LogTrust Announces $35 Million in Funding from Insight Venture Partners

2017-09-27T13:44:44+00:00 September 27th, 2017|

LogTrust Announces $35 Million in Funding from Insight Venture Partners Cloud Based Big Data Analytics Company to Accelerate Customer Adoption and Expand Market Reach Boston, MA, September 27, 2017 - LogTrust, the fast insight big data analytics company, today announced it has closed a $35 million Series B round of financing led by new [...]

Cloudwick and Logtrust Announce Strategic Partnership

2017-08-24T16:45:19+00:00 August 24th, 2017|

Cloudwick and Logtrust Announce Strategic Partnership to Deliver the World’s First Neural System of Intelligence for Cybersecurity Alliance to Solve Cybersecurity at Scale for Real-Time Analytics, Machine Learning and Artificial Intelligence LAS VEGAS, NV–(Marketwired – Jul 25, 2017) – (Black Hat USA 2017, Booth 1465) — Cloudwick, the developer of CDL, the World’s First Neural Security [...]

Strata Data Conference

2017-09-13T15:08:14+00:00 August 22nd, 2017|

Come visit us at booth #243 at the Strata Data Conference on September 25 - 28, 2017 at the Javits Center in New York and get our smashing giveaway. Book a meeting with our industry experts and learn how our breakthrough Flat-Ultra-Low-Latency (FULLTM) time-series data analytics deliver: Real-Time Big Data Analytics [...]

What does the IoT actually look like, in real-time

2017-07-13T05:36:35+00:00 July 13th, 2017|

  May the Force-directed Graph Be with You!--Visualizing IoT Device Relationships   Most of us intuitively visualize people and social networks with a relationship graph, yet few of us extend the analogy to the IoT space. There is a mass of graphs around “things.” Uber and Lyft are typical examples of Internet of Things that [...]

Real-time IoT Analytics

2017-07-07T19:54:29+00:00 July 7th, 2017|

IoT Analytics Actionable Insights Time to Value IoT Webinar IoT Analytics Platform IoT Resources Gain real-time IoT insights Data analysis for IoT presents some common challenges when using traditional software and architecture to unlock valuable insights in a timely manner. [...]

Will IoT Drown in a Data Lake? It’s Time for the Event Lake

2017-07-06T05:24:31+00:00 July 6th, 2017|

Will IoT Drown in a Data Lake? It’s Time for the Event Lake We see IoT being applied everywhere from wind farms to medical devices to smart home devices. Yet all the myriad use cases have one thing in common--insight into what’s happening on each device depends on the ability to capture all the events, [...]

Using Statistical Pattern Learning to Find the Method in Attackers’ Madness

2017-06-23T22:00:51+00:00 June 23rd, 2017|

Using Statistical Pattern Learning to Find the Method in Attackers’ Madness With attackers getting more sophisticated and diabolical by the day, one of the scariest problems is that some of the most devastating intrusions may not initially even look like attacks at all. Such is often the case with IoT-based attacks, for example, which exploit [...]

Beyond Analysis: Intelligent Security Requires Real-time Actionable Insights

2017-06-15T03:48:32+00:00 June 15th, 2017|

Beyond Analysis: Intelligent Security Requires Real-time Actionable Insights The standard approach to Big Data in cyber security is like the police investigating a crime scene: analyzing the past. Similarly, we see companies are pouring petabytes worth of historical information into data warehouses and lakes, where it waits to be analyzed by an assortment of sophisticated [...]

Real-time Threat Hunting

2017-07-07T19:55:44+00:00 June 15th, 2017|

Cyber Security Real-time Analytics Always Hot Data Webinar On-Demand Customer Success Blog Resources Need for Scale: Cyber Security Grow to meet real-time threat hunting demands while containing costs. Analyze billions of events per second (EPS) continuously. [...]

In the “Hot” Seat: Stuck with Cold Data Tiering

2017-06-15T03:31:55+00:00 June 7th, 2017|

In the “Hot” Seat: Stuck with Cold Data Tiering There seems to be no limit to the ingenuity of today’s cyber attacks, which are increasingly capable of finding and exploiting any weakness in your infrastructure. To prevent the next generation of cyber security threats you may need instant access to the totality of your company’s [...]