News Feed Item

Seceon Simplifies Security Information And Event Management With aiSIEM™

Next-level SIEM Automates Threat Detection and Remediation; Provides Comprehensive Visibility and Continuous Compliance Monitoring and Reporting

WESTFORD, Mass., April 16, 2018 /PRNewswire/ -- Seceon, the only threat detection and management company to visualize, detect, and eliminate cyber threats in real-time, today introduces aiSIEM™, a modern adaptation to security information and event management (SIEM). Seceon's aiSIEM extends traditional SIEM capabilities, providing enterprise and service provider organizations with continuous data analytics for ongoing assessment of security posture and compliance, offering adaptive access, predicting and anticipating threats and responding to verified threats in real-time. Seceon's capabilities were also recognized today by CyberDefense Magazine, who named the company a 2018 Infosec Award winner for Security Company of the Year and Machine Learning and Artificial Intelligence.

Seceon Logo (PRNewsfoto/Seceon)

"Faced with ongoing skill, resource and security infrastructure challenges, today's enterprise struggles to find a threat detection and response platform that can bring a comprehensive view of the organization—spanning many locations, hybrid cloud and third-party partner access—as well as the highly skilled security experts capable of managing them," said Chandra Pandey, Founder and CEO of Seceon. "Developed from the ground up to deliver comprehensive cybersecurity for the digital era, the Seceon aiSIEM platform brings real-time automation and simplicity to the traditional SIEM approach. By collecting, ingesting and analyzing raw logs, flows, traffic and identity across all assets, aiSIEM offers complete visibility, proactive threat detection, immediate containment and elimination of threats with continuous policy enforcement, and compliance monitoring and reporting."    

Simplifying SIEM

While the traditional SIEM product category remains one of the fastest growing market segments in cybersecurity, the adoption of hybrid cloud networks, the growing complexity and number of cybersecurity threat vectors and a lack of cybersecurity expert talent, demand an improved set of capabilities for organizations to complement their existing SIEM investment. Furthermore, the volume of rapidly growing security incidents has become unmanageable for resource-constrained security operations teams, underscoring the need for end-to-end automation of detection and response.

Gartner states that "the evolution of the technology indicates that modern SIEM works with more than just log data and applies more than simple correlation rules for data analysis. Some of the capabilities that go beyond the definition above and usually are incorporated into modern SIEMs are: collect and analyze not just logs but also data from endpoints and the network (similar to network traffic analysis [NTA] and endpoint detection and response [EDR] solutions)…robust threat intelligence (TI) support (incorporating feeds and other sources for correlation and enrichment)…data analytics that goes beyond rules (such as UEBA capabilities)…advanced security operations center (SOC) workflow capabilities (although still limited when compared to dedicated SOAR tools)."1

Unlike traditional SIEM solutions, Seceon aiSIEM goes beyond static log data, simple analysis for correlation of events, and application of network traffic rules to enhance an organization's security posture. Real-time machine learning handles large data volumes in conjunction with contemporary big/fast data frameworks, efficiently enabling adaptation to any environment dynamically upon deployment for deep data analysis. The complexity is substantially reduced by Seceon's dynamic threat models engine and its behavioral analytics engine which combined, eliminate need for writing complex rules. Moreover, when complemented by Seceon's advanced patent-pending correlation engine, powered by artificial intelligence that generates meaningful alerts with improved accuracy from scores of threat indicators, Seceon's aiSIEM surfaces relevant threats in minutes, that would have taken hours or days to detect when previously analyzed by human security professionals. aiSIEM effectively meets critical security requirements for digitally driven business with an automated approach of producing and applying actionable intelligence for threat containment and elimination in near real-time.

According to Gartner, "Now, security experts must apply a new approach: Continuous Adaptive Risk and Trust Assessment (CARTA)-continuous adaptive risk and trust assessment. This to stay competitive with emerging business opportunities. The key is to apply the philosophy across the business from DevOps to external partners."2  

Seceon believes its aiSIEM aligns to the Gartner's CARTA approach to provide four key benefits:

  • Proactive threat detection to reduce Mean-Time-To-Identify (MTTI) threats. aiSIEM proactively detects threats and surfaces them in real-time or near real-time without an agent or alert fatigue. It uses dynamic threat models, machine learning and AI with actionable intelligence combined with proprietary feature engineering for threat detection of known and unknown threats. The aiSIEM solution performs threat detection across the cloud, on-premise, and hybrid environments for MSSPs and Enterprises.
  • Automatic threat remediation to reduce Mean-Time-To-Resolve (MTTR) threats. aiSIEM performs automatic threat containment and elimination in real-time. It also provides clear actionable steps to eliminate the threats that can either be taken automatically by the system or manually by the security expert post-analysis. The auto-remediation can also be triggered as per a specific 'configurable' schedule and can be used for effective risk mitigation in near real-time.
  • Continuous compliance and risk monitoring. aiSIEM offers continuous compliance and scheduled or on-demand reporting for HIPAA, GDPR, PCI-DSS, NIST, FINRA and many other similar regulations by providing long-term data analytics for security operations, investigation support and reporting.
  • Comprehensive visibility. aiSIEM ingests all your raw streaming data (Logs, Packets, Flows, Identities) from many different types of devices and applications in your environment. It then enriches the data extracting meaningful features to provide real-time extensive view of all assets (users, hosts, servers, applications, data access and movement, traffic) that are on premise, cloud or hybrid and their interactions.

Some of the key capabilities of aiSIEM include:

  • Large-scale and robust data collection from cloud and other modern IT data sources,
  • Collection and analysis of logs and raw streaming data (packets, flows, identities) from networks and endpoints,
  • Integrated threat intelligence (TI) feeds for correlation and enrichment; updated daily by 40 NSA, honeypot and industry feeds of known threats,
  • Enhanced data analytics beyond rules,
  • Fast and scalable search over volumes of raw data,
  • Multi-layer detection – Detection of known, as well as, never-before-seen threats at the earliest phase of the chain,
  • Productivity increase – Advanced analytics over multiple stages eliminates false positives – 25 x threat surface reduction,
  • Threat impact analysis – Comprehensive interactive visual interface to drill down threats and effected sources and targets.

Additional Resources
Datasheet: http://www.seceon.com/wp-content/uploads/2018/04/Seceon_aiSIEM_DataSheet.pdf
Follow Seceon online: Twitter | Facebook | LinkedIn

1 Gartner, "SIEM Technology Assessment," Anton Chuvakin, Augusto Barros, 12 October 2017. 
2 Gartner, "The Gartner IT Security Approach for the Digital Age," 12 June 2017.

About Seceon
Taking a new approach to conventional threat detection and management, Seceon helps today's enterprise detect and stop both recognized and never-seen-before threats when they happen, instead of days, weeks or months later. Leveraging intelligent data collection and analysis, Seceon's Open Threat Management platform provides unmatched visibility across the entire network—from users and devices to applications and flows—surfacing only the most relevant threats in real-time and the means necessary to eliminate them immediately. To learn more about Seceon's aiSIEM solution, please visit www.seceon.com or call (978)-923-0040.

Media Contact: Alana Suko, 781-258-5803, [email protected]


Cision View original content with multimedia:http://www.prnewswire.com/news-releases/seceon-simplifies-security-information-and-event-management-with-aisiem-300630344.html


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...