News

  • How ACRA Works – An Insight into What We Are Doing

    Our new tool, AI-Assisted Customer Request Assignment ACRA is a tool to route support tickets to correct experts. ACRA is ideal for situations where you need experts to solve your incoming technical issue tickets.

    groups tagging example

    Read more..
  • Routing Customer Requests Using AI

    Ticket routing dashboard example

    Do you have a huge number of customer service tickets? Do you know who should handle them? Helpdesk tickets are not always issued to the right person from the start. An expert could solve a ticket within minutes, but if helpdesk does not know about the expert, it could take a lot longer. Your first level problem solver might not be the exact match to solve the issue at hand.

    Read more..
  • Protecting IoT Networks with AI Enhanced Fog Computing

    Foggy hills

    Fog computing is a clever word play for computing that happens closer to IoT devices themselves than traditional cloud computing. Adding fog or edge computing to IoT device cluster makes a lot of sense in some applications as it allows to the individual sensors and devices to remain simple and low power while still providing on premises computational capacity. You would not want your self driving car to stop working just because it lost connectivity to the cloud computing node, would you? How about traffic lights?

    In a previous post we discussed how mobile network operators can provide AI based IoT security services. Now it is time to look how fog computing can benefit from AI.

    Read more..
  • When Medieval Magic Meets Data Science

    Winged sun with text "Illuminatio"

    CAP Data Technologies teamed up with researchers from University of Jyväskylä to automatically process medieval magic texts. The goal of the project was to identify similarities between documents, namely alchemical instructions from old books written in the Latin language.

    The texts were prepared by Lauri Ockenström, researcher at the Department of Music, Art and Culture Studies. His research interests include imagery of magic and astrology, renaissance magic, hermetic tradition and history of occultism.

    Read more..
  • IoT Is Coming - Is the IoT Cybersecurity Ready?

    IoT

    Internet of things phenomenon has brought countless new connecting devices to mobile networks and the trend will most likely continue in the future. The fact that IoT devices are often designed to have low computational capacity to achieve as small power consumption as possible, combined with poor design choices in many of the early IoT devices, has lead to IoT having a bad reputation on the security front.

    In this post we will explore what is the current state of IoT security and how mobile network operators can help IoT devices to achieve security while maintaining desirable power consumption.

    Read more..
  • Potential Vulnerabilities in Mobile Networks - and How AI Can Help

    Attack

    In our previous blog post we laid out some of the attacks that are very much possible in the world of mobile networking. To succeed on these the attacker must conduct some research in advance about the victim. One of the important details to know is it victims International Mobile Subscriber Identity aka. IMSI. It is globaly unique identifier from witch it is possible to discover on which operators network the subscriber is. Next we’ll go over a few means to aquire that information.

    Read more..
  • Using AI to Prevent Unauthorized Tracking of Mobile Users

    Map of europe

    Mobile phones and communications have become ubiquitous in the 21st century and it is being powered by a global network of interconnected carrier networks. This allows users from anywhere to communicate with almost anyone from anywhere else but also presents security and privacy concerns of global scale.

    Read more..
  • Rugged Tooling Teams Up With CAP Data to Research Use of AI in Cyber Security

    Business Finland has granted funding for research on the use of AI in anomaly detection to Rugged Tooling. The goal of the research is to leverage Rugged Tooling’s advanced traffic visibility platform, PreScope® and AI algorithms from CAP Data to research the use of machine learning and AI in IP network anomaly detection. The aim is to use to the powerful processing of the PreScope to boost the abilities of CAP Data technology to create a self-adapting cyber security tool.

    Read more..
  • Overfitting and Dropout in Neural Networks

    Antti Juvonen discusses how to overcome overfitting in deep learning. Check out Antti’s data science blog where you can find more articles about deep learning and related topics.

    Read more..
  • Finnish High Technology Complements Ymon’s Situational Awareness Service

    Ymon’s service center starts using innovative technology developed by the Finnish CAP Data Technologies in order to detect abnormal events in information security.

    Read more..
  • Behavioral Analytics for IAM and RIM

    Read about CAP Anomaly Spotter

    Download the free PDF Brochure and read more about the possibilities of CAP Anomaly Spotter for identity and access management (IAM).

    Read more..
  • Anomaly Detection for Incident Response in IT Security

    Read about CAP Anomaly Spotter

    Download the free PDF Brochure and read more about the possibilities of Anomaly Detection for incident response in IT security.

    Read more..
  • Anomaly Detection for Security Operation Centers and MSSPs

    Read about CAP Anomaly Spotter

    Download the free PDF Brochure and read more about the possibilities of Anomaly Detection for Security Operation Centers and MSSPs.

    Read more..
  • CAP Anomaly Spotter Rsyslog Compatible

    CAP Anomaly Spotter is now Rsyslog compatible. It is possible to input log lines from Rsyslog sources to CAP Anomaly Spotter and automatically search through vast quantities of log data to identify unusual events in your logs.

    Read more..
  • CAP Joins Finnish Information Security Cluster

    CAP Data Technologies has been invited to join Finnish Information Security Cluster, FISC. FISC is an organization established in 2012 by major Finnish information security companies to promote their business and operations in national and international context. Its members are industrial or research organisation providing products and services for various needs in information and cyber security. Most of the member companies operate on international markets.

    Read more..
  • CAP Data Technologies Raises €145,000 in Seed Funding to Develop its Big Data Service

    Finnish data analytics startup CAP Data Technologies has secured a €145,000 ($163,000) seed investment round from a group of angel investors. With this boost, the team will continue to develop data analysis services for the global Big Data market.

    Read more..
  • New: Simple and Free Trial Version of CAP Service

    CAP has opened a very simple trial feature where you can get a hands-on touch on what CAP is all about. Click and run, no registration is needed nor disclosing anything about yourself before testing. You may test one of the data-sets we have made available as examples, or you may upload your own data and explore what happens. So, what sort of data can you test?

    Read more..
  • How to Find Strange Lines from a Text File with Python

    You have a text file with too many lines in it. It would take forever to skim through that file but you need to find strange lines differing from the rest of the file. This article describes how you can detect those anomalies from the file.

    Read more..
  • Press Release: CAP Introduces a Data Analytics Solution that Spots Oddities and Anomalies in Big Volumes of Data

    CAP adds machine learning into Big Data analytics. At SLUSH (www.slush.org), start-up event in Helsinki on 18 - 19 November, CAP introduces their first product version of server log file analytics service.

    Read more..