The AI Insights engine analyzes historical patterns, threat intelligence, and context to recommend optimal policy configurations and incident responses.
How It Works
AI-powered security in five stages:1
Data Collection
Jibril sends events to Garnet Cloud
2
AI Analysis
Machine learning models evaluate:
- Historical behavior patterns
- Threat intelligence feeds
- Organizational context
- Industry benchmarks
3
Generate Insights
AI produces actionable recommendations
4
Apply (Optional)
Auto-apply approved recommendations or review manually
AI-Powered Features
Policy Recommendations
Policy Recommendations
Suggests new policies based on detected patternsExample:
Confidence Score
94%Based on historical accuracy
Impact Score
8.3/10Estimated security improvement
Auto-Triage
Auto-Triage
Automatically categorizes and prioritizes incidents
| Priority | Criteria | Action |
|---|---|---|
| P0 | Known attack pattern + active exploit | Immediate block + alert |
| P1 | Suspicious behavior + high confidence | Block + notify on-call |
| P2 | Anomalous pattern + medium confidence | Observe + log |
| P3 | Low confidence or false positive likely | Log only |
Reduces alert fatigue by 78% on average
Scope Optimization
Scope Optimization
Recommends optimal policy scopes based on blast radius analysis
Threat Correlation
Threat Correlation
Links related incidents across repositories and clustersExample Output:
API Response Example
Query the AI Insights API:Dashboard View
The Garnet Dashboard displays AI insights inline with incidents:- Incident View
- Recommendations Feed
Auto-Apply Settings
Control how aggressively AI recommendations are applied:- Conservative
- Balanced
- Aggressive
- Manual
CLI Usage
Interact with AI insights viagarnetctl:
Benefits
Faster Response
Reduce triage time by 78%Automated prioritization and correlation
Better Accuracy
94% confidence on high-priority alertsMachine learning reduces false positives
Adaptive Defense
Continuously improvingLearns from your environment and threat landscape
Privacy & Security
Data Processing
Data Processing
- All analysis performed on Garnet Cloud (encrypted in transit and at rest)
- No source code or secrets transmitted
- Only metadata and event patterns analyzed
- Compliant with SOC 2 Type II, ISO 27001, and GDPR
Model Training
Model Training
- Models trained on anonymized, aggregated threat intelligence
- Your data never shared with other customers
- Opt-out available for ultra-sensitive environments
Transparency
Transparency
- Full reasoning provided for every recommendation
- Audit logs for all auto-applied changes
- Rollback capability for any AI-applied policy