Model.

Updated 17 Jan 2024

Did this page help you?