21CT's LYNXeon brings intelligence to security analytics for data of all sizes
|
|
- Adela Brown
- 8 years ago
- Views:
Transcription
1 21CT's LYNXeon brings intelligence to security analytics for data of all sizes Analyst: Wendy Nather 8 Jun, 2012 There's a big difference between analytics and reporting. Reporting shows you the data that's there; analytics generates new information out of the existing data, and can create new data to feed back into the system. Stricter definitions of analytics require mathematical processes or statistical models, as opposed to simply inferring conclusions from reported data. They also describe actions such as forecasting, optimization, predictive modeling and simulation. Visualization is a key element of analytics, since good visualization can facilitate the discovery of new information, and mediocre visualization can lock the user into the limited viewpoint of the product (pie charts, anyone?). Putting hot trend words together can create a phrase hotter than the sum of its parts, the latest example being 'big data security analytics.' And as we have described, not every security vendor that has been around for a decade can suddenly rebrand its product as 'big data' or even 'analytics.' But if the product has been designed for analytics from the ground up, and has been using disparate sources of data at very large volumes, it's a different story. This is the story of 21CT's LYNXeon intelligence analytics and visualization platform. The 451 Take As we have said, traditional security data is no longer the only relevant data for enterprise security. Simply handling large volumes of data at great speed is not enough; the differentiators are in support for data variety and exploration, among other factors. 21CT came from the defense and intelligence communities with an analytics platform that already promoted data agnosticism, underpinned by proprietary algorithms for complex graph pattern analysis. The company needs to avoid being trapped in the SIEM category; even within the Copyright The 451 Group 1
2 security market, it should be touting its support for what we call 'total data,' and bring security intelligence that much closer to business intelligence. Its field of real competitors for this particular market is still small, but fierce and a lot of aspirants to big data security analytics are capable of joining them, if they ever get off the network and OS layers. Context Based in Austin, Texas, 21CT (formerly known as 21st Century Technologies) was founded in 1999 by two MIT scientists (who are no longer involved with the company). The company is led by CEO Irene Williams, who has been driving the growth of LYNXeon as well as its R&D and custom application development lines of business since Frederick Chang, former director of research at the NSA, joined 21CT in March 2012 as its president and COO. In June 2010, the company announced its acquisition of NetflowData, a cyber-security consulting firm with four employees, based in Maryland. 21CT has roughly 80 employees, with half of those in the DC area and the other half in Austin. It is self-funded and has been cash-flow positive since its founding. 21CT holds six patents in areas ranging from 'intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data' and 'social network aware pattern detection' to 'tactical and strategic attack detection and prediction.' The earliest of these was filed in March 2006 and the latest was granted in November Thirteen more patent applications have been filed. Technology The heart of 21CT's technology is its LYNXeon platform, which is intended to support its use by a team of analysts. Originally these were mostly defense and intelligence analysts, developing network and social connection information out of data such as electronic communication records, geospatial data, training and conference events, financial transactions and more. LYNXeon uses sophisticated graph pattern analysis to help identify and visualize relationships and sequences of connections that are non-obvious and that could not have been uncovered by a known set of queries. Although the product comes with a large set of pre-generated queries (known as the LYNXeon Analytic Catalog), a user can customize, import or construct any type of query using 21CT's copyrighted Pattern Query Language. Copyright The 451 Group 2
3 Since LYNXeon handles any kind of structured data input, its strength lies in the ability to bring very disparate sources together and mathematically discover connections among them. The user interface displays these relationships in any number of ways: as a network, a graph, a chart (and you can even, if you must, export it as an Excel spreadsheet). An analyst working with the platform can create queries, work with subsets of the resulting data, export the final constellation as another saved query (analytic), map out a time series, annotate elements in the visualization, and share the results with others in the workgroup. And because 21CT has been working all this time with national defense agencies, it is used to processing millions or billions of data elements per query with low latency. Currently, the types of analyses being performed with LYNXeon tend to be very threat-centric: finding terrorists, detecting fraud and uncovering network-based attacks. A security analyst might run a query to detect a combination of behaviors or events using as inputs IP addresses, port ranges, GPS coordinates, NetFlow data, identity stores, application logs, badge access records and database query logs. The analyst might then identify a common sequence of events within a particular timeframe, add or remove constraints within the query, and play with the resulting net to see what other associations appear, either directly or within a number of degrees of separation. The LYNXeon system is geared toward intelligence communities and large enterprises, where a typical deal might run into the hundreds of thousands of dollars or more. However, 21CT also offers tiered pricing for smaller data scales. A trimmed-down version of the tool, called LYNXeon Wildcat, in beta, is also available. This edition is configured for a single user on a desktop, with a simplified user interface and feature set, and includes free NetFlow traffic analytics. The enterprise version, by contrast, requires a Linux-based server with a recommended four quad-cores, 64GB of RAM and minimum 2TB of internal disk, depending on data-retention requirements. Strategy Because of its roots in the intelligence world, 21CT has clientele ranging from the US Army and US Air Force to 'if we told you,...' It was not a big step to go from one type of intelligence to another within the same market, so cyber-security is one of 21CT's big pushes, along with fraud detection for banking and criminal tracking for law enforcement. And because of its initial use cases for intrusion detection within IT security, LYNXeon has often been lumped in with the SIEM tools. However, this view is terribly narrow, given that the platform's engine was designed to be data agnostic. By data agnostic, we don't mean 'any kind of computer-based log or security tool output' we mean 'high school honor rolls, plus changes in the McDonald's menu, plus auto insurance rates Copyright The 451 Group 3
4 over the past two years, and Broadway actors that have also bought clarinets.' If there were a chance to pull analytics out of the facetious risk equation 'peanut butter times jet engine equals shiny,' this would be it. We see applicability for this platform far beyond threat-centric models, and although it could prove very useful for security threat intelligence, it shouldn't stop there. A tool this flexible has the potential to bridge the IT layers with the business layers, so that the intelligence gathered is more meaningful to the C-suite no matter what the business is. And while we're talking about bringing security intelligence closer to business intelligence, we should look at the 451 vision, not of big data, but of total data: Total Data = (volume +/- variety +/- velocity) + (totality +/- exploration +/- dependency +/- frequency) In this view, data and analytics are not just about the size, but about the variety of sources, frequency of use, and how much the nature of the data-query results determines the schema, rather than the other way around. LYNXeon is tooled for data exploration, not just data mining or event alerting. We have seen many examples of defense-grade security moving into the private sector, starting with those customers most likely to be targeted and who have the budgets and expertise to afford analytics. This kind of market expansion comes with its own set of challenges, particularly in adapting the security product to the capabilities of less-disciplined organizations. 21CT might choose to focus on geographic expansion rather than moving into market segments that won't appreciate its features. That said, we could still see a home for LYNXeon in areas where the data is complex and highly contextual, such as in healthcare, or in critical infrastructure and manufacturing, where it could tie security elements more closely to operational data. And data-heavy operational environments, such as those within cloud and hosting-provider infrastructures, could also benefit from this level of analytics. Either way, though, we would urge 21CT to slip the surly bonds of SIEM and market its analytics platform with its broader intelligence capabilities, particularly above the traditional network layer. Competition Since we're looking at 21CT through the security lens, we'll stay with the competitive field among security vendors, even though the company could take on BI aspirations as well. One of the first rivals that comes to mind is Red Lambda, with its Neural Foam AI engine; it works with both Copyright The 451 Group 4
5 structured and unstructured data, and is backed by the company's proprietary, high-performance MetaGrid computing platform. (We would actually be interested in seeing what the two companies could create in synergy.) Another close competitor is Palantir Technologies, which plays in the same verticals (intelligence, law enforcement, antifraud, cyber-security) and has a very strong UI and visualization display. IBM's i2 Intelligence Analysis software, just announced last month, leans more toward the intelligence, antifraud and law-enforcement communities. Many other vendors that specifically market using the keywords 'big data,' 'security' and (often) 'analytics' together include Pervasive Software, the Packetloop platform, Splunk, Click Security, SenSage and more. However, most of these still focus on the network and operating system layers, and focus on real-time intelligence rather than predictive analytics, or serve up predefined analytics with less support for exploration. RSA NetWitness has beautiful visualization, for example, but it's limited to what comes out of network traffic. Yes, there is a very long list of additional vendors that focus on SIEM, risk analysis, intrusion detection and threat intelligence, and to a greater or lesser extent, they could be said to compete with 21CT. For the sake of brevity, though, we are not including those vendors that only claim support for big data in that they can handle a lot of data, particularly if they limit themselves to network-layer security. In the spirit of total data, they should at least be promoting a new offering that addresses increased scalability and speed requirements, while at the same time offering analytics (as opposed to reporting) and ideally stepping out of the narrow log and network security courtyard. A key point we have made is that 'traditional security data is no longer the only relevant data for enterprise data security.' To be considered competitive with the likes of 21CT, Palantir and Red Lamba, vendors need to think creatively beyond the security data, and into the broader world of intelligence. On the other side, we wouldn't advise 21CT to go up against SIEM vendors that offer sensors, collection mechanisms, log management, forensics or alerting. Enterprises still need these functions, and LYNXeon would be supplementary to them. We believe the use cases are far enough apart that they can coexist. SWOT Analysis Strengths Weaknesses Copyright The 451 Group 5
6 21CT's strength is in its patented algorithms that support its graph pattern analysis. Since it has been with the big players all this time, it already knows its way around big data (and more importantly, total data). Its Pattern Query Language offers fine-grained control for the serious analyst. The LYNXeon graphical user interface could use some more work to catch up to its closest competitors, which have a wider variety of data visualization and interaction techniques. Opportunities Threats The company has the opportunity to skip the SIEM stage and expand into broader realms of security intelligence, as well as lend its analytics to business-layer data. This could increase the number of receptive verticals. Rightly or wrongly, there's a large group of vendors jumping on the big data, security and analytics bandwagons. 21CT needs to differentiate itself clearly to pass them by in the security market. Copyright The 451 Group 6
7 Reproduced by permission of The 451 Group; This report was originally published within 451 Research s Market Insight Service. For additional information on 451 Research or to apply for trial access, go to: Copyright The 451 Group 7
Critical Watch aims to reduce countermeasure deployment pain by doing it all for you
Critical Watch aims to reduce countermeasure deployment pain by doing it all for you Analyst: Javvad Malik 6 Sep, 2012 Critical Watch offers Active Countermeasure Intelligence, a combination of risk intelligence
More informationIBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
More informationAugust 2011. Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach
August 2011 A Sensage TechNote highlighting the essential workflow involved in a potential insider breach Table of Contents Executive Summary... 1... 1 What Just Happened?... 2 What did that user account
More informationKEYW uses acquired Sensage technology to form Hexis Cyber Solutions
KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with
More informationWith Cloud Defender, Alert Logic combines products to deliver outcome-based security
With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,
More informationSplunk expands operational intelligence to mobile apps with MINT
Splunk expands operational intelligence to mobile apps with MINT Analyst: Raúl Castañón-Martínez 17 Mar, 2015 Splunk has announced a significant update to its mobile intelligence offering, Splunk MINT,
More informationA New Era Of Analytic
Penang egovernment Seminar 2014 A New Era Of Analytic Megat Anuar Idris Head, Project Delivery, Business Analytics & Big Data Agenda Overview of Big Data Case Studies on Big Data Big Data Technology Readiness
More informationSAS gets into visual analysis in earnest, brings DataFlux unit into the fold
SAS gets into visual analysis in earnest, brings DataFlux unit into the fold Analyst: Krishna Roy 20 Jul, 2012 SAS Institute is looking to turn up the heat in the sizzling business analytics sector with
More informationIBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
More informationThe SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
More informationHow To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
More informationTake the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
More informationSecurity Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC robert.griffin@rsa.com blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
More informationVigilent shows market awareness with datacenter dynamic cooling update
Vigilent shows market awareness with datacenter dynamic cooling update Analyst: Rhonda Ascierto 15 Jan, 2014 Vigilent, formerly known as Federspiel Controls, appears to be pulling ahead in the small yet
More informationNubo Software's UX over IP brings network efficiency to virtual mobile infrastructure
Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'
More informationNext Generation Business Performance Management Solution
Next Generation Business Performance Management Solution Why Existing Business Intelligence (BI) Products are Inadequate Changing Business Environment In the face of increased competition, complex customer
More informationHow To Make Data Streaming A Real Time Intelligence
REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log
More informationIMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
More informationlocuz.com Big Data Services
locuz.com Big Data Services Big Data At Locuz, we help the enterprise move from being a data-limited to a data-driven one, thereby enabling smarter, faster decisions that result in better business outcome.
More informationThe Clear Path to Business Intelligence
SAP Solution in Detail SAP Solutions for Small Businesses and Midsize Companies SAP Crystal Solutions The Clear Path to Business Intelligence Table of Contents 3 Quick Facts 4 Optimize Decisions with SAP
More informationUsing LYNXeon with NetFlow to Complete Your Cyber Security Picture
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture 21CT.COM Combine NetFlow traffic with other data sources and see more of your network, over a longer period of time. Introduction Many
More informationPOWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS
ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations
More informationBuilding a BI/Analytics Foundation
Building a BI/Analytics Foundation for Effective Population Health in the Era of Value-Based Care Bill O Connor, Vice President, Consulting Services, Orion Health and Akshay Srivastava, Implementation
More information2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
More informationLOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
More informationQRadar SIEM and Zscaler Nanolog Streaming Service
QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets
More informationChartis RiskTech Quadrant for Model Risk Management Systems 2014
Chartis RiskTech Quadrant for Model Risk Management Systems 2014 The RiskTech Quadrant is copyrighted June 2014 by Chartis Research Ltd. and is reused with permission. No part of the RiskTech Quadrant
More informationWeb Threat Detection 5.0, the second major release under RSA for the former Silver Tail
Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Analyst: Javvad Malik 24 Sep, 2014 It's almost two years to the day since RSA acquired Web-fraud detection vendor
More informationThe Next Generation Security Operations Center
The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationSymantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationDetect & Investigate Threats. OVERVIEW
Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide
More informationAddressing government challenges with big data analytics
IBM Software White Paper Government Addressing government challenges with big data analytics 2 Addressing government challenges with big data analytics Contents 2 Introduction 4 How big data analytics
More informationHow To Handle Big Data With A Data Scientist
III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution
More informationBIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY
BIG DATA CHANGING THE REALM OF POSSIBILITY IN SECURITY Shaun McLagan General Manager, RSA Australia and New Zealand 1 Things have changed #2 Buzz word 2012 Big Data only behind something called Fiscal
More informationHow To Choose A Business Intelligence Toolkit
Background Current Reporting Challenges: Difficulty extracting various levels of data from AgLearn Limited ability to translate data into presentable formats Complex reporting requires the technical staff
More informationINTRODUCING RETAIL INTELLIGENCE
INTRODUCING RETAIL GET READY FOR THE NEXT WAVE OF ANALYTICS IN RETAIL By: Dan Theirl Rubikloud Technologies Inc. www.rubikloud.com Prepared by: Laura Leslie Neil Laing Tiffany Hsiao WHAT IS RETAIL? Retail
More informationThe Purview Solution Integration With Splunk
The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration
More informationThe 4 Pillars of Technosoft s Big Data Practice
beyond possible Big Use End-user applications Big Analytics Visualisation tools Big Analytical tools Big management systems The 4 Pillars of Technosoft s Big Practice Overview Businesses have long managed
More informationAchieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
More informationThe Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
More informationSecurity strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
More informationCYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
More informationSecurity Information and Event Management. White Paper. Expand the Power of SIEM with Real-Time Windows Security Intelligence
White Paper Security Information and Event Management Expand the Power of SIEM with Real-Time Windows Security Intelligence www.stealthbits.com 201-447-9300 Identify Threats. Secure data. Reduce risk.
More informationSECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.
SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital
More informationHow In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time
SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first
More informationWinning with an Intuitive Business Intelligence Solution for Midsize Companies
SAP Product Brief SAP s for Small Businesses and Midsize Companies SAP BusinessObjects Business Intelligence, Edge Edition Objectives Winning with an Intuitive Business Intelligence for Midsize Companies
More informationPDF PREVIEW EMERGING TECHNOLOGIES. Applying Technologies for Social Media Data Analysis
VOLUME 34 BEST PRACTICES IN BUSINESS INTELLIGENCE AND DATA WAREHOUSING FROM LEADING SOLUTION PROVIDERS AND EXPERTS PDF PREVIEW IN EMERGING TECHNOLOGIES POWERFUL CASE STUDIES AND LESSONS LEARNED FOCUSING
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationWhite Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
More informationThe Future of Data Management
The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class
More informationLeveraging Machine Data to Deliver New Insights for Business Analytics
Copyright 2015 Splunk Inc. Leveraging Machine Data to Deliver New Insights for Business Analytics Rahul Deshmukh Director, Solutions Marketing Jason Fedota Regional Sales Manager Safe Harbor Statement
More informationGETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
More informationXpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
More informationEnterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
More informationHow To Manage Log Management
: Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll
More informationMaking confident decisions with the full spectrum of analysis capabilities
IBM Software Business Analytics Analysis Making confident decisions with the full spectrum of analysis capabilities Making confident decisions with the full spectrum of analysis capabilities Contents 2
More informationCopyright 2013 Splunk Inc. Introducing Splunk 6
Copyright 2013 Splunk Inc. Introducing Splunk 6 Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected performance
More informationVisualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationAre You Ready for Big Data?
Are You Ready for Big Data? Jim Gallo National Director, Business Analytics February 11, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?
More informationExtend your analytic capabilities with SAP Predictive Analysis
September 9 11, 2013 Anaheim, California Extend your analytic capabilities with SAP Predictive Analysis Charles Gadalla Learning Points Advanced analytics strategy at SAP Simplifying predictive analytics
More informationAdobe Insight, powered by Omniture
Adobe Insight, powered by Omniture Accelerating government intelligence to the speed of thought 1 Challenges that analysts face 2 Analysis tools and functionality 3 Adobe Insight 4 Summary Never before
More informationStrategic Decisions Supported by SAP Big Data Solutions. Angélica Bedoya / Strategic Solutions GTM Mar /2014
Strategic Decisions Supported by SAP Big Data Solutions Angélica Bedoya / Strategic Solutions GTM Mar /2014 What critical new signals Might you be missing? Use Analytics Today 10% 75% Need Analytics by
More informationPUSH INTELLIGENCE. Bridging the Last Mile to Business Intelligence & Big Data. 2013 Copyright Metric Insights, Inc.
PUSH INTELLIGENCE Bridging the Last Mile to Business Intelligence & Big Data 2013 Copyright Metric Insights, Inc. INTRODUCTION... 3 CHALLENGES WITH BI... 4 The Dashboard Dilemma... 4 Architectural Limitations
More informationDiscover & Investigate Advanced Threats. OVERVIEW
Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics
More informationSTEALTHWATCH MANAGEMENT CONSOLE
STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
More informationWhy Big Data Analytics?
An ebook by Datameer Why Big Data Analytics? Three Business Challenges Best Addressed Using Big Data Analytics It s hard to overstate the importance of data for businesses today. It s the lifeline of any
More informationINFOSYS SHOWS DISCOVERY- TO- DECISION PLATFORM INNOVATION WITH IIP
Infosys IIP - A Discovery- To- Decision Platform 1 INFOSYS SHOWS DISCOVERY- TO- DECISION PLATFORM INNOVATION WITH IIP Author: Reetika Joshi, Research Director, Consumer- Centric Operations & Analytics
More informationThe Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
More informationThe Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
More informationBest Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
More informationWhite Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
More informationQRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
More informationCreating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement
Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement Bruce Eckert, National Practice Director, Advisory Group Ramesh Sakiri, Executive Consultant, Healthcare
More informationIBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics
Independently explore, visualize, model and share insights without IT assistance Highlights Explore, analyze, visualize and share your insights independently, without relying on IT for assistance. Work
More informationThe Future of the Advanced SOC
The Future of the Advanced SOC Developing a platform for more effective security management and compliance Steven Van Ormer RSA Technical Security Consultant 1 Agenda Today s Security Landscape and Why
More informationHow To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
More informationNetwork Performance + Security Monitoring
Network Performance + Security Monitoring Gain actionable insight through flow-based security and network performance monitoring across physical and virtual environments. Uncover the root cause of performance
More informationOPTIMIZING PERFORMANCE IN AMAZON EC2 INTRODUCTION: LEVERAGING THE PUBLIC CLOUD OPPORTUNITY WITH AMAZON EC2. www.boundary.com
OPTIMIZING PERFORMANCE IN AMAZON EC2 While the business decision to migrate to Amazon public cloud services can be an easy one, tracking and managing performance in these environments isn t so clear cut.
More informationAlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationThe State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
More informationData Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
More informationApigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps
White provides GRASP-powered big data predictive analytics that increases marketing effectiveness and customer satisfaction with API-driven adaptive apps that anticipate, learn, and adapt to deliver contextual,
More informationDetecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
More informationRevealing the Where of Business
Revealing the Where of Business Intelligence using Location Analytics Brought to you compliments of: Increasingly, data is viewed as the lifeblood of organizations. Across industries, information is sliced,
More informationAravind Gottapu Jerry Timko Embracing Lumira Session #3566
Aravind Gottapu Jerry Timko Embracing Lumira Session #3566 AGENDA Choosing Lumira @ Cardinal Health What went wrong Data Discovery vs Traditional BI Why is this the right time to have strong business case
More informationChallenges of Analytics
Challenges of Analytics Setting-up a Data Science Team BA4ALL Eindhoven November 2015 Laurent FAYET CEO @lbfayet www.artycs.eu 1 Agenda 1 About ARTYCS 2 Definitions 3 Data Value Creation 4 An Approach
More informationSynergic Partners: Spanish big-data pioneer
Synergic Partners: Spanish big-data pioneer Analyst: Katy Ring 20 Mar, 2015 Synergic Partners offers a services portfolio around data engineering, big data and data science. The company focuses on business
More informationWHITEPAPER. Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk
WHITEPAPER Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk Overview Angoss is helping its clients achieve significant revenue growth and measurable return
More informationUsing Tableau Software with Hortonworks Data Platform
Using Tableau Software with Hortonworks Data Platform September 2013 2013 Hortonworks Inc. http:// Modern businesses need to manage vast amounts of data, and in many cases they have accumulated this data
More informationData Analytics Solution for Enterprise Performance Management
A Kavaii White Paper http://www.kavaii.com Data Analytics Solution for Enterprise Performance Management Automated. Easy to Use. Quick to Deploy. Kavaii Analytics Team Democratizing Data Analytics & Providing
More informationHow To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
More informationNiara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
More informationImproving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
More informationESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,
More informationTHE STATE OF Social Media Analytics. How Leading Marketers Are Using Social Media Analytics
THE STATE OF Social Media Analytics May 2016 Getting to Know You: How Leading Marketers Are Using Social Media Analytics» Marketers are expanding their use of advanced social media analytics and combining
More information