Health data: some questions about profits, privacy and the public interest
January 31, 2014
4 best ways you can use Big Data in your job hunt
February 5, 2014
The Crayon Blog

Top Big Data Apps for Security

Industry Articles | Published February 4, 2014  |   Tejeswini Kashyappan

Companies are continually searching for new ways to get more value out of their data. Several months ago we published an article on how Big Data can be used to improve security, looking primarily at what the company KEYW was doing in this arena.

KEYW is far from the only company looking to capitalize on growing demand for Big Data-driven security solutions. Vendors of all types and sizes are getting into this game.

Here are four examples of what is currently available. Such products are offered by companies ranging from IBM, which has been around since 1911, to Fortscale, which opened its doors a century later.

LogRhythm

The LogRhythm Security Intelligence Platform combines security information and event monitoring (SIEM), log management, file integrity monitoring and machine analytics with host and network forensics in a unified security intelligence platform.

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!

The Crayon Blog

Top Big Data Apps for Security

Industry Articles | Published February 4, 2014  |   Tejeswini Kashyappan

Companies are continually searching for new ways to get more value out of their data. Several months ago we published an article on how Big Data can be used to improve security, looking primarily at what the company KEYW was doing in this arena.

KEYW is far from the only company looking to capitalize on growing demand for Big Data-driven security solutions. Vendors of all types and sizes are getting into this game.

Here are four examples of what is currently available. Such products are offered by companies ranging from IBM, which has been around since 1911, to Fortscale, which opened its doors a century later.

LogRhythm

The LogRhythm Security Intelligence Platform combines security information and event monitoring (SIEM), log management, file integrity monitoring and machine analytics with host and network forensics in a unified security intelligence platform.

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!

The Crayon Blog

Top Big Data Apps for Security

Industry Articles | Published February 4, 2014  |   Tejeswini Kashyappan

Companies are continually searching for new ways to get more value out of their data. Several months ago we published an article on how Big Data can be used to improve security, looking primarily at what the company KEYW was doing in this arena.

KEYW is far from the only company looking to capitalize on growing demand for Big Data-driven security solutions. Vendors of all types and sizes are getting into this game.

Here are four examples of what is currently available. Such products are offered by companies ranging from IBM, which has been around since 1911, to Fortscale, which opened its doors a century later.

LogRhythm

The LogRhythm Security Intelligence Platform combines security information and event monitoring (SIEM), log management, file integrity monitoring and machine analytics with host and network forensics in a unified security intelligence platform.

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!

The Crayon Blog

Top Big Data Apps for Security

Industry Articles | Published February 4, 2014  |   Tejeswini Kashyappan

Companies are continually searching for new ways to get more value out of their data. Several months ago we published an article on how Big Data can be used to improve security, looking primarily at what the company KEYW was doing in this arena.

KEYW is far from the only company looking to capitalize on growing demand for Big Data-driven security solutions. Vendors of all types and sizes are getting into this game.

Here are four examples of what is currently available. Such products are offered by companies ranging from IBM, which has been around since 1911, to Fortscale, which opened its doors a century later.

LogRhythm

The LogRhythm Security Intelligence Platform combines security information and event monitoring (SIEM), log management, file integrity monitoring and machine analytics with host and network forensics in a unified security intelligence platform.

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!