SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Pat Romanski, Elizabeth White, Yeshim Deniz

News Feed Item

Seceon Simplifies Security Information And Event Management With aiSIEM™

Next-level SIEM Automates Threat Detection and Remediation; Provides Comprehensive Visibility and Continuous Compliance Monitoring and Reporting

WESTFORD, Mass., April 16, 2018 /PRNewswire/ -- Seceon, the only threat detection and management company to visualize, detect, and eliminate cyber threats in real-time, today introduces aiSIEM™, a modern adaptation to security information and event management (SIEM). Seceon's aiSIEM extends traditional SIEM capabilities, providing enterprise and service provider organizations with continuous data analytics for ongoing assessment of security posture and compliance, offering adaptive access, predicting and anticipating threats and responding to verified threats in real-time. Seceon's capabilities were also recognized today by CyberDefense Magazine, who named the company a 2018 Infosec Award winner for Security Company of the Year and Machine Learning and Artificial Intelligence.

Seceon Logo (PRNewsfoto/Seceon)

"Faced with ongoing skill, resource and security infrastructure challenges, today's enterprise struggles to find a threat detection and response platform that can bring a comprehensive view of the organization—spanning many locations, hybrid cloud and third-party partner access—as well as the highly skilled security experts capable of managing them," said Chandra Pandey, Founder and CEO of Seceon. "Developed from the ground up to deliver comprehensive cybersecurity for the digital era, the Seceon aiSIEM platform brings real-time automation and simplicity to the traditional SIEM approach. By collecting, ingesting and analyzing raw logs, flows, traffic and identity across all assets, aiSIEM offers complete visibility, proactive threat detection, immediate containment and elimination of threats with continuous policy enforcement, and compliance monitoring and reporting."    

Simplifying SIEM

While the traditional SIEM product category remains one of the fastest growing market segments in cybersecurity, the adoption of hybrid cloud networks, the growing complexity and number of cybersecurity threat vectors and a lack of cybersecurity expert talent, demand an improved set of capabilities for organizations to complement their existing SIEM investment. Furthermore, the volume of rapidly growing security incidents has become unmanageable for resource-constrained security operations teams, underscoring the need for end-to-end automation of detection and response.

Gartner states that "the evolution of the technology indicates that modern SIEM works with more than just log data and applies more than simple correlation rules for data analysis. Some of the capabilities that go beyond the definition above and usually are incorporated into modern SIEMs are: collect and analyze not just logs but also data from endpoints and the network (similar to network traffic analysis [NTA] and endpoint detection and response [EDR] solutions)…robust threat intelligence (TI) support (incorporating feeds and other sources for correlation and enrichment)…data analytics that goes beyond rules (such as UEBA capabilities)…advanced security operations center (SOC) workflow capabilities (although still limited when compared to dedicated SOAR tools)."1

Unlike traditional SIEM solutions, Seceon aiSIEM goes beyond static log data, simple analysis for correlation of events, and application of network traffic rules to enhance an organization's security posture. Real-time machine learning handles large data volumes in conjunction with contemporary big/fast data frameworks, efficiently enabling adaptation to any environment dynamically upon deployment for deep data analysis. The complexity is substantially reduced by Seceon's dynamic threat models engine and its behavioral analytics engine which combined, eliminate need for writing complex rules. Moreover, when complemented by Seceon's advanced patent-pending correlation engine, powered by artificial intelligence that generates meaningful alerts with improved accuracy from scores of threat indicators, Seceon's aiSIEM surfaces relevant threats in minutes, that would have taken hours or days to detect when previously analyzed by human security professionals. aiSIEM effectively meets critical security requirements for digitally driven business with an automated approach of producing and applying actionable intelligence for threat containment and elimination in near real-time.

According to Gartner, "Now, security experts must apply a new approach: Continuous Adaptive Risk and Trust Assessment (CARTA)-continuous adaptive risk and trust assessment. This to stay competitive with emerging business opportunities. The key is to apply the philosophy across the business from DevOps to external partners."2  

Seceon believes its aiSIEM aligns to the Gartner's CARTA approach to provide four key benefits:

  • Proactive threat detection to reduce Mean-Time-To-Identify (MTTI) threats. aiSIEM proactively detects threats and surfaces them in real-time or near real-time without an agent or alert fatigue. It uses dynamic threat models, machine learning and AI with actionable intelligence combined with proprietary feature engineering for threat detection of known and unknown threats. The aiSIEM solution performs threat detection across the cloud, on-premise, and hybrid environments for MSSPs and Enterprises.
  • Automatic threat remediation to reduce Mean-Time-To-Resolve (MTTR) threats. aiSIEM performs automatic threat containment and elimination in real-time. It also provides clear actionable steps to eliminate the threats that can either be taken automatically by the system or manually by the security expert post-analysis. The auto-remediation can also be triggered as per a specific 'configurable' schedule and can be used for effective risk mitigation in near real-time.
  • Continuous compliance and risk monitoring. aiSIEM offers continuous compliance and scheduled or on-demand reporting for HIPAA, GDPR, PCI-DSS, NIST, FINRA and many other similar regulations by providing long-term data analytics for security operations, investigation support and reporting.
  • Comprehensive visibility. aiSIEM ingests all your raw streaming data (Logs, Packets, Flows, Identities) from many different types of devices and applications in your environment. It then enriches the data extracting meaningful features to provide real-time extensive view of all assets (users, hosts, servers, applications, data access and movement, traffic) that are on premise, cloud or hybrid and their interactions.

Some of the key capabilities of aiSIEM include:

  • Large-scale and robust data collection from cloud and other modern IT data sources,
  • Collection and analysis of logs and raw streaming data (packets, flows, identities) from networks and endpoints,
  • Integrated threat intelligence (TI) feeds for correlation and enrichment; updated daily by 40 NSA, honeypot and industry feeds of known threats,
  • Enhanced data analytics beyond rules,
  • Fast and scalable search over volumes of raw data,
  • Multi-layer detection – Detection of known, as well as, never-before-seen threats at the earliest phase of the chain,
  • Productivity increase – Advanced analytics over multiple stages eliminates false positives – 25 x threat surface reduction,
  • Threat impact analysis – Comprehensive interactive visual interface to drill down threats and effected sources and targets.

Additional Resources
Follow Seceon online: Twitter | Facebook | LinkedIn

1 Gartner, "SIEM Technology Assessment," Anton Chuvakin, Augusto Barros, 12 October 2017. 
2 Gartner, "The Gartner IT Security Approach for the Digital Age," 12 June 2017.

About Seceon
Taking a new approach to conventional threat detection and management, Seceon helps today's enterprise detect and stop both recognized and never-seen-before threats when they happen, instead of days, weeks or months later. Leveraging intelligent data collection and analysis, Seceon's Open Threat Management platform provides unmatched visibility across the entire network—from users and devices to applications and flows—surfacing only the most relevant threats in real-time and the means necessary to eliminate them immediately. To learn more about Seceon's aiSIEM solution, please visit or call (978)-923-0040.

Media Contact: Alana Suko, 781-258-5803, [email protected]


Cision View original content with multimedia:


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy. Bill has a very impressive background which includes ...
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions. New research shows that delivering on multicloud e...
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure...
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
Cloud is the motor for innovation and digital transformation. CIOs will run 25% of total application workloads in the cloud by the end of 2018, based on recent Morgan Stanley report. Having the right enterprise cloud strategy in place, often in a multi cloud environment, also helps companies become a more intelligent business. Companies that master this path have something in common: they create a culture of continuous innovation. In his presentation, Dilipkumar Khandelwal outlined the latest...
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure...
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lifecycle automation with freedom of choice and consumption models. Hybrid cloud applications and operations are controllable by the Nutanix Prism control plane with Calm automation, which can weave together the following: ...
FinTech is a disruptive innovation that denotes the adoption of technologies that have changed how traditional financial services work. While FinTech is now embedded deeply into the financial services ecosystem, the rise of digital age has paved way to FinTech 2.0 - which is rolling out innovative solutions through emerging technologies at a disruptive pace while maintaining the tenets of security and compliances. Blockchain as a technology has started seeing pilot adoption in FinTech around ...