Download PDF version Contact company

Transmit Security, a pioneering Identity Security specialist announces the general availability and next phase of AI integration into the Transmit Security platform with the release of Conversational Analytics.

This text-based analytics service leverages generative AI to empower anyone, even those without technical expertise to perform quick custom searches on their identity databases.

Conversational Analytics

The Transmit Security platform can be queried with natural language questions such as “What are the most prevalent attack tactics in the past week?” or “Who are the most targeted/at-risk users?”

The Conversational Analytics model will then establish the intent of the question and extract the information from the identity database in seconds. These queries will be handled with proper authentication and authorization so that sensitive information is kept confidential, compliance is maintained and data handling remains within predefined access controls.

Limitations of out-of-the-box dashboards

Many analytics services provide dashboards or integrative capacity if users want to stream their data

Many analytics services provide dashboards or integrative capacity if users want to stream their data into third-party systems.

However, out-of-the-box dashboards are often limited to what the product provides, and streaming to third-party systems still requires users to integrate that data, which is an often time-consuming and error-prone process.

Valuable insights

Conversational Analytics circumvents that by allowing Transmit Security customers to directly interrogate data, both from the Transmit Security platform and from 3rd party integrations, and analyze user identity behavior, device activity, and trends with natural language expressions.

This enables them to quickly gain valuable insights without the need for technical expertise and pursue inquiries into usage trends, behavioral anomalies, and potential fraud by instantly asking follow-up questions on returned outputs across the fraud stack.

Track responses

Conversational Analytics also lets users track responses to those questions over time.

If a user needs to know about the behavior, they can build that query into their dashboard so it can keep providing them with answers day after day.

Top-down and Bottom-up approach

Conversational Analytics’ AI-powered investigations can be used in two ways

Conversational Analytics’ AI-powered investigations can be used in two ways. A “top-down” approach in which, for each identified fraud case, an AI chatbot can be directly queried in natural language and provide answers which give full context to the case, addressing critical fraud threats in real-time.

Conversely, a “bottom-up” approach offers offline, ongoing fraud analysis which can be monitored from a dashboard and leveraged for reporting and management briefing.

Customer Identity

Customer Identity is a key part of fraud detection and investigation,” says Danny Kadyshevitch, Senior Product Lead for Detection and Response at Transmit Security, “but many organizations struggle to use their identity data productively."

"This new analytics service uses AI to unlock the possibilities for laymen users to carry out crucial forensic tasks, investigate abnormal user behavior, and develop long-term anti-fraud and defense strategies.” Conversational Analytics was released in Beta for Transmit Security customers in June this year and the full version will be available by the end of the year.

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...