21CT's LYNXeon brings intelligence to security analytics for data of all sizes

Size: px
Start display at page:

Download "21CT's LYNXeon brings intelligence to security analytics for data of all sizes"

Transcription

1 21CT's LYNXeon brings intelligence to security analytics for data of all sizes Analyst: Wendy Nather 8 Jun, 2012 There's a big difference between analytics and reporting. Reporting shows you the data that's there; analytics generates new information out of the existing data, and can create new data to feed back into the system. Stricter definitions of analytics require mathematical processes or statistical models, as opposed to simply inferring conclusions from reported data. They also describe actions such as forecasting, optimization, predictive modeling and simulation. Visualization is a key element of analytics, since good visualization can facilitate the discovery of new information, and mediocre visualization can lock the user into the limited viewpoint of the product (pie charts, anyone?). Putting hot trend words together can create a phrase hotter than the sum of its parts, the latest example being 'big data security analytics.' And as we have described, not every security vendor that has been around for a decade can suddenly rebrand its product as 'big data' or even 'analytics.' But if the product has been designed for analytics from the ground up, and has been using disparate sources of data at very large volumes, it's a different story. This is the story of 21CT's LYNXeon intelligence analytics and visualization platform. The 451 Take As we have said, traditional security data is no longer the only relevant data for enterprise security. Simply handling large volumes of data at great speed is not enough; the differentiators are in support for data variety and exploration, among other factors. 21CT came from the defense and intelligence communities with an analytics platform that already promoted data agnosticism, underpinned by proprietary algorithms for complex graph pattern analysis. The company needs to avoid being trapped in the SIEM category; even within the Copyright The 451 Group 1

2 security market, it should be touting its support for what we call 'total data,' and bring security intelligence that much closer to business intelligence. Its field of real competitors for this particular market is still small, but fierce and a lot of aspirants to big data security analytics are capable of joining them, if they ever get off the network and OS layers. Context Based in Austin, Texas, 21CT (formerly known as 21st Century Technologies) was founded in 1999 by two MIT scientists (who are no longer involved with the company). The company is led by CEO Irene Williams, who has been driving the growth of LYNXeon as well as its R&D and custom application development lines of business since Frederick Chang, former director of research at the NSA, joined 21CT in March 2012 as its president and COO. In June 2010, the company announced its acquisition of NetflowData, a cyber-security consulting firm with four employees, based in Maryland. 21CT has roughly 80 employees, with half of those in the DC area and the other half in Austin. It is self-funded and has been cash-flow positive since its founding. 21CT holds six patents in areas ranging from 'intelligent intrusion detection system utilizing enhanced graph-matching of network activity with context data' and 'social network aware pattern detection' to 'tactical and strategic attack detection and prediction.' The earliest of these was filed in March 2006 and the latest was granted in November Thirteen more patent applications have been filed. Technology The heart of 21CT's technology is its LYNXeon platform, which is intended to support its use by a team of analysts. Originally these were mostly defense and intelligence analysts, developing network and social connection information out of data such as electronic communication records, geospatial data, training and conference events, financial transactions and more. LYNXeon uses sophisticated graph pattern analysis to help identify and visualize relationships and sequences of connections that are non-obvious and that could not have been uncovered by a known set of queries. Although the product comes with a large set of pre-generated queries (known as the LYNXeon Analytic Catalog), a user can customize, import or construct any type of query using 21CT's copyrighted Pattern Query Language. Copyright The 451 Group 2

3 Since LYNXeon handles any kind of structured data input, its strength lies in the ability to bring very disparate sources together and mathematically discover connections among them. The user interface displays these relationships in any number of ways: as a network, a graph, a chart (and you can even, if you must, export it as an Excel spreadsheet). An analyst working with the platform can create queries, work with subsets of the resulting data, export the final constellation as another saved query (analytic), map out a time series, annotate elements in the visualization, and share the results with others in the workgroup. And because 21CT has been working all this time with national defense agencies, it is used to processing millions or billions of data elements per query with low latency. Currently, the types of analyses being performed with LYNXeon tend to be very threat-centric: finding terrorists, detecting fraud and uncovering network-based attacks. A security analyst might run a query to detect a combination of behaviors or events using as inputs IP addresses, port ranges, GPS coordinates, NetFlow data, identity stores, application logs, badge access records and database query logs. The analyst might then identify a common sequence of events within a particular timeframe, add or remove constraints within the query, and play with the resulting net to see what other associations appear, either directly or within a number of degrees of separation. The LYNXeon system is geared toward intelligence communities and large enterprises, where a typical deal might run into the hundreds of thousands of dollars or more. However, 21CT also offers tiered pricing for smaller data scales. A trimmed-down version of the tool, called LYNXeon Wildcat, in beta, is also available. This edition is configured for a single user on a desktop, with a simplified user interface and feature set, and includes free NetFlow traffic analytics. The enterprise version, by contrast, requires a Linux-based server with a recommended four quad-cores, 64GB of RAM and minimum 2TB of internal disk, depending on data-retention requirements. Strategy Because of its roots in the intelligence world, 21CT has clientele ranging from the US Army and US Air Force to 'if we told you,...' It was not a big step to go from one type of intelligence to another within the same market, so cyber-security is one of 21CT's big pushes, along with fraud detection for banking and criminal tracking for law enforcement. And because of its initial use cases for intrusion detection within IT security, LYNXeon has often been lumped in with the SIEM tools. However, this view is terribly narrow, given that the platform's engine was designed to be data agnostic. By data agnostic, we don't mean 'any kind of computer-based log or security tool output' we mean 'high school honor rolls, plus changes in the McDonald's menu, plus auto insurance rates Copyright The 451 Group 3

4 over the past two years, and Broadway actors that have also bought clarinets.' If there were a chance to pull analytics out of the facetious risk equation 'peanut butter times jet engine equals shiny,' this would be it. We see applicability for this platform far beyond threat-centric models, and although it could prove very useful for security threat intelligence, it shouldn't stop there. A tool this flexible has the potential to bridge the IT layers with the business layers, so that the intelligence gathered is more meaningful to the C-suite no matter what the business is. And while we're talking about bringing security intelligence closer to business intelligence, we should look at the 451 vision, not of big data, but of total data: Total Data = (volume +/- variety +/- velocity) + (totality +/- exploration +/- dependency +/- frequency) In this view, data and analytics are not just about the size, but about the variety of sources, frequency of use, and how much the nature of the data-query results determines the schema, rather than the other way around. LYNXeon is tooled for data exploration, not just data mining or event alerting. We have seen many examples of defense-grade security moving into the private sector, starting with those customers most likely to be targeted and who have the budgets and expertise to afford analytics. This kind of market expansion comes with its own set of challenges, particularly in adapting the security product to the capabilities of less-disciplined organizations. 21CT might choose to focus on geographic expansion rather than moving into market segments that won't appreciate its features. That said, we could still see a home for LYNXeon in areas where the data is complex and highly contextual, such as in healthcare, or in critical infrastructure and manufacturing, where it could tie security elements more closely to operational data. And data-heavy operational environments, such as those within cloud and hosting-provider infrastructures, could also benefit from this level of analytics. Either way, though, we would urge 21CT to slip the surly bonds of SIEM and market its analytics platform with its broader intelligence capabilities, particularly above the traditional network layer. Competition Since we're looking at 21CT through the security lens, we'll stay with the competitive field among security vendors, even though the company could take on BI aspirations as well. One of the first rivals that comes to mind is Red Lambda, with its Neural Foam AI engine; it works with both Copyright The 451 Group 4

5 structured and unstructured data, and is backed by the company's proprietary, high-performance MetaGrid computing platform. (We would actually be interested in seeing what the two companies could create in synergy.) Another close competitor is Palantir Technologies, which plays in the same verticals (intelligence, law enforcement, antifraud, cyber-security) and has a very strong UI and visualization display. IBM's i2 Intelligence Analysis software, just announced last month, leans more toward the intelligence, antifraud and law-enforcement communities. Many other vendors that specifically market using the keywords 'big data,' 'security' and (often) 'analytics' together include Pervasive Software, the Packetloop platform, Splunk, Click Security, SenSage and more. However, most of these still focus on the network and operating system layers, and focus on real-time intelligence rather than predictive analytics, or serve up predefined analytics with less support for exploration. RSA NetWitness has beautiful visualization, for example, but it's limited to what comes out of network traffic. Yes, there is a very long list of additional vendors that focus on SIEM, risk analysis, intrusion detection and threat intelligence, and to a greater or lesser extent, they could be said to compete with 21CT. For the sake of brevity, though, we are not including those vendors that only claim support for big data in that they can handle a lot of data, particularly if they limit themselves to network-layer security. In the spirit of total data, they should at least be promoting a new offering that addresses increased scalability and speed requirements, while at the same time offering analytics (as opposed to reporting) and ideally stepping out of the narrow log and network security courtyard. A key point we have made is that 'traditional security data is no longer the only relevant data for enterprise data security.' To be considered competitive with the likes of 21CT, Palantir and Red Lamba, vendors need to think creatively beyond the security data, and into the broader world of intelligence. On the other side, we wouldn't advise 21CT to go up against SIEM vendors that offer sensors, collection mechanisms, log management, forensics or alerting. Enterprises still need these functions, and LYNXeon would be supplementary to them. We believe the use cases are far enough apart that they can coexist. SWOT Analysis Strengths Weaknesses Copyright The 451 Group 5

6 21CT's strength is in its patented algorithms that support its graph pattern analysis. Since it has been with the big players all this time, it already knows its way around big data (and more importantly, total data). Its Pattern Query Language offers fine-grained control for the serious analyst. The LYNXeon graphical user interface could use some more work to catch up to its closest competitors, which have a wider variety of data visualization and interaction techniques. Opportunities Threats The company has the opportunity to skip the SIEM stage and expand into broader realms of security intelligence, as well as lend its analytics to business-layer data. This could increase the number of receptive verticals. Rightly or wrongly, there's a large group of vendors jumping on the big data, security and analytics bandwagons. 21CT needs to differentiate itself clearly to pass them by in the security market. Copyright The 451 Group 6

7 Reproduced by permission of The 451 Group; This report was originally published within 451 Research s Market Insight Service. For additional information on 451 Research or to apply for trial access, go to: Copyright The 451 Group 7

Critical Watch aims to reduce countermeasure deployment pain by doing it all for you

Critical Watch aims to reduce countermeasure deployment pain by doing it all for you Critical Watch aims to reduce countermeasure deployment pain by doing it all for you Analyst: Javvad Malik 6 Sep, 2012 Critical Watch offers Active Countermeasure Intelligence, a combination of risk intelligence

More information

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already

More information

August 2011. Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

August 2011. Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach August 2011 A Sensage TechNote highlighting the essential workflow involved in a potential insider breach Table of Contents Executive Summary... 1... 1 What Just Happened?... 2 What did that user account

More information

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

Splunk expands operational intelligence to mobile apps with MINT

Splunk expands operational intelligence to mobile apps with MINT Splunk expands operational intelligence to mobile apps with MINT Analyst: Raúl Castañón-Martínez 17 Mar, 2015 Splunk has announced a significant update to its mobile intelligence offering, Splunk MINT,

More information

A New Era Of Analytic

A New Era Of Analytic Penang egovernment Seminar 2014 A New Era Of Analytic Megat Anuar Idris Head, Project Delivery, Business Analytics & Big Data Agenda Overview of Big Data Case Studies on Big Data Big Data Technology Readiness

More information

SAS gets into visual analysis in earnest, brings DataFlux unit into the fold

SAS gets into visual analysis in earnest, brings DataFlux unit into the fold SAS gets into visual analysis in earnest, brings DataFlux unit into the fold Analyst: Krishna Roy 20 Jul, 2012 SAS Institute is looking to turn up the heat in the sizzling business analytics sector with

More information

IBM QRadar Security Intelligence Platform appliances

IBM QRadar Security Intelligence Platform appliances IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

Security Analytics for Smart Grid

Security Analytics for Smart Grid Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC robert.griffin@rsa.com blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard

More information

Vigilent shows market awareness with datacenter dynamic cooling update

Vigilent shows market awareness with datacenter dynamic cooling update Vigilent shows market awareness with datacenter dynamic cooling update Analyst: Rhonda Ascierto 15 Jan, 2014 Vigilent, formerly known as Federspiel Controls, appears to be pulling ahead in the small yet

More information

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'

More information

Next Generation Business Performance Management Solution

Next Generation Business Performance Management Solution Next Generation Business Performance Management Solution Why Existing Business Intelligence (BI) Products are Inadequate Changing Business Environment In the face of increased competition, complex customer

More information

How To Make Data Streaming A Real Time Intelligence

How To Make Data Streaming A Real Time Intelligence REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

locuz.com Big Data Services

locuz.com Big Data Services locuz.com Big Data Services Big Data At Locuz, we help the enterprise move from being a data-limited to a data-driven one, thereby enabling smarter, faster decisions that result in better business outcome.

More information

The Clear Path to Business Intelligence

The Clear Path to Business Intelligence SAP Solution in Detail SAP Solutions for Small Businesses and Midsize Companies SAP Crystal Solutions The Clear Path to Business Intelligence Table of Contents 3 Quick Facts 4 Optimize Decisions with SAP

More information

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture Using LYNXeon with NetFlow to Complete Your Cyber Security Picture 21CT.COM Combine NetFlow traffic with other data sources and see more of your network, over a longer period of time. Introduction Many

More information

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations

More information

Building a BI/Analytics Foundation

Building a BI/Analytics Foundation Building a BI/Analytics Foundation for Effective Population Health in the Era of Value-Based Care Bill O Connor, Vice President, Consulting Services, Orion Health and Akshay Srivastava, Implementation

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

QRadar SIEM and Zscaler Nanolog Streaming Service

QRadar SIEM and Zscaler Nanolog Streaming Service QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets

More information

Chartis RiskTech Quadrant for Model Risk Management Systems 2014

Chartis RiskTech Quadrant for Model Risk Management Systems 2014 Chartis RiskTech Quadrant for Model Risk Management Systems 2014 The RiskTech Quadrant is copyrighted June 2014 by Chartis Research Ltd. and is reused with permission. No part of the RiskTech Quadrant

More information

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail

Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail Analyst: Javvad Malik 24 Sep, 2014 It's almost two years to the day since RSA acquired Web-fraud detection vendor

More information

The Next Generation Security Operations Center

The Next Generation Security Operations Center The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

Addressing government challenges with big data analytics

Addressing government challenges with big data analytics IBM Software White Paper Government Addressing government challenges with big data analytics 2 Addressing government challenges with big data analytics Contents 2 Introduction 4 How big data analytics

More information

How To Handle Big Data With A Data Scientist

How To Handle Big Data With A Data Scientist III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution

More information

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY BIG DATA CHANGING THE REALM OF POSSIBILITY IN SECURITY Shaun McLagan General Manager, RSA Australia and New Zealand 1 Things have changed #2 Buzz word 2012 Big Data only behind something called Fiscal

More information

How To Choose A Business Intelligence Toolkit

How To Choose A Business Intelligence Toolkit Background Current Reporting Challenges: Difficulty extracting various levels of data from AgLearn Limited ability to translate data into presentable formats Complex reporting requires the technical staff

More information

INTRODUCING RETAIL INTELLIGENCE

INTRODUCING RETAIL INTELLIGENCE INTRODUCING RETAIL GET READY FOR THE NEXT WAVE OF ANALYTICS IN RETAIL By: Dan Theirl Rubikloud Technologies Inc. www.rubikloud.com Prepared by: Laura Leslie Neil Laing Tiffany Hsiao WHAT IS RETAIL? Retail

More information

The Purview Solution Integration With Splunk

The Purview Solution Integration With Splunk The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration

More information

The 4 Pillars of Technosoft s Big Data Practice

The 4 Pillars of Technosoft s Big Data Practice beyond possible Big Use End-user applications Big Analytics Visualisation tools Big Analytical tools Big management systems The 4 Pillars of Technosoft s Big Practice Overview Businesses have long managed

More information

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO

More information

The Big Data Paradigm Shift. Insight Through Automation

The Big Data Paradigm Shift. Insight Through Automation The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.

More information

Security strategies to stay off the Børsen front page

Security strategies to stay off the Børsen front page Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Security Information and Event Management. White Paper. Expand the Power of SIEM with Real-Time Windows Security Intelligence

Security Information and Event Management. White Paper. Expand the Power of SIEM with Real-Time Windows Security Intelligence White Paper Security Information and Event Management Expand the Power of SIEM with Real-Time Windows Security Intelligence www.stealthbits.com 201-447-9300 Identify Threats. Secure data. Reduce risk.

More information

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved. SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital

More information

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first

More information

Winning with an Intuitive Business Intelligence Solution for Midsize Companies

Winning with an Intuitive Business Intelligence Solution for Midsize Companies SAP Product Brief SAP s for Small Businesses and Midsize Companies SAP BusinessObjects Business Intelligence, Edge Edition Objectives Winning with an Intuitive Business Intelligence for Midsize Companies

More information

PDF PREVIEW EMERGING TECHNOLOGIES. Applying Technologies for Social Media Data Analysis

PDF PREVIEW EMERGING TECHNOLOGIES. Applying Technologies for Social Media Data Analysis VOLUME 34 BEST PRACTICES IN BUSINESS INTELLIGENCE AND DATA WAREHOUSING FROM LEADING SOLUTION PROVIDERS AND EXPERTS PDF PREVIEW IN EMERGING TECHNOLOGIES POWERFUL CASE STUDIES AND LESSONS LEARNED FOCUSING

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

The Future of Data Management

The Future of Data Management The Future of Data Management with Hadoop and the Enterprise Data Hub Amr Awadallah (@awadallah) Cofounder and CTO Cloudera Snapshot Founded 2008, by former employees of Employees Today ~ 800 World Class

More information

Leveraging Machine Data to Deliver New Insights for Business Analytics

Leveraging Machine Data to Deliver New Insights for Business Analytics Copyright 2015 Splunk Inc. Leveraging Machine Data to Deliver New Insights for Business Analytics Rahul Deshmukh Director, Solutions Marketing Jason Fedota Regional Sales Manager Safe Harbor Statement

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

How To Manage Log Management

How To Manage Log Management : Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll

More information

Making confident decisions with the full spectrum of analysis capabilities

Making confident decisions with the full spectrum of analysis capabilities IBM Software Business Analytics Analysis Making confident decisions with the full spectrum of analysis capabilities Making confident decisions with the full spectrum of analysis capabilities Contents 2

More information

Copyright 2013 Splunk Inc. Introducing Splunk 6

Copyright 2013 Splunk Inc. Introducing Splunk 6 Copyright 2013 Splunk Inc. Introducing Splunk 6 Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected performance

More information

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, jfeasel@t-sciences.com Technical POC: George Romas, gromas@t-sciences.com

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

Are You Ready for Big Data?

Are You Ready for Big Data? Are You Ready for Big Data? Jim Gallo National Director, Business Analytics February 11, 2013 Agenda What is Big Data? How do you leverage Big Data in your company? How do you prepare for a Big Data initiative?

More information

Extend your analytic capabilities with SAP Predictive Analysis

Extend your analytic capabilities with SAP Predictive Analysis September 9 11, 2013 Anaheim, California Extend your analytic capabilities with SAP Predictive Analysis Charles Gadalla Learning Points Advanced analytics strategy at SAP Simplifying predictive analytics

More information

Adobe Insight, powered by Omniture

Adobe Insight, powered by Omniture Adobe Insight, powered by Omniture Accelerating government intelligence to the speed of thought 1 Challenges that analysts face 2 Analysis tools and functionality 3 Adobe Insight 4 Summary Never before

More information

Strategic Decisions Supported by SAP Big Data Solutions. Angélica Bedoya / Strategic Solutions GTM Mar /2014

Strategic Decisions Supported by SAP Big Data Solutions. Angélica Bedoya / Strategic Solutions GTM Mar /2014 Strategic Decisions Supported by SAP Big Data Solutions Angélica Bedoya / Strategic Solutions GTM Mar /2014 What critical new signals Might you be missing? Use Analytics Today 10% 75% Need Analytics by

More information

PUSH INTELLIGENCE. Bridging the Last Mile to Business Intelligence & Big Data. 2013 Copyright Metric Insights, Inc.

PUSH INTELLIGENCE. Bridging the Last Mile to Business Intelligence & Big Data. 2013 Copyright Metric Insights, Inc. PUSH INTELLIGENCE Bridging the Last Mile to Business Intelligence & Big Data 2013 Copyright Metric Insights, Inc. INTRODUCTION... 3 CHALLENGES WITH BI... 4 The Dashboard Dilemma... 4 Architectural Limitations

More information

Discover & Investigate Advanced Threats. OVERVIEW

Discover & Investigate Advanced Threats. OVERVIEW Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics

More information

STEALTHWATCH MANAGEMENT CONSOLE

STEALTHWATCH MANAGEMENT CONSOLE STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations

More information

Why Big Data Analytics?

Why Big Data Analytics? An ebook by Datameer Why Big Data Analytics? Three Business Challenges Best Addressed Using Big Data Analytics It s hard to overstate the importance of data for businesses today. It s the lifeline of any

More information

INFOSYS SHOWS DISCOVERY- TO- DECISION PLATFORM INNOVATION WITH IIP

INFOSYS SHOWS DISCOVERY- TO- DECISION PLATFORM INNOVATION WITH IIP Infosys IIP - A Discovery- To- Decision Platform 1 INFOSYS SHOWS DISCOVERY- TO- DECISION PLATFORM INNOVATION WITH IIP Author: Reetika Joshi, Research Director, Consumer- Centric Operations & Analytics

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

White Paper. How Streaming Data Analytics Enables Real-Time Decisions

White Paper. How Streaming Data Analytics Enables Real-Time Decisions White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream

More information

QRadar Security Intelligence Platform Appliances

QRadar Security Intelligence Platform Appliances DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management

More information

Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement

Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement Creating a Business Intelligence Competency Center to Accelerate Healthcare Performance Improvement Bruce Eckert, National Practice Director, Advisory Group Ramesh Sakiri, Executive Consultant, Healthcare

More information

IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics

IBM Cognos Insight. Independently explore, visualize, model and share insights without IT assistance. Highlights. IBM Software Business Analytics Independently explore, visualize, model and share insights without IT assistance Highlights Explore, analyze, visualize and share your insights independently, without relying on IT for assistance. Work

More information

The Future of the Advanced SOC

The Future of the Advanced SOC The Future of the Advanced SOC Developing a platform for more effective security management and compliance Steven Van Ormer RSA Technical Security Consultant 1 Agenda Today s Security Landscape and Why

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Network Performance + Security Monitoring

Network Performance + Security Monitoring Network Performance + Security Monitoring Gain actionable insight through flow-based security and network performance monitoring across physical and virtual environments. Uncover the root cause of performance

More information

OPTIMIZING PERFORMANCE IN AMAZON EC2 INTRODUCTION: LEVERAGING THE PUBLIC CLOUD OPPORTUNITY WITH AMAZON EC2. www.boundary.com

OPTIMIZING PERFORMANCE IN AMAZON EC2 INTRODUCTION: LEVERAGING THE PUBLIC CLOUD OPPORTUNITY WITH AMAZON EC2. www.boundary.com OPTIMIZING PERFORMANCE IN AMAZON EC2 While the business decision to migrate to Amazon public cloud services can be an easy one, tracking and managing performance in these environments isn t so clear cut.

More information

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

Apigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps

Apigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps White provides GRASP-powered big data predictive analytics that increases marketing effectiveness and customer satisfaction with API-driven adaptive apps that anticipate, learn, and adapt to deliver contextual,

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

Revealing the Where of Business

Revealing the Where of Business Revealing the Where of Business Intelligence using Location Analytics Brought to you compliments of: Increasingly, data is viewed as the lifeblood of organizations. Across industries, information is sliced,

More information

Aravind Gottapu Jerry Timko Embracing Lumira Session #3566

Aravind Gottapu Jerry Timko Embracing Lumira Session #3566 Aravind Gottapu Jerry Timko Embracing Lumira Session #3566 AGENDA Choosing Lumira @ Cardinal Health What went wrong Data Discovery vs Traditional BI Why is this the right time to have strong business case

More information

Challenges of Analytics

Challenges of Analytics Challenges of Analytics Setting-up a Data Science Team BA4ALL Eindhoven November 2015 Laurent FAYET CEO @lbfayet www.artycs.eu 1 Agenda 1 About ARTYCS 2 Definitions 3 Data Value Creation 4 An Approach

More information

Synergic Partners: Spanish big-data pioneer

Synergic Partners: Spanish big-data pioneer Synergic Partners: Spanish big-data pioneer Analyst: Katy Ring 20 Mar, 2015 Synergic Partners offers a services portfolio around data engineering, big data and data science. The company focuses on business

More information

WHITEPAPER. Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk

WHITEPAPER. Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk WHITEPAPER Creating and Deploying Predictive Strategies that Drive Customer Value in Marketing, Sales and Risk Overview Angoss is helping its clients achieve significant revenue growth and measurable return

More information

Using Tableau Software with Hortonworks Data Platform

Using Tableau Software with Hortonworks Data Platform Using Tableau Software with Hortonworks Data Platform September 2013 2013 Hortonworks Inc. http:// Modern businesses need to manage vast amounts of data, and in many cases they have accumulated this data

More information

Data Analytics Solution for Enterprise Performance Management

Data Analytics Solution for Enterprise Performance Management A Kavaii White Paper http://www.kavaii.com Data Analytics Solution for Enterprise Performance Management Automated. Easy to Use. Quick to Deploy. Kavaii Analytics Team Democratizing Data Analytics & Providing

More information

How To Manage Sourcefire From A Command Console

How To Manage Sourcefire From A Command Console Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security

More information

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments

More information

Improving Decision Making and Managing Knowledge

Improving Decision Making and Managing Knowledge Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

THE STATE OF Social Media Analytics. How Leading Marketers Are Using Social Media Analytics

THE STATE OF Social Media Analytics. How Leading Marketers Are Using Social Media Analytics THE STATE OF Social Media Analytics May 2016 Getting to Know You: How Leading Marketers Are Using Social Media Analytics» Marketers are expanding their use of advanced social media analytics and combining

More information