Microsoft will launch Copilot for Security next month, bringing its generative artificial intelligence chatbot to the cybersecurity field. Copilot for Security is designed for cybersecurity professionals to help them protect against threats, but it doesn’t come with a one-time monthly fee like Copilot for Microsoft 365. Instead, Microsoft will charge businesses $4 an hour to use Copilot for Security when it launches on April 1 as part of a consumption model.
Powered by OpenAI’s GPT-4 and Microsoft’s own security-specific models, Copilot for Security is essentially a chatbot where cybersecurity staff can get the latest updates on security incidents, threat summaries, and more. Microsoft first began testing the chatbot about a year ago, which includes access to the latest information on security threats and the company’s 78 trillion daily signals collected through threat intelligence collection.
Copilot for Security includes a dashboard section for collaboration among cybersecurity staff, as well as the ability to summarize incidents for reporting purposes. Like many other AI chatbots, you can use natural language input, input files for analysis, or even have Copilot for Security analyze the code. All prompts are saved in a history log for later review.
Pay-as-you-go pricing is designed to allow enterprises to scale their AI-driven cybersecurity efforts at the scale they need. “We’ll have a simple pricing model that covers standalone Copilot experiences as well as embedded experiences across the entire Microsoft security portfolio,” Microsoft said. “A consumption model means it’s easy and fast to start experimenting and learning at scale, without having to pay for each Copilot experience.” per device or per user.”
Microsoft’s push for artificial intelligence in cybersecurity comes as the company is under attack by Russian state-backed hackers. Nobelium, the same group behind the SolarWinds attack, managed to spy on the email inboxes of some Microsoft executives for months. The initial attack also resulted in the theft of some Microsoft source code, giving hackers access to the company’s source code repository and internal systems.