SlideShare a Scribd company logo
Sqrrl : Linked Data Analysis: A Big Data
approach to Cyber Security
“Today, analysts are often found digging through log files, manually jumping from
repository to repository to find and assemble the pieces to the puzzle,” remarks Mark
Terenzoni, CEO, Sqrrl. A security breach leaves all sensitive and intellectual data of
different formats at risk. Terenzoni believes that in several instances, existing cyber
security solutions focus solely on alert-oriented data, which are difficult to prioritize
because they only provide a limited view as to what’s going on. Sqrrl, a Big Data
analytics platform provider, has a unique approach for detecting and investigating
cyber security incidents by employing Linked Data Analysis. This allows
administrators to quickly identify the important assets, relevant actors and events of
an organization, accentuating the natural connections between them and providing
contextual perspective. With this added context, it becomes much easier to monitor
abnormal activity and assess the damage caused due to the breach.
Sqrrl unifies multiple Big Data approaches into a single platform, which can be
employed in use cases such as data breach, resulting from cyber-espionage, insider
misuse and other types of complex attacks. Cambridge, MA based Sqrrl’s Big Data
Analytics allows an organization to detect unusual activity by uncovering hidden
connections in their data. Sqrrl Enterprise, their flagship product, developed using
Linked Data Analysis policy, provides a way to visually investigate these connections.
Sqrrl Enterprise enables its clients to ingest, secure, connect, and analyze massive
amounts of structured and unstructured data. The product features streaming,
encrypting, organizing bulk data with the entities and relationships, and fine-grained
access controls. The solution also includes a web-based dash boarding service helps
navigate through the data and relationships in the system.
Additionally, Sqrrl ensures maximum security through techniques derived from
‘Knowledge Extraction’, and ‘Linked Data Analysis’. Data resulting from Linked
Data Analysis is more useful with enriched contextual information, which includes
additional details on the information itself as well as what it’s related to.
Through its Enterprise approach, the company provides data-centric security to
clients, enabling disparate data sources with various security and compliance
requirements to be consolidated into a shared platform for processing, analytics, and
application development. “We designed and delivered security on day one—not
bolted it on as an afterthought,” admits Terenzoni, CEO.
A Fortune 50 customer, based in the U.S, turned to Sqrrl to resolve an internal setback
in their Security Operations Centre (SOC). Sqrrl, which is built with Big Data
technology, collected all the information needed for storage, processing and analysis
in a unified system. This helped in reducing the time taken for the analyst team to
conduct searches and investigations in support of cyber security review. The team can
now retrieve secure records within minutes instead of weeks or days. The SOC now
publishes self-serviced, on-demand investigations enabled by Sqrrl’s data-centric
security approach, where every field of data in the system is individually protected.
Sqrrl excels in use cases such as advanced data breaches resulting from cyber-
espionage, insider misuse, and other types of hard-to-detect attacks
“Our clients use Sqrrl Enterprise for a variety of real-time Big Data solutions,
including cyber security analytics, healthcare analytics, and intelligence analysis,”
revealed Terenzoni. Sqrrl Enterprises’ Big Data technology enables flexible and
scalable storage of raw data for performing Linked Data Analysis. The company
caters to the needs of analysts through dynamic knowledge extraction, aggregating
and enriching the context available about the entities and relationships. “By giving
users intuitive ways to explore their data and collaborate with their colleagues, Sqrrl
helps to narrow the window between when events occur inside an organization’s
network and being able to take action on them,” concludes Terenzoni, CEO.

More Related Content

What's hot

UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)
Samantha Pierre
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
Ulf Mattsson
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
Tom Kirby
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
Sridhar Karnam
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
ANIL247048
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
gaurav kumar
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Mohit Pandey
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
NextLabs, Inc.
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
Harriet Schneider
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
Ulf Mattsson
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
CloudMask inc.
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
zilberberg
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
LindaWatson19
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
CloudMask inc.
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
rich_webshield
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...
Bryan Beecher
 
P2 Project
P2 ProjectP2 Project
P2 Project
12341234666
 

What's hot (20)

UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)UBA 5.0 Data Sheet (September 2016)
UBA 5.0 Data Sheet (September 2016)
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Logs in Security and Compliance flare
Logs in Security and Compliance flareLogs in Security and Compliance flare
Logs in Security and Compliance flare
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
 
Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...Exploring New Methods for Protecting and Distributing Confidential Research ...
Exploring New Methods for Protecting and Distributing Confidential Research ...
 
P2 Project
P2 ProjectP2 Project
P2 Project
 

Similar to Sqrrl

Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
Mighty Guides, Inc.
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
Paraben Corporation
 
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Prometix Pty Ltd
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
Greg Hanchin
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
David Rubal, CISSP
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
Ulf Mattsson
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
alexguzman510050
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
Pvrtechnologies Nellore
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
David J Rosenthal
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...
TEWMAGAZINE
 
Lookingglass whitepaper
Lookingglass whitepaperLookingglass whitepaper
Lookingglass whitepaper
Daniel Coulbourne
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Happiest Minds Technologies
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
IJNSA Journal
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
Giuliano Tavaroli
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
ijcsa
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
Sqrrl
 

Similar to Sqrrl (20)

Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
 
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
Cybersecurity and the Role of Converged Infrastructure June 2016
Cybersecurity and the Role of Converged  Infrastructure June 2016Cybersecurity and the Role of Converged  Infrastructure June 2016
Cybersecurity and the Role of Converged Infrastructure June 2016
 
Isaca global journal - choosing the most appropriate data security solution ...
Isaca global journal  - choosing the most appropriate data security solution ...Isaca global journal  - choosing the most appropriate data security solution ...
Isaca global journal - choosing the most appropriate data security solution ...
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...Understanding data lineage: Enabling Security Investigations | The Enterprise...
Understanding data lineage: Enabling Security Investigations | The Enterprise...
 
Lookingglass whitepaper
Lookingglass whitepaperLookingglass whitepaper
Lookingglass whitepaper
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios Detecting Unknown Insider Threat Scenarios
Detecting Unknown Insider Threat Scenarios
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 

Sqrrl

  • 1. Sqrrl : Linked Data Analysis: A Big Data approach to Cyber Security “Today, analysts are often found digging through log files, manually jumping from repository to repository to find and assemble the pieces to the puzzle,” remarks Mark Terenzoni, CEO, Sqrrl. A security breach leaves all sensitive and intellectual data of different formats at risk. Terenzoni believes that in several instances, existing cyber security solutions focus solely on alert-oriented data, which are difficult to prioritize because they only provide a limited view as to what’s going on. Sqrrl, a Big Data analytics platform provider, has a unique approach for detecting and investigating cyber security incidents by employing Linked Data Analysis. This allows administrators to quickly identify the important assets, relevant actors and events of an organization, accentuating the natural connections between them and providing contextual perspective. With this added context, it becomes much easier to monitor abnormal activity and assess the damage caused due to the breach. Sqrrl unifies multiple Big Data approaches into a single platform, which can be employed in use cases such as data breach, resulting from cyber-espionage, insider misuse and other types of complex attacks. Cambridge, MA based Sqrrl’s Big Data Analytics allows an organization to detect unusual activity by uncovering hidden connections in their data. Sqrrl Enterprise, their flagship product, developed using Linked Data Analysis policy, provides a way to visually investigate these connections. Sqrrl Enterprise enables its clients to ingest, secure, connect, and analyze massive amounts of structured and unstructured data. The product features streaming, encrypting, organizing bulk data with the entities and relationships, and fine-grained access controls. The solution also includes a web-based dash boarding service helps navigate through the data and relationships in the system. Additionally, Sqrrl ensures maximum security through techniques derived from ‘Knowledge Extraction’, and ‘Linked Data Analysis’. Data resulting from Linked Data Analysis is more useful with enriched contextual information, which includes additional details on the information itself as well as what it’s related to. Through its Enterprise approach, the company provides data-centric security to clients, enabling disparate data sources with various security and compliance requirements to be consolidated into a shared platform for processing, analytics, and application development. “We designed and delivered security on day one—not bolted it on as an afterthought,” admits Terenzoni, CEO. A Fortune 50 customer, based in the U.S, turned to Sqrrl to resolve an internal setback in their Security Operations Centre (SOC). Sqrrl, which is built with Big Data
  • 2. technology, collected all the information needed for storage, processing and analysis in a unified system. This helped in reducing the time taken for the analyst team to conduct searches and investigations in support of cyber security review. The team can now retrieve secure records within minutes instead of weeks or days. The SOC now publishes self-serviced, on-demand investigations enabled by Sqrrl’s data-centric security approach, where every field of data in the system is individually protected. Sqrrl excels in use cases such as advanced data breaches resulting from cyber- espionage, insider misuse, and other types of hard-to-detect attacks “Our clients use Sqrrl Enterprise for a variety of real-time Big Data solutions, including cyber security analytics, healthcare analytics, and intelligence analysis,” revealed Terenzoni. Sqrrl Enterprises’ Big Data technology enables flexible and scalable storage of raw data for performing Linked Data Analysis. The company caters to the needs of analysts through dynamic knowledge extraction, aggregating and enriching the context available about the entities and relationships. “By giving users intuitive ways to explore their data and collaborate with their colleagues, Sqrrl helps to narrow the window between when events occur inside an organization’s network and being able to take action on them,” concludes Terenzoni, CEO.