HarfangLab AI-Enhanced EDR
From detecting threats to supporting security teams,
HarfangLab leverages the full potential of AI technology to enhance endpoint security
with Ashley and Kio (Know It Owl).
Ashley is HarfangLab’s advanced AI engine designed to detect previously unknown threats across all operating systems: Windows, Linux, and macOS.
Kio, a generative AI assistant, supports cyber experts in analysis and investigation by responding to natural language queries.
Ashley is the AI integrated into HarfangLab’s EDR.
Its models are continuously trained and updated to keep pace with evolving threats while also being optimized to ensure endpoint performance isn’t undermined.
Built on Machine Learning and Deep Learning technologies, Ashley specializes in analyzing binary files and PowerShell scripts:
- Ashley Binaries
scans executable files (.exe, .dll…) to detect threats not yet listed in virus databases.
- Ashley Scripts
identifies malicious PowerShell scripts, analyzing even those disguised with obfuscated code.
Kio is fully integrated into HarfangLab’s console and is powered by generative AI (LLM), offering several powerful features:
- Kio Documentation
enables users to browse documentation effortlessly using natural language queries, simplifying console use.
- Kio Query
filters critical data for cyber analysts such as Security Events and Threats to accelerate the investigation of security incidents.
HarfangLab’s solution is fully developed in-house, hosted on its own servers, and supported by dedicated AI models to ensure total data confidentiality.
Find out more
Artificial Intelligence in an EDR, for what purpose?
EDR and cybersecurity – the benefits of AI: how to contain risk upstream, thanks to an engine that runs directly…
Performance and detection: concrete applications of AI in cyber
How to optimize detection and remediation capabilities with Artificial Intelligence, while enabling users to benefit from continuous innovation and new…
Cybersecurity: Offensive vs. Defensive AI
Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…
The crucial role of analysts for investigations in cybersecurity
Why the role of cyber experts remains essential in the event of an attack – even with automation tools -,…