|By Marketwired .||
|August 6, 2014 11:39 AM EDT||
LOS ANGELES, CA and LAS VEGAS, NV -- (Marketwired) -- 08/06/14 -- Securonix LLC, the industry-leading platform for security analytics and intelligence, today announced the general availability of Securonix Security Intelligence Platform 4.6, the company's flagship software platform for enterprise security analytics and intelligence. This new release brings the power of Securonix's purpose built security analytics into a real-time detection and response across an enterprise environment -- network devices, applications, databases, and hosts. The company will demonstrate all of these new features at Black Hat 2014, Aug. 6-7 in Las Vegas, where the Securonix executive team will be joined by company board advisor and former NSA Deputy Director Chris Inglis at Booth 919.
"Securonix customers are rapidly adopting the use of signature-less analytics across their environment to detect and investigate the most advanced security threats. They are now looking for this analytics to be done inline and at the speed of the network. We have re-tooled the Securonix platform with major architecture changes and enhancements allowing us to provide real-time, context-enabled, behavior-based analysis across billions of events per day. This is a huge milestone for Securonix and the security industry," said Tanuj Gulati, Securonix CTO and co-founder.
Securonix 4.6 builds upon the innovation of previous product releases while adding very scalable real-time analytics, visualization, investigation and response capabilities required to detect advanced cyber and insider threats:
- New distributed architecture with multiple Real Time Analyzers and a Big Data Backbone for continuous inline threat detection
- Out of the box threat models for Data Exfiltration, High Privilege Account Monitoring, Insider Threats, Cyber Threats, Fraud, Data Breaches, VIP Snooping and Cloud Security
- Advanced investigation, visualization and response capabilities purpose built to deal with advanced threats
- Updated risk models and scoring around Dynamic Risk, Static Risk and Inherent Risk
"Distribution of data processing, storage and analytics across a distributed architecture provides our customers with the flexibility to move analytics closer to the source without the overhead of expensive hardware. We have scaled each node in the distributed model to analyze large volumes of data while being conscious of the happenings recorded by other nodes in the Securonix cluster," said Anjan Shenoy, Director of Engineering at Securonix.
Revamped with a completely new user interface to make it even more intuitive, the Securonix Security Intelligence Platform continues to provide the industry's leading visual analysis and investigation capabilities for the security analyst.
"Providing a single console for our end users and hiding the complexity associated with cross-node communication at network speed was a very tough problem to solve. We focused our efforts on personalizing views for end users. Our customer advisory team played a valuable role in providing us access to their day to day use of the product," said Harsh Patwardhan, Director of Usability Engineering for Securonix.
For more details on the Securonix platform, see http://www.securonix.com/secureproduct/security-intelligence/
For more information about Securonix at Black Hat, see http://www.securonix.com/company/events/
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com.
Sep. 28, 2016 04:30 AM EDT Reads: 1,674
Sep. 28, 2016 04:30 AM EDT Reads: 1,634
Sep. 28, 2016 04:30 AM EDT Reads: 1,014
Sep. 28, 2016 04:15 AM EDT Reads: 4,586
Sep. 28, 2016 04:00 AM EDT Reads: 439
Sep. 28, 2016 03:30 AM EDT Reads: 1,761
Sep. 28, 2016 03:30 AM EDT Reads: 3,110
Sep. 28, 2016 03:15 AM EDT Reads: 2,978
Sep. 28, 2016 03:00 AM EDT Reads: 1,828
Sep. 28, 2016 03:00 AM EDT Reads: 1,777
Sep. 28, 2016 02:45 AM EDT Reads: 1,884
Sep. 28, 2016 02:15 AM EDT Reads: 1,338
Sep. 28, 2016 02:00 AM EDT Reads: 1,136
Sep. 28, 2016 01:45 AM EDT Reads: 2,791
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Sep. 28, 2016 01:45 AM EDT Reads: 2,891