July 15, 2014
Experts say that 5% of network traffic is malicious, and Security Chiefs can only see 10% of it, which is too old to be useful.
It’s no secret that cybercrime is on the rise, with the attacks being more complex and targeted than ever before. Enterprises and government agencies have a rich set of security tools installed, yet they operate independently of each other, making it nearly impossible to detect targeted attacks. Adding salt to the wound, traditional tools only allow you to see 10% of your data, with the remaining considered below the waterline and not accessible.
I spoke to a customer recently, and his pain came through loud and clear. He has analytical tools in place, but he has a very limited view of activity over a short period of time with a very small dataset. This limits his ability to correlated any differences in patterns or behaviors across his netflow traffic. His frustration rises because he needs to try to work with multiple tools from different devices in order to do any analysis. The good news is that Platfora can help him do his job.
The Platfora Big Data Analytics platform is a self-service, agile approach that finds patterns by fusing together an immense amount of data from disparate systems and over time. And though these may be too complex or subtle for standard security detection solutions, Platfora doesn’t replace traditional security products. Instead, you are able to analyze large volumes of multi-structured data such as data logs, flows, clickstream, and block and safe lists in a day. With Platfora, security analysts can correlate this data, and score and flag anomalies for further investigation.
The Economist features a 10-page special report on cyber security this week, which includes a piece authored by Ben Werther, Platfora CEO and Founder. You can read it below.