1 any app real- time any user Unknown Threats. Key Features 2 Global Scale Grid ComputingAutomatic Correlation of Any DataDetection of Behavioral Anomalies.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

1 | © 2012 V-Key.com – Proprietary and Confidential Bugatti Veyron Super SportBugatti Veyron Super Sport: 267 mph (429 km/h), 0-60 in 2.4 secs.
15 th International Conference on Design Theory and Methodology 2-6 September 2003, Chicago, Illinois Intelligent Agents in Design Zbigniew Skolicki Tomasz.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Real-time Security Analytics: Automating the Discovery, Understanding, and Action Against Advanced Security Threats Neal Hartsell, Vice President Marketing.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
USER ACTIVITY MONITORING: YOUR MISSING SECURITY VANTAGE POINT Presented by Matt Zanderigo.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
Company Founding Customer Wins Series B Investment Scaling The Business $$$ Silver Tail Systems - Key Milestones.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Mike Goffin Who am I? Mike Goffin Lead DeveloperProject Manager Senior Cyber Security Research Engineer The MITRE Corporation.
John Bean Director, Europe, Middle East & Africa 7 August 2015 CONFIDENTIAL © 2010, Peering Partner's. All rights reserved.
WAC/ISSCI Automated Anomaly Detection Using Time-Variant Normal Profiling Jung-Yeop Kim, Utica College Rex E. Gantenbein, University of Wyoming.
Session 4.2 Creation of national ICT security infrastructure for developing countries Industry-wide approach: Raising awareness for ICT security infrastructure.
© Copyright 2008 STI INNSBRUCK Fiksu José María García.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1 Some Issues about Big Data in Power Grid Gary Quan.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
RiT ’ s Dashboard. An intuitive graphical online management tool with unique personalization capabilities enabling managers to flexibly and proactively.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Your Business Challenges
© 2010 IBM Corporation IBM InfoSphere Streams Enabling a smarter planet Roger Rea InfoSphere Streams Product Manager Sept 15, 2010.
Consumer Empowerment Consumer Empowerment May 15, 2012 Presented by: Alparslan Bayraktar Commissioner Energy Market Regulatory Authority of Turkey (EPDK)
An Overview of Intrusion Detection Using Soft Computing Archana Sapkota Palden Lama CS591 Fall 2009.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
‹#› September 2015 Cloud-CISC Cloud Cyber Incident Information Sharing Center.
Microsoft Research Faculty Summit Liqian Luo Networked Embedded Computing Microsoft Research.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
1 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO x4242 Cloud Network Defense.
Threat Management Service October Crypteia Networks 2 Awards PCCW Global acquired Crypteia Networks in 2014 Crypteia Networks was founded as a Security-as-a-
Girish M. Jashnani Sales Consultant Manage your E-Business Suite more effectively.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
+ Logentries Is a Real-Time Log Analytics Service for Aggregating, Analyzing, and Alerting on Log Data from Microsoft Azure Apps and Systems MICROSOFT.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Why SIEM – Why Security Intelligence??
Warehouse Management and Beyond – A Look at Supply Chain Trends & Innovations.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Presenter: Prof. Dimitris Mourtzis Advanced Manufacturing: Industry 4.0 and Smart Systems.
Enterprise Immune Systems Machine-learning and probability theory for detecting in-progress attacks Dave Palmer, Director of Technology.
Center of Excellence in Cyber Security
Real-time protection for web sites and web apps against ATTACKS
DISA Global Operations
Active Cyber Security, OnDemand
KELA Targeted Cyber Intelligence
Evaluating a Real-time Anomaly-based IDS
Advanced Safety Feature Adaptive Cruise Control
Pradeo Security Systems
Revenue from sales of pharmaceuticals exceeds $1trillion annually Market Size $1trillion $200bn $75bn $80bn Revenue from sales.
Consulting Services for IoT
THE NEXT GENERATION MSSP
How to Operationalize Big Data Security Analytics
Facebook Immune System
A Distribution Network
Creating Subnets – Network Requirements
The Big 6 Research Model Step 3: Location and Access
کتابهای تازه خریداری شده دروس عمومی 1397
Maintaining order and safety in a city is no small task
SkuGal Speed, Excellence, Intelligence Copyright © 2019 SkuGalSkuGal Developed by CodeForStartups.
Presentation transcript:

1 any app real- time any user Unknown Threats

Key Features 2 Global Scale Grid ComputingAutomatic Correlation of Any DataDetection of Behavioral Anomalies in Any App

Acquire: live network, app & 3 rd party data Analyze: correlations & anomalies to find kill chain Automate: defense in-depth & incident response Advanced Persistent Threat Defense 3 AcquireAnalyzeAutomate

A big number 1,461,501,637,330, 902,918,203,684, 832,716,283,019, 655,932,542,976 4

Analysis: Artificial Intelligence at work ClustersCorrelationsClassificationsAnomalies

Flexible: effective for any binary data Incremental: can even discard raw data No Assumptions: real-time data-derived modelling Analysis: Key Features 6

Behavioral anomalies we can find

Thank You – Rob Bird