Beyond Analysis: Intelligent Security Requires Real-time Actionable Insights

2017-06-15T03:48:32+00:00 June 15th, 2017|

Beyond Analysis: Intelligent Security Requires Real-time Actionable Insights The standard approach to Big Data in cyber security is like the police investigating a crime scene: analyzing the past. Similarly, we see companies are pouring petabytes worth of historical information into data warehouses and lakes, where it waits to be analyzed by an assortment of sophisticated [...]

Real-time Threat Hunting

2017-06-15T04:05:00+00:00 June 15th, 2017|

Cyber Security Real-time Analytics Always Hot Data Webinar On-Demand Customer Success Blog Resources Need for Scale: Cyber Security Grow to meet real-time threat hunting demands while containing costs. Analyze billions of events per second (EPS) continuously. [...]

Black Hat USA 2017 – Real-time Threat Hunting

2017-06-21T19:48:59+00:00 June 8th, 2017|

Supercharge your SIEM with Real-time Threat Hunting Experience the most powerful real-time threat hunting platform live and in action. Meet us at Black Hat USA 2017 Find out why leading companies use Logtrust Logtrust Real-time Threat Hunting [...]

In the “Hot” Seat: Stuck with Cold Data Tiering

2017-06-15T03:31:55+00:00 June 7th, 2017|

In the “Hot” Seat: Stuck with Cold Data Tiering There seems to be no limit to the ingenuity of today’s cyber attacks, which are increasingly capable of finding and exploiting any weakness in your infrastructure. To prevent the next generation of cyber security threats you may need instant access to the totality of your company’s [...]

Modern threats respect no boundaries…and neither should your cyber security

2017-06-15T03:31:38+00:00 May 23rd, 2017|

Modern threats respect no boundaries...and neither should your cyber security   As enterprises ingest more data at higher speeds they naturally encounter more cyber threats. But while the challenge of speed and volume is daunting enough, according to TechTarget’s Dan Sullivan the difficulty is compounded by the fact that today’s attacks are “often dispersed across [...]

When do you need an Event Stream Processing platform?

2017-06-03T20:30:14+00:00 May 23rd, 2017|

When do you need an Event Stream Processing platform? Roy Schulte The opinions expressed in this article are my own, and may not reflect the position of my employer or any other company. Introduction Every big company has hundreds of event streams constantly flowing through its corporate networks. For many business purposes, it [...]

Report: New Logistics Pave Road for Machine Data Analytics

2017-06-03T20:29:58+00:00 May 9th, 2017|

Report: New Logistics Pave Road for Machine Data Analytics Machine data analytics is the process of using big data from a variety of devices to solve complex, real-world challenges. Machine data analytics can aggregate data from smartphones, websites, desktop devices and Internet servers.   How Brands Are Turning to Machine Data Analytics Machine [...]

Data Visualization Is Key To Analyzing Unstructured Data

2017-06-03T20:30:27+00:00 May 3rd, 2017|

Data Visualization Is Key To Analyzing Unstructured Data Data visualization has evolved dramatically in recent years, with organizations utilizing increasingly impressive software to present the vast amount of information they are collecting not so much as basic bars and charts, but as interactive spectacles to be engaged with by the audience, whether it [...]

5 Tenets Of Helping Customers Combat Payment Fraud

2017-05-03T23:54:21+00:00 May 2nd, 2017|

5 Tenets Of Helping Customers Combat Payment Fraud Success has a dark side: More electronic payments bring increased exposure to fraudulent transactions. According to The Nilson Report, losses from global credit card fraud are on track to exceed $31 billion by 2020. This year, 7.2 cents of every $100 will be lost to [...]