SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
DataAdapt Threat Detect answers real-world questions for investigators
Who is really who? (Identity Resolution)
o Who knows who? (Relationship Resolution, Non-Obvious Network Detections)
o Who does what? (Complex Event Processing, Transactional Analysis, Timeline
Storyboarding Visualization)
DataAdapt Threat Detect filters data sets to eliminate overload and reduce noise
Turn massive, complex data sets into actionable insight in near real time
o Converge the investigation process into a single, cohesive framework of visual
user interfaces
o Correlate and fuse disparate data sources to discover hidden connections in
your structured and unstructured data
DataAdapt Threat Detect expands threat analysis and detection capabilities with
add-on technologies external data sources
Supports industry-leading i2 Analyst Notebook client
o Plug-and-play integrations for social media data feeds, deep and dark web
source data, geospatial awareness, and various other third party tools
Cyber ready – analyze malware, network traffic, phishing attacks, data leaks,
and various botnet or human cyber attacks
DataAdapt Threat Detect tailors the intuitive and comprehensive user interface for
specific user roles
Managers: BI reports, Automated Alerting, Dashboards
Data Managers: ETL, SQL, Data Quality
Investigators and Analysts: Link-Chart, Geospatial, Timeline
DataAdapt Threat Detect expedites the deployment of big data analytics from months
to days
System delivered pre-deployed, pre-integrated, racked-and-stacked; ready to
ingest your data
Remove confusion about sizing and scaling - start small, grow as needed
ViON provides unrivaled time-to-value and scalability
ViON DataAdapt Threat Detect is a multidimensional big data investigative analytics platform
delivered as an appliance and pre-configured with industry-leading intelligence capability.
1
2
3
4
5
DataAdaptThreat Detect: 5 Key Facts
To learn more about DataAdapt A2000, visit our website at
www.vion.com/ThreatDetect
or contact
Judson Graves at judson.graves@vion.com

Mais conteúdo relacionado

Mais procurados

Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataI3E Technologies
 
How to protect sensitive data
How to protect sensitive dataHow to protect sensitive data
How to protect sensitive data*instinctools
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
 
Rrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataRrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataLeMeniz Infotech
 
Future is private intel dev fest
Future is private   intel dev festFuture is private   intel dev fest
Future is private intel dev festgeetachauhan
 
PhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research GuidancePhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research GuidancePhD Services
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock Andris Soroka
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data AdvantageSqrrl
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Application Logging for Forensics
Application Logging for ForensicsApplication Logging for Forensics
Application Logging for ForensicsRaffael Marty
 
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...Kogni
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 
Insights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge GraphsInsights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge GraphsNeo4j
 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big DataRaffael Marty
 
Context Aware Privacy Platform
Context Aware Privacy PlatformContext Aware Privacy Platform
Context Aware Privacy PlatformLykle de Vries
 

Mais procurados (20)

Matrix Mapper
Matrix MapperMatrix Mapper
Matrix Mapper
 
Access data
Access dataAccess data
Access data
 
Rrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational dataRrw—a robust and reversible watermarking technique for relational data
Rrw—a robust and reversible watermarking technique for relational data
 
How to protect sensitive data
How to protect sensitive dataHow to protect sensitive data
How to protect sensitive data
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
Rrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational dataRrw – a robust and reversible watermarking technique for relational data
Rrw – a robust and reversible watermarking technique for relational data
 
Future is private intel dev fest
Future is private   intel dev festFuture is private   intel dev fest
Future is private intel dev fest
 
PhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research GuidancePhD Projects in Information Technology Research Guidance
PhD Projects in Information Technology Research Guidance
 
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
WWW.DSS.LV - Data Protection Basics 2015 - DeviceLock
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
weaver_resume2
weaver_resume2weaver_resume2
weaver_resume2
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Application Logging for Forensics
Application Logging for ForensicsApplication Logging for Forensics
Application Logging for Forensics
 
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...
Kogni - A Data Security Product. Discovers, Secures, & Monitors Sensitive Ent...
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Insights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge GraphsInsights Driven Intelligence through Knowledge Graphs
Insights Driven Intelligence through Knowledge Graphs
 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big Data
 
Context Aware Privacy Platform
Context Aware Privacy PlatformContext Aware Privacy Platform
Context Aware Privacy Platform
 

Semelhante a vion_a2000_5 facts_d2

CySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdf
CySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdfCySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdf
CySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdfRafi843178
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscapeyohansurya2
 
Crits new one_dark-goffin
Crits new one_dark-goffinCrits new one_dark-goffin
Crits new one_dark-goffinZeev Rabinovich
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Linkurious
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkillijtsrd
 
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...IIJSRJournal
 
JIMS Rohini IT Flash Monthly Newsletter - October Issue
JIMS Rohini IT Flash Monthly Newsletter  - October IssueJIMS Rohini IT Flash Monthly Newsletter  - October Issue
JIMS Rohini IT Flash Monthly Newsletter - October IssueJIMS Rohini Sector 5
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...ijtsrd
 
12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDa12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDaChantellPantoja184
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012d_rdgz
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2016
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, GermanyCharith Perera
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsRavi Teja
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Stefaan Van daele
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.Linkurious
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsVenkata Sreeram
 

Semelhante a vion_a2000_5 facts_d2 (20)

CySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdf
CySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdfCySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdf
CySight Predictive AI Baselining - XDR EDR FORENSICS (sld-220628-a-1)_c.pdf
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Crits new one_dark-goffin
Crits new one_dark-goffinCrits new one_dark-goffin
Crits new one_dark-goffin
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)
 
Vulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using WebkillVulnerability Assessment and Penetration Testing using Webkill
Vulnerability Assessment and Penetration Testing using Webkill
 
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
 
JIMS Rohini IT Flash Monthly Newsletter - October Issue
JIMS Rohini IT Flash Monthly Newsletter  - October IssueJIMS Rohini IT Flash Monthly Newsletter  - October Issue
JIMS Rohini IT Flash Monthly Newsletter - October Issue
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
OSINT - Open Source Intelligence
OSINT - Open Source IntelligenceOSINT - Open Source Intelligence
OSINT - Open Source Intelligence
 
12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDa12SNORTNameInstitutionCorseTutorDa
12SNORTNameInstitutionCorseTutorDa
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012DavidRodriguez ISCRAM summerschool 2012
DavidRodriguez ISCRAM summerschool 2012
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Tools for Unstructured Data Analytics
Tools for Unstructured Data AnalyticsTools for Unstructured Data Analytics
Tools for Unstructured Data Analytics
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 

vion_a2000_5 facts_d2

  • 1. DataAdapt Threat Detect answers real-world questions for investigators Who is really who? (Identity Resolution) o Who knows who? (Relationship Resolution, Non-Obvious Network Detections) o Who does what? (Complex Event Processing, Transactional Analysis, Timeline Storyboarding Visualization) DataAdapt Threat Detect filters data sets to eliminate overload and reduce noise Turn massive, complex data sets into actionable insight in near real time o Converge the investigation process into a single, cohesive framework of visual user interfaces o Correlate and fuse disparate data sources to discover hidden connections in your structured and unstructured data DataAdapt Threat Detect expands threat analysis and detection capabilities with add-on technologies external data sources Supports industry-leading i2 Analyst Notebook client o Plug-and-play integrations for social media data feeds, deep and dark web source data, geospatial awareness, and various other third party tools Cyber ready – analyze malware, network traffic, phishing attacks, data leaks, and various botnet or human cyber attacks DataAdapt Threat Detect tailors the intuitive and comprehensive user interface for specific user roles Managers: BI reports, Automated Alerting, Dashboards Data Managers: ETL, SQL, Data Quality Investigators and Analysts: Link-Chart, Geospatial, Timeline DataAdapt Threat Detect expedites the deployment of big data analytics from months to days System delivered pre-deployed, pre-integrated, racked-and-stacked; ready to ingest your data Remove confusion about sizing and scaling - start small, grow as needed ViON provides unrivaled time-to-value and scalability ViON DataAdapt Threat Detect is a multidimensional big data investigative analytics platform delivered as an appliance and pre-configured with industry-leading intelligence capability. 1 2 3 4 5 DataAdaptThreat Detect: 5 Key Facts To learn more about DataAdapt A2000, visit our website at www.vion.com/ThreatDetect or contact Judson Graves at judson.graves@vion.com