SlideShare a Scribd company logo
SOC SECURITY ANALYTICS
A momentous portion of information security efforts focus on monitoring and
analyzing data about events on networks, servers and other devices. Advances in big
data analytics are now applied to security monitoring to enable both broader and
more in-depth analysis. For leo technosoft’s intelligence driven SOC, big data security
analytics and analysis is an extension of security information and event management
(SIEM), CASB, PIM and related technologies. The quantitative difference in the
volumes and types of data analyzed result in qualitative differences in the types of
information extracted from security devices and applications and hence a resulting
qualitative difference in the possible alerts/alarms.
• Leo TechnoSoft’s Intelligence Driven SOC’s big
data security analytics is designed to collect,
integrate and analyze large volumes of data in
near real time, which requires several additional
capabilities like User Context Correlation, Security
Control Visibilities like IFC, FISMA , ISO and
discovering Patterns between Devices, Identity,
Data and Context together.
• Five key features distinguish big data security
analytics from other information security
domains.
KEY FEATURES :
• Scalability and User Context Correlation
•
• One of the key distinguishing features of Leo TechnoSoft's
Intelligence Driven SOC Security Analytic is scalability. The
platforms have the ability to collect data in real or near real
time. Network traffic is a continual stream of packets that
can be analyzed as fast as they are a captured. The analysis
tool doesn’t depend on a lull in network traffic to catch up
on a backlog of packets to be analyzed.The analysis
provides the ability to correlate events across time and
space, which means the stream of events logged by one
device, such as a Web server, may be highly significant with
respect to events on an end-user device a short time later.
Reporting and visualization: Security
& Compliance
• Another essential function of Leo TechnoSoft's Intelligence
Driven SOC Security Analytic is reporting and support for
analysis.Security professionals have on demand reporting
to support operations and compliances dashboards. They
also have access to dashboards with preconfigured security
indicators to provide high-level overviews of key
performance measures/indicators.Visualization presents
information derived from big data sources in ways that can
be readily and rapidly identified by security analysts. Leo
TechnoSoft's Intelligence Driven SOC Security Analytic uses
visualization techniques to help analysts understand
complex relationships in linked data across a wide range of
entities, such as websites, users and HTTP transactions.
Information context
• Since security events generate so much data, there is a risk
of overwhelming analysts and other infosec professionals
and limiting their ability to discern key events. Leo
TechnoSoft's Intelligence Driven SOC Security Analytic
frames data in the context of users, devices and events.
• Data without this kind of context is far less useful, and can
lead to higher than necessary false positives. Contextual
information improves the quality of behavioral analysis and
anomaly detection. Contextual include somewhat static
information, such as the fact that a particular employee
works in a specific department. It also includes more
productive information, such as typical usage patterns that
can be subject to change over time.

More Related Content

What's hot

Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
AlienVault
 
U nit 4
U nit 4U nit 4
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
Greg Hanchin
 
What is SIEM
What is SIEMWhat is SIEM
What is SIEM
Patten John
 
Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Joseph Iannelli
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
Ahmed Banafa
 
Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016
Amgad Magdy
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
AlienVault
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
AlienVault
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
AlienVault
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
AlienVault
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
Greg Hanchin
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
Virtue Security
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
Ahmed Banafa
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
AlienVault
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
AlienVault
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
SecureData Europe
 

What's hot (20)

Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
 
U nit 4
U nit 4U nit 4
U nit 4
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
What is SIEM
What is SIEMWhat is SIEM
What is SIEM
 
Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015Viewfinity Application Control and Monitoring 2015
Viewfinity Application Control and Monitoring 2015
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
 

Viewers also liked

Scale up!
Scale up!Scale up!
Урок-путешествие «Город Купино - из прошлого в будущее» Победитель
Урок-путешествие «Город Купино - из прошлого в будущее»  ПобедительУрок-путешествие «Город Купино - из прошлого в будущее»  Победитель
Урок-путешествие «Город Купино - из прошлого в будущее» Победитель
DROFA-VENTANA
 
Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...
Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...
Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...
Elektrumlv
 
Incremental Subdivision for Triangle Meshes
Incremental Subdivision for Triangle MeshesIncremental Subdivision for Triangle Meshes
Incremental Subdivision for Triangle Meshes
Michel Alves
 
ISIS PAPYRUS - Comment optimiser la gestion des cas dossiers pour améliorer...
ISIS PAPYRUS   - Comment optimiser la gestion des cas dossiers pour améliorer...ISIS PAPYRUS   - Comment optimiser la gestion des cas dossiers pour améliorer...
ISIS PAPYRUS - Comment optimiser la gestion des cas dossiers pour améliorer...
Documation Gestion de l'information et du document numérique en entreprise
 
Biodiversité et changements climatiques
Biodiversité et changements climatiquesBiodiversité et changements climatiques
Biodiversité et changements climatiques
Jacques Prescott
 
Isis papyrus adaptative case management
Isis papyrus adaptative case managementIsis papyrus adaptative case management
Isis papyrus adaptative case management
VeilleMag
 
Docker in pratice -chenyifei
Docker in pratice -chenyifeiDocker in pratice -chenyifei
Docker in pratice -chenyifeidotCloud
 
Agile in startUps
Agile in startUpsAgile in startUps
Agile in startUps
João Cerdeira
 
UPS Overview November 1, 2017
UPS Overview November 1, 2017UPS Overview November 1, 2017
UPS Overview November 1, 2017
UPS IR
 
Responsive Web Design: Clever Tips and Techniques
Responsive Web Design: Clever Tips and TechniquesResponsive Web Design: Clever Tips and Techniques
Responsive Web Design: Clever Tips and Techniques
Vitaly Friedman
 
2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...
2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...
2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...
Content Marketing Institute
 
Expérience Consommateur : 3 principes que les marques ne peuvent plus ignorer
Expérience Consommateur : 3 principes que les marques ne peuvent plus ignorerExpérience Consommateur : 3 principes que les marques ne peuvent plus ignorer
Expérience Consommateur : 3 principes que les marques ne peuvent plus ignorer
iProspect Canada
 
Central Nervous System 1
Central Nervous System 1Central Nervous System 1
Central Nervous System 1MBBS IMS MSU
 
Seismo struct v6 verification report new
Seismo struct v6 verification report newSeismo struct v6 verification report new
Seismo struct v6 verification report new
zainahmad4200
 
Kā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekas
Kā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekasKā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekas
Kā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekas
Elektrumlv
 

Viewers also liked (16)

Scale up!
Scale up!Scale up!
Scale up!
 
Урок-путешествие «Город Купино - из прошлого в будущее» Победитель
Урок-путешествие «Город Купино - из прошлого в будущее»  ПобедительУрок-путешествие «Город Купино - из прошлого в будущее»  Победитель
Урок-путешествие «Город Купино - из прошлого в будущее» Победитель
 
Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...
Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...
Automātiskā mērierīču nolasīšanas sistēma visiem skaitītājiem dzīvoklī un ēkā...
 
Incremental Subdivision for Triangle Meshes
Incremental Subdivision for Triangle MeshesIncremental Subdivision for Triangle Meshes
Incremental Subdivision for Triangle Meshes
 
ISIS PAPYRUS - Comment optimiser la gestion des cas dossiers pour améliorer...
ISIS PAPYRUS   - Comment optimiser la gestion des cas dossiers pour améliorer...ISIS PAPYRUS   - Comment optimiser la gestion des cas dossiers pour améliorer...
ISIS PAPYRUS - Comment optimiser la gestion des cas dossiers pour améliorer...
 
Biodiversité et changements climatiques
Biodiversité et changements climatiquesBiodiversité et changements climatiques
Biodiversité et changements climatiques
 
Isis papyrus adaptative case management
Isis papyrus adaptative case managementIsis papyrus adaptative case management
Isis papyrus adaptative case management
 
Docker in pratice -chenyifei
Docker in pratice -chenyifeiDocker in pratice -chenyifei
Docker in pratice -chenyifei
 
Agile in startUps
Agile in startUpsAgile in startUps
Agile in startUps
 
UPS Overview November 1, 2017
UPS Overview November 1, 2017UPS Overview November 1, 2017
UPS Overview November 1, 2017
 
Responsive Web Design: Clever Tips and Techniques
Responsive Web Design: Clever Tips and TechniquesResponsive Web Design: Clever Tips and Techniques
Responsive Web Design: Clever Tips and Techniques
 
2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...
2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...
2015 B2B Content Marketing Benchmarks, Budgets and Trends - North America by ...
 
Expérience Consommateur : 3 principes que les marques ne peuvent plus ignorer
Expérience Consommateur : 3 principes que les marques ne peuvent plus ignorerExpérience Consommateur : 3 principes que les marques ne peuvent plus ignorer
Expérience Consommateur : 3 principes que les marques ne peuvent plus ignorer
 
Central Nervous System 1
Central Nervous System 1Central Nervous System 1
Central Nervous System 1
 
Seismo struct v6 verification report new
Seismo struct v6 verification report newSeismo struct v6 verification report new
Seismo struct v6 verification report new
 
Kā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekas
Kā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekasKā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekas
Kā pareizi izvēlēties labus logus. Visbiežāk pieļautās kļūdas un sekas
 

Similar to Soc security-analytics

Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
MIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxMIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptx
Couronne1
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
Thomas Treml
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
EMC
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
IRJET Journal
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
Ajit Wadhawan
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09pladott11
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
Ajit Wadhawan
 
Ijetr042329
Ijetr042329Ijetr042329
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection
Jeff Hunter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
Aelum Consulting
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET Journal
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Happiest Minds Technologies
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
JonathanPritchard12
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
Sujata Raskar
 
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM  & SOAR.pdfMicrosoft Sentinel- a cloud native SIEM  & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Kranthi Aragonda
 

Similar to Soc security-analytics (20)

Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
MIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptxMIT-MON Day4 Context.pptx
MIT-MON Day4 Context.pptx
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM  & SOAR.pdfMicrosoft Sentinel- a cloud native SIEM  & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
 

Recently uploaded

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 

Recently uploaded (20)

A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 

Soc security-analytics

  • 1. SOC SECURITY ANALYTICS A momentous portion of information security efforts focus on monitoring and analyzing data about events on networks, servers and other devices. Advances in big data analytics are now applied to security monitoring to enable both broader and more in-depth analysis. For leo technosoft’s intelligence driven SOC, big data security analytics and analysis is an extension of security information and event management (SIEM), CASB, PIM and related technologies. The quantitative difference in the volumes and types of data analyzed result in qualitative differences in the types of information extracted from security devices and applications and hence a resulting qualitative difference in the possible alerts/alarms.
  • 2. • Leo TechnoSoft’s Intelligence Driven SOC’s big data security analytics is designed to collect, integrate and analyze large volumes of data in near real time, which requires several additional capabilities like User Context Correlation, Security Control Visibilities like IFC, FISMA , ISO and discovering Patterns between Devices, Identity, Data and Context together. • Five key features distinguish big data security analytics from other information security domains.
  • 3. KEY FEATURES : • Scalability and User Context Correlation • • One of the key distinguishing features of Leo TechnoSoft's Intelligence Driven SOC Security Analytic is scalability. The platforms have the ability to collect data in real or near real time. Network traffic is a continual stream of packets that can be analyzed as fast as they are a captured. The analysis tool doesn’t depend on a lull in network traffic to catch up on a backlog of packets to be analyzed.The analysis provides the ability to correlate events across time and space, which means the stream of events logged by one device, such as a Web server, may be highly significant with respect to events on an end-user device a short time later.
  • 4. Reporting and visualization: Security & Compliance • Another essential function of Leo TechnoSoft's Intelligence Driven SOC Security Analytic is reporting and support for analysis.Security professionals have on demand reporting to support operations and compliances dashboards. They also have access to dashboards with preconfigured security indicators to provide high-level overviews of key performance measures/indicators.Visualization presents information derived from big data sources in ways that can be readily and rapidly identified by security analysts. Leo TechnoSoft's Intelligence Driven SOC Security Analytic uses visualization techniques to help analysts understand complex relationships in linked data across a wide range of entities, such as websites, users and HTTP transactions.
  • 5. Information context • Since security events generate so much data, there is a risk of overwhelming analysts and other infosec professionals and limiting their ability to discern key events. Leo TechnoSoft's Intelligence Driven SOC Security Analytic frames data in the context of users, devices and events. • Data without this kind of context is far less useful, and can lead to higher than necessary false positives. Contextual information improves the quality of behavioral analysis and anomaly detection. Contextual include somewhat static information, such as the fact that a particular employee works in a specific department. It also includes more productive information, such as typical usage patterns that can be subject to change over time.