|By Marketwired .||
|August 6, 2014 11:39 AM EDT||
LOS ANGELES, CA and LAS VEGAS, NV -- (Marketwired) -- 08/06/14 -- Securonix LLC, the industry-leading platform for security analytics and intelligence, today announced the general availability of Securonix Security Intelligence Platform 4.6, the company's flagship software platform for enterprise security analytics and intelligence. This new release brings the power of Securonix's purpose built security analytics into a real-time detection and response across an enterprise environment -- network devices, applications, databases, and hosts. The company will demonstrate all of these new features at Black Hat 2014, Aug. 6-7 in Las Vegas, where the Securonix executive team will be joined by company board advisor and former NSA Deputy Director Chris Inglis at Booth 919.
"Securonix customers are rapidly adopting the use of signature-less analytics across their environment to detect and investigate the most advanced security threats. They are now looking for this analytics to be done inline and at the speed of the network. We have re-tooled the Securonix platform with major architecture changes and enhancements allowing us to provide real-time, context-enabled, behavior-based analysis across billions of events per day. This is a huge milestone for Securonix and the security industry," said Tanuj Gulati, Securonix CTO and co-founder.
Securonix 4.6 builds upon the innovation of previous product releases while adding very scalable real-time analytics, visualization, investigation and response capabilities required to detect advanced cyber and insider threats:
- New distributed architecture with multiple Real Time Analyzers and a Big Data Backbone for continuous inline threat detection
- Out of the box threat models for Data Exfiltration, High Privilege Account Monitoring, Insider Threats, Cyber Threats, Fraud, Data Breaches, VIP Snooping and Cloud Security
- Advanced investigation, visualization and response capabilities purpose built to deal with advanced threats
- Updated risk models and scoring around Dynamic Risk, Static Risk and Inherent Risk
"Distribution of data processing, storage and analytics across a distributed architecture provides our customers with the flexibility to move analytics closer to the source without the overhead of expensive hardware. We have scaled each node in the distributed model to analyze large volumes of data while being conscious of the happenings recorded by other nodes in the Securonix cluster," said Anjan Shenoy, Director of Engineering at Securonix.
Revamped with a completely new user interface to make it even more intuitive, the Securonix Security Intelligence Platform continues to provide the industry's leading visual analysis and investigation capabilities for the security analyst.
"Providing a single console for our end users and hiding the complexity associated with cross-node communication at network speed was a very tough problem to solve. We focused our efforts on personalizing views for end users. Our customer advisory team played a valuable role in providing us access to their day to day use of the product," said Harsh Patwardhan, Director of Usability Engineering for Securonix.
For more details on the Securonix platform, see http://www.securonix.com/secureproduct/security-intelligence/
For more information about Securonix at Black Hat, see http://www.securonix.com/company/events/
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com.
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
May. 24, 2015 11:00 PM EDT Reads: 5,846
MeriTalk, a public-private partnership focused on improving the outcomes of government IT, today announced the results of its new report, "The Agile Advantage: Can DevOps Move Cloud to the Fast Lane?" The study, underwritten by Accenture Federal Services, reveals that approximately two-thirds of Feds say DevOps will help agencies shift into the cloud fast lane - improving IT collaboration and migration speed. But help is needed, with 66 percent saying that their agency needs to move IT services ...
May. 24, 2015 11:00 PM EDT Reads: 1,589
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
May. 24, 2015 10:00 PM EDT Reads: 5,243
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
May. 24, 2015 09:00 PM EDT Reads: 5,864
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
May. 24, 2015 09:00 PM EDT Reads: 4,683
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of...
May. 24, 2015 09:00 PM EDT Reads: 6,267
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
May. 24, 2015 09:00 PM EDT Reads: 1,381
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of present...
May. 24, 2015 09:00 PM EDT Reads: 4,981
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
May. 24, 2015 08:45 PM EDT Reads: 1,297
Every day we read jaw-dropping stats on the explosion of data. We allocate significant resources to harness and better understand it. We build businesses around it. But we’ve only just begun. For big payoffs in Big Data, CIOs are turning to cognitive computing. Cognitive computing’s ability to securely extract insights, understand natural language, and get smarter each time it’s used is the next, logical step for Big Data.
May. 24, 2015 08:00 PM EDT Reads: 1,814
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of app...
May. 24, 2015 08:00 PM EDT Reads: 4,683
DevOps is the hottest moving target when it comes to software development methodologies. Many people fear that this fast-paced, barrier-breaking movement will leave information security best practices in the dust. Analysts provide recommendations to security professionals using bingo-laden terms like "moving security to the left" or "get a seat at the table." What we need are real-world examples and tactics for security practitioners to be part of DevOps. In his session at DevOps Summit, Andrew...
May. 24, 2015 08:00 PM EDT Reads: 5,339
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
May. 24, 2015 07:00 PM EDT Reads: 4,490
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
May. 24, 2015 07:00 PM EDT Reads: 5,833
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developmen...
May. 24, 2015 06:00 PM EDT Reads: 2,092