Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
OTTAWA, ON -- (Marketwired) -- 07/15/15 -- Security professionals from financial services companies and their partners can learn how behavioral analytics technology is protecting one firm's high value clients, its asset research and investment plans, and complex algorithms via a recorded webinar featuring CISO Bala Rajagopalan of BlueMountain Capital and Stephan Jou, CTO at Interset.
"Operationalizing Behavioral Analytics: a Customer Story," recorded June 25, is available on demand at https://www.interset.com/info-center/webinars/operationalizing-analytics-customer-story/.
BlueMountain Capital is a global alternatives asset manager with more than 300 employees and $20B in assets. The firm is using a behavior analytics platform from software provider Interset to address insider and outside security threats targeting many types of sensitive financial data, including high value investor data, investment planning and execution data, as well as source code and other intellectual property residing in various data repositories.
"Monitoring and detecting risk activities across IP repositories, seeing how user behavior changes over time or how malware spreads laterally from point to point... These are the security challenges which have historically been very difficult to see and address, but with our implementation of behavior analytics technology, can now be identified, prioritized and responded to in a timely manner," said Rajagoplan.
Rajagoplan chose the Interset platform for its ability to provide unparalleled visibility into risks and threats against data in critical IP repositories such as Perforce, SCCM and Splunk, as well as its powerful Behavioral Analytics Engine tuned to indentify and score anomalies indicating high risk activity and potential compromises.
"Interset's connectors to IP repositories pull log data to show software project access and activities. Interset detects and alerts on anomalous access and data movement, including information such as times and geographies which may indicate employee theft or account takeovers," said Rajagoplan.
Interset's Jou said in addition to BlueMountain Capital, other financial services Interset customers include:
"For financial services firms, Interset has become a very deployable system because these customers typically have a clear idea of the data types they are most concerned with and the source data where related events can be captured in order to quickly employ behavioral analytics to prioritize and focus on risks and threats that matter," said Interset's Jou.
Any company that would like a no cost threat assessment using Interset behavioral analytics can sign up here. This assessment uses 30 days of historic log data from a repository or SIEM tool to evaluate and identify both inside and target outside attacks that are attempting to access and compromise valuable IP.
About Interset
Interset provides a highly intelligent and accurate insider and targeted outsider threat detection solution that unlocks the power of behavioral analytics, machine learning and big data to provide the fastest, most flexible and affordable way for IT teams of all sizes to operationalize a data protection program. Utilizing agentless data collectors, lightweight endpoint sensors, advanced behavioral analytics and an intuitive user interface, Interset provides unparalleled visibility over sensitive data, enabling early attack detection and actionable forensic intelligence with reduced false positives and noise. Interset solutions are deployed to protect critical data across the manufacturing, life sciences, hi-tech, finance, government, aerospace & defense and securities brokerage industries.
For more information, visit https://www.interset.com/ and follow us on twitter @intersetca.
Contact:
Betsy Kosheff
Email Contact
413-232-7057
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs