Search

Page 4 of 472 results

Video

Analyst Chat #14: The Alphabet Soup of Security Analytics

by Matthias Reinwarth

... we used to call real-time security intelligence platforms, more intelligent indeed, and real time. So they were fast ... data, but to react to incoming security events in real time apply some smart correlation. And ... of rules, but the beauty of our real time security intelligence platforms that are TSI, or it's something ... that's called now, FIP security intelligence platform in that they do not rely ... . No, your sock should be able to consume real-time security data from the cloud services ...

Executive View

Darktrace Enterprise Immune System

by Alexei Balaganski

... security data. Others concentrate on various aspects of forensic research and threat intelligence. And ... although these products provide an impressive increase of security expert ... and neutralize various cyber-threats in real time, across the whole corporate infrastructure ... , the Darktrace Threat Visualizer. It provides a real-time view of the network activity across ... be indispensable. Related Research Advisory Note: Real-Time Security Intelligence – 71033 Advisory Note: Firewalls Are ...

Report

Digital Risk and Security Awareness Survey - 71252

by Martin Kuppinger

... SOC [16.8%] Mobile Security Solutions [13.7%] Real-time threat information as managed service [10.2%] Real-time Security Intelligence as managed service [6.1%] When ... , 111.1% relative] Real-time Security Intelligence as managed service [up by 10.7% absolute, 175% relative] Real-time Threat Information as managed ... react on attacks.  Invest in Real-time Security Intelligence: Analyze the emerging field of Real-Time Security Intelligence solutions and plan ...

Report

Executive View: AlienVault Unified Security Management (USM) Platform - 72520

by Mike Small

... Documents Advisory Note: Real Time Security Intelligence - 71033 Blog: Real-time Security Intelligence – more than just ... security intelligence in time to avert loss or damage. This has led to the emergence of a new technology, Real Time Security Intelligence ... a Real Time Security Intelligence system, and these are described in detail in KuppingerCole Advisory Note: Real Time Security Intelligence – ... of the most important features of Real Time Security Intelligence is the availability of supporting services. ...

Report

Executive View: IBM Security QRadar® - 70980

by Mike Small

... Research Documents Advisory Note: Real Time Security Intelligence - 71033 Blog: Real-time Security Intelligence – more than just “next ... QRadar® Security Intelligence Platform IBM® QRadar® Security Intelligence Platform forms the core IBM’s Real Time Security Intelligence offering ... of a Real Time Security Intelligence system, and these are described in detail in KuppingerCole Advisory Note: Real Time Security Intelligence – 71033 ...

Report

Advisory Note: Information Security Predictions and Recommendations 2015 and beyond - 71045

by Martin Kuppinger

... to the sophisticated state sponsored cyberattacks. Real-Time Security Intelligence (RTSI) based on advanced analytics is our ... and infrastructure for patch management, security analysis, real-time security intelligence, access monitoring and breach ... as the network and security perimeter undergo significant re-design. Real-time Security Intelligence (RTSI), a mix of services ... , encryption, real-time access control and other functions of the internal network security that ...

Blog

Microsoft Security Announcements

by Alexei Balaganski

... components, such as real-time predictive intelligence, correlating security data with threat intelligence data and, last ... 365, and by leveraging the threat intelligence collected from the world’s largest ... into the vast amount of threat intelligence collected from their Azure Active ... applications working with Azure AD. Besides real-time detection, customers will be able to get ... we have here is a classic example of a specialized Real Time Security Intelligence solution! Other announced additions to Microsoft ...

Combined Session

Best Practices for Lean, Efficient and Focused Information Security Projects • Identity and Security Intelligence

by Dr. Horst Walther, Kim Cameron, Robert Griffin, Edwin van der Wal

... discusses the role of identity management in security intelligence, including the kinds of information that ... that the resulting security intelligence can be applied in making effective security decisions. Most things ... not on analyzing real-time activities Most things we do for example in SIEM (Security Information and ... DLP, SIEM, Firewalls thus is a must – security intelligence without taking identity into account ... Intelligence technologies on identity-related log data (beyond reports) while other include real-time ...

Report

Executive View: ERPScan Security Monitoring Suite for SAP - 71262

by Matthias Reinwarth

... considered when it comes to SAP security is the business logic security, i.e. the identification of Segregation ... the three areas of SAP security: ● Business logic security: SoD module provides in-depth ... of Duties conflicts. ● Application platform security: The vulnerability management module allows ... scan projects can be provided to existing Real-time Security Intelligence (RTSI), SIEM systems, to IT GRC or ... 71262 Page 5 of 6 The Future of Information Security – Today KuppingerCole supports IT professionals with ...

Market Compass

Global IaaS Providers Tenant Security Controls

by Mike Small

... that allows compliance to be monitored in near real time. Security Posture - Within organizations the GRC ... and develop applications using Artificial Intelligence / Machine Learning cloud service vendors ... action with near-real-time, contextual visibility into the tenant's security posture. These ... , such as machine learning and artificial intelligence, data lakes and analytics, and ... range of development services including Artificial Intelligence / Machine Learning, and SaaS services ...