{"id":21413,"date":"2018-03-02T09:35:29","date_gmt":"2018-03-02T14:35:29","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?page_id=21413"},"modified":"2022-05-05T11:06:10","modified_gmt":"2022-05-05T15:06:10","slug":"humachine-intelligence","status":"publish","type":"page","link":"https:\/\/www.kaspersky.com\/blog\/humachine-intelligence\/","title":{"rendered":"HuMachine Intelligence"},"content":{"rendered":"<div style=\"background-color: white; width: 100%; max-width: 852px; margin: 0 auto; padding: 60px; position: absolute; top: -30px; left: 0; right: 0; height: 60px; z-index: -1;\"><\/div>\n<div style=\"background-color: white; width: 100%; max-width: 852px; margin: 0 auto; padding: 60px; position: absolute; bottom: 40px; left: 0; right: 0; height: 60px; z-index: -1;\"><\/div>\n<div style=\"background-color: white; width: 100%; max-width: 852px; margin: 0 auto; padding: 30px 60px;\">\n<h1 style=\"margin-bottom: 35px;\">HuMachine Intelligence<\/h1>\n<p>Our approach to protecting customers from the most sophisticated cyberthreats involves use of what we call <em>HuMachine Intelligence<\/em>: a fusion of big data, machine learning, and our analysts\u2019 expertise.<\/p>\n<p>You can find a detailed technical explanation of how the principle works in this blog post: <a href=\"https:\/\/www.kaspersky.com\/blog\/what-humachine-intelligence-is\/17995\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">What is HuMachine?<\/a><\/p>\n<p>However, we also made a simpler video explanation about how the principle works.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/w1ry0ooRjI0?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h2>HuMachine in our solutions<\/h2>\n<p>We\u2019ve implemented HuMachine Intelligence in our most advanced solutions. Here are just a few examples:<\/p>\n<p>Anti-Targeted Attack platform: <a href=\"https:\/\/www.kaspersky.com\/blog\/asa-key-to-true-cybersecurity\/6678\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Adaptive architecture: Key to True Cybersecurity<\/a><\/p>\n<p>Anti-Spam technologies: <a href=\"https:\/\/www.kaspersky.com\/blog\/humachine-intelligence-antispam\/6638\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">HuMachine intelligence fighting snow shoes<\/a><\/p>\n<p>Fraud prevention system: <a href=\"https:\/\/www.kaspersky.com\/blog\/cloud-vs-fraud\/6650\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Cloud vs. Fraud<\/a><\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The HuMachine principle: What it is and how it really works <\/p>\n","protected":false},"author":2706,"featured_media":17988,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-21413","page","type-page","status-publish","has-post-thumbnail"],"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/humachine-intelligence\/"}],"acf":[],"banners":"","is_landing":true,"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/21413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21413"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/21413\/revisions"}],"predecessor-version":[{"id":35161,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/21413\/revisions\/35161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17988"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}