Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Small Business

    ThetaPoint, Securonix Partner on Security Solutions

    By
    NATHAN EDDY
    -
    September 21, 2016
    Share
    Facebook
    Twitter
    Linkedin
      securonix and security

      User and entity behavior analytics for information security specialist Securonix announced a partnership with ThetaPoint, a provider of strategic consulting and managed security services.

      Together, the companies plan to offer security solutions that predict, prevent and detect cyber-threats to enterprise security.

      ThetaPoint helps customers plan, build and run security information and event management (SIEM) and log management platforms and works with technology providers to align capabilities to customers’ needs.

      Its platform combines technical expertise with an ability to solve business challenges for customers in the commercial and public sector, according to the company.

      “ThetaPoint is an expert in SIEM, from implementation to full operations and administration. They partner with Fortune 500 commercial entities and large government agencies,” Paul Bihuniak, chief operating officer for ThetaPoint, told eWEEK. “Their clients are keenly aware of today’s threat landscape and have asked them to help identify areas of exposure or weakness in their current SIEM infrastructure to help them monitor this risk.”

      To deliver more content and value to their security operations team, ThetaPoint and Securonix plan to deliver advanced use cases for customers to mitigate the security risk posed by users both internal and external to the organization, he said.

      “The No. 1 stumbling block organizations face is hiring and retaining the talent required to effectively drive a security strategy,” Bihuniak said. “There is a massive skills shortage in IT security and, as such, organizations are constantly fighting an uphill battle to be able to rapidly and efficiently identify, respond and protect their entities against advanced threats.”

      Assuming an organization has the talent it needs to effectively drive a security strategy, he said, predictable and repeatable business processes are the next big stumbling block in executing that strategy.

      “Without proper processes, efficiencies and economies of scale cannot be derived and organizations will receive minimum value from the tools and technologies that they have invested in,” he noted.

      Securonix applies analytical capabilities to existing security management tools to extract actionable security intelligence from the data generated by SIEMs, security logs, non-traditional data sources such as HR information, industry-specific applications and additional data sources.

      Its unsupervised machine-learning engine continuously analyzes volumes of data to establish baselines of normal behavior and flags high-risk behavior outliers.

      Bihuniak noted there are two very important reasons to consider security analytics as a way to mitigate risk to an organization.

      “Organizations have grown via mergers and acquisitions and, as such, have a variety of disparate systems for identity management, and correlating across those systems for access management is challenging, at best, and impossible, at worst,” he said.

      Second, businesses continue to collect volumes of logs and events from their systems, with little to no value being derived from their efforts.

      “Helping organizations mine that data to uncover outliers is critical to mitigate the risk of advanced threats to an organization,” he said.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×