Click here to close now.




















Welcome!

News Feed Item

Securonix Releases Industry's First Enterprise Class Real-Time Security Analytics Platform at Black Hat 2014

New Release Delivers Real-Time Signature-Less Security Analytics at Scale Across Network Devices, Applications, Databases, User Activities and Hosts for Advanced Threat Detection Against Insiders and Cyber Security Attacks

LOS ANGELES, CA and LAS VEGAS, NV -- (Marketwired) -- 08/06/14 -- Securonix LLC, the industry-leading platform for security analytics and intelligence, today announced the general availability of Securonix Security Intelligence Platform 4.6, the company's flagship software platform for enterprise security analytics and intelligence. This new release brings the power of Securonix's purpose built security analytics into a real-time detection and response across an enterprise environment -- network devices, applications, databases, and hosts. The company will demonstrate all of these new features at Black Hat 2014, Aug. 6-7 in Las Vegas, where the Securonix executive team will be joined by company board advisor and former NSA Deputy Director Chris Inglis at Booth 919.

"Securonix customers are rapidly adopting the use of signature-less analytics across their environment to detect and investigate the most advanced security threats. They are now looking for this analytics to be done inline and at the speed of the network. We have re-tooled the Securonix platform with major architecture changes and enhancements allowing us to provide real-time, context-enabled, behavior-based analysis across billions of events per day. This is a huge milestone for Securonix and the security industry," said Tanuj Gulati, Securonix CTO and co-founder.

Securonix 4.6 builds upon the innovation of previous product releases while adding very scalable real-time analytics, visualization, investigation and response capabilities required to detect advanced cyber and insider threats:

  • New distributed architecture with multiple Real Time Analyzers and a Big Data Backbone for continuous inline threat detection
  • Out of the box threat models for Data Exfiltration, High Privilege Account Monitoring, Insider Threats, Cyber Threats, Fraud, Data Breaches, VIP Snooping and Cloud Security
  • Advanced investigation, visualization and response capabilities purpose built to deal with advanced threats
  • Updated risk models and scoring around Dynamic Risk, Static Risk and Inherent Risk

"Distribution of data processing, storage and analytics across a distributed architecture provides our customers with the flexibility to move analytics closer to the source without the overhead of expensive hardware. We have scaled each node in the distributed model to analyze large volumes of data while being conscious of the happenings recorded by other nodes in the Securonix cluster," said Anjan Shenoy, Director of Engineering at Securonix.

Revamped with a completely new user interface to make it even more intuitive, the Securonix Security Intelligence Platform continues to provide the industry's leading visual analysis and investigation capabilities for the security analyst.

"Providing a single console for our end users and hiding the complexity associated with cross-node communication at network speed was a very tough problem to solve. We focused our efforts on personalizing views for end users. Our customer advisory team played a valuable role in providing us access to their day to day use of the product," said Harsh Patwardhan, Director of Usability Engineering for Securonix.

For more details on the Securonix platform, see http://www.securonix.com/secureproduct/security-intelligence/

For more information about Securonix at Black Hat, see http://www.securonix.com/company/events/

About Securonix
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
Mobile testing is getting harder: more devices, multiple operating systems, higher quality expectations and shorter development cycles. In his session at DevOps Summit, Tom Chavez, Senior Evangelist at SOASTA, will discuss the seven steps to improving your mobile testing process. Tom Chavez, with 20+ years of experience as a product manager in software development tools, works in product management at SOASTA, the leader in performance analytics. He has worked across the Silicon Valley at indu...
Contrary to mainstream media attention, the multiple possibilities of how consumer IoT will transform our everyday lives aren’t the only angle of this headline-gaining trend. There’s a huge opportunity for “industrial IoT” and “Smart Cities” to impact the world in the same capacity – especially during critical situations. For example, a community water dam that needs to release water can leverage embedded critical communications logic to alert the appropriate individuals, on the right device, as...
Even though you are running an agile development process, that doesn’t necessarily mean that your performance testing is being conducted in a truly agile way. Saving performance testing for a “final sprint” before release still treats it like a waterfall development step, with all the cost and risk that comes with that. In this post, we will show you how to make load testing happen early and often by putting SLAs on the agile task board.
Manufacturing connected IoT versions of traditional products requires more than multiple deep technology skills. It also requires a shift in mindset, to realize that connected, sensor-enabled “things” act more like services than what we usually think of as products. In his session at @ThingsExpo, David Friedman, CEO and co-founder of Ayla Networks, will discuss how when sensors start generating detailed real-world data about products and how they’re being used, smart manufacturers can use the ...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the ...
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Moving an existing on-premise infrastructure into the cloud can be a complex and daunting proposition. It is critical to understand the benefits as well as the challenges associated with either a full or hybrid approach. In his session at 17th Cloud Expo, Richard Weiss, Principal Consultant at Pythian, will present a roadmap that can be leveraged by any organization to plan, analyze, evaluate and execute on a cloud migration solution. He will review the five major cloud transformation phases a...
While many app developers are comfortable building apps for the smartphone, there is a whole new world out there. In his session at @ThingsExpo, Narayan Sainaney, Co-founder and CTO of Mojio, will discuss how the business case for connected car apps is growing and, with open platform companies having already done the heavy lifting, there really is no barrier to entry.
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Trel...
Puppet Labs is pleased to share the findings from our 2015 State of DevOps Survey. We have deepened our understanding of how DevOps enables IT performance and organizational performance, based on responses from more than 20,000 technical professionals we’ve surveyed over the past four years. The 2015 State of DevOps Report reveals high-performing IT organizations deploy 30x more frequently with 200x shorter lead times. They have 60x fewer failures and recover 168x faster
The 3rd International WebRTC Summit, to be held Nov. 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 15th International Cloud Expo, 6th International Big Data Expo, 3rd International DevOps Summit and 2nd Internet of @ThingsExpo. WebRTC (Web-based Real-Time Com...