- The open-source tools that could disrupt the entire IT incident management market
- I tested Wacom's latest drawing tablet, and its new display upgrade made my iPad look outdated
- The top mobile AI features that Apple and Samsung owners actually use
- Accelerate Your Docker Builds Using AWS CodeBuild and Docker Build Cloud | Docker
- Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
Product spotlight on analytics
The development of artificial intelligence (AI) has led to a shift in analytics platforms, helping users sort through data faster than before.
Security magazine showcases analytics platforms focused on monitoring and organizing data from a variety of sources.
Cisco
Monitor Virtual Treats to Protect Assets
Cisco’s platform allows users to detect attacks in real time across the network with high-fidelity alerts enriched with context, including user, device, location, timestamp, and application. Users can validate the efficacy of policies, adopt the right ones based on an environment’s needs, and streamline policy violation investigations. The platform’s analytics allow users to quickly detect unknown malware, insider threats like data exfiltration and policy violations, and other sophisticated attacks. Image courtesy of Cisco
Find out more at cisco.com
Crisis24
Combine Digital and Human Analysis
Crisis24 Horizon is a risk management platform to provide a picture of risk exposure. The platform processes a diverse range of feeds, complemented by a team of human analysts. The platform allows users to view events or risks at a global level, or to focus on specific local alerts such as street corners or specific addresses. The system is supported by global operations centers which offer intelligence from over 180 analysts around the world. Image courtesy of Crisis24
Find out more at crisis24.garda.com
CrowdStrike
Visualize Attack Paths to Improve Response
CrowdStrike’s platform allows users to deploy a single agent for immediate value. Users can gain full visibility and protection across attack paths, boosting response times and stopping modern adversaries. With unified visibility across cloud, endpoints and identities, users can correlate and detect cross-domain attacks to stop adversaries from moving laterally across your environments. Get complete visibility and real-time protection across traditional Active Directory (AD) and cloud identity providers such as Entra ID and Okta, empowered with industry-leading threat intelligence. Image courtesy of CrowdStrike
Find out more at crowdstrike.com
Datadog
Monitor Threats and Enhance Visibility
Cloud SIEM is part of the Datadog Cloud Security Platform, which protects an organization’s production environment by providing threat detection, posture management, workload security, and application security. The Datadog-supported integration set includes key technologies like AWS CloudTrail, Okta, and G Suite, giving users end-to-end security visibility and deep context around possible threats. Image courtesy of Datadog
Find out more at datadoghq.com
Dynatrace
Prioritize Threats Using AI
Dynatrace Security Analytics leverages Davis AI, which combines predictive and causal artificial intelligence (AI) techniques to provide security analysts with the answers and data context they need to prioritize and investigate threats and vulnerabilities. In addition, Security Analytics can create automations and workflows that analysts can use to assess the impact of an attack, find the indicators of compromise (IOCs), or automatically trigger a response. Security analysts can use the platform to defend against emerging cyber threats proactively. Image courtesy of Dynatrace
Find out more at dynatrace.com
Eagle Eye Networks & Pimloc
Automatically Redact Facial Data From Video Files
Pimloc’s integration with Eagle Eye Networks allows customers to leverage enterprise-grade AI capabilities and automatically redact faces, license plates and audio in video files and live streams. Eagle Eye Cloud VMS customers can share anonymized video with third parties for peer review, incidents, training, or public communication. Users can import videos directly from their Eagle Eye Cloud VMS account into Secure Redact for automated redaction. The redacted videos can then be saved back into their Eagle Eye account or downloaded directly if needed. Image courtesy of Eagle Eye Networks and Pimloc
Find out more at www.een.com
Salient Systems
Utilize AI For Facial Recognition
Vaidio AI delivers a suite of people, vehicle, facial and object analytics that work with any camera or video source and integrates into the CompleteView video management system (VMS). Security operators can benefit from real-time alerts and notifications, which are delivered directly into the platform. Investigators can benefit from improved search and can either step through analytic alarm events. The solution is scalable from a handful to thousands of cameras. Image courtesy of Salient Systems
Find out more at salientsys.com