Difference between revisions of "Cybersecurity Companies/Products"
m (→ForeScout) |
m (Text replacement - "http:" to "https:") |
||
Line 5: | Line 5: | ||
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | ||
}} | }} | ||
− | [ | + | [https://www.youtube.com/results?search_query=cybersecurity+security+RSA+best+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=cybersecurity+security+artificial+intelligence ...Google search] |
* [[Case Studies]] | * [[Case Studies]] | ||
Line 21: | Line 21: | ||
== Chronicle Security == | == Chronicle Security == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Chronicle+Security+Google Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Chronicle+Security+Google ...Google search] |
− | * [ | + | * [https://chronicle.security/ Chronicle Security] |
− | * [ | + | * [https://techcrunch.com/2018/01/24/alphabet-launches-new-cybersecurity-company-chronicle-out-of-its-x-moonshot-factory/ Alphabet Launches New Cybersecurity Company Chronicle Out of Its X Moonshot Factory | Frederic Lardinois] |
<youtube>0pjHgLLnl1U</youtube> | <youtube>0pjHgLLnl1U</youtube> | ||
Line 32: | Line 32: | ||
== Tanium == | == Tanium == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Tanium Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Tanium ...Google search] |
− | * [ | + | * [https://www.tanium.com/ Tanium] |
− | * [ | + | * [https://www.forbes.com/sites/briansolomon/2015/04/15/meet-tanium-the-secret-cybersecurity-weapon-of-target-visa-and-amazon/#416ea67162a6 Secret Cybersecurity Weapon Of Target, Visa And Amazon | Brian Solomon - Forbes] |
<youtube>Zs5sGrjq3uY</youtube> | <youtube>Zs5sGrjq3uY</youtube> | ||
Line 42: | Line 42: | ||
== Splunk == | == Splunk == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Splunk+cyber+security Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Splunk+cyber+security ...Google search] |
− | *[ | + | *[https://www.splunk.com/en_us/customers/success-stories/sandia-national-labs.html Leveraging HADES for Advanced Threat Intelligence] |
− | *[ | + | *[https://www.edureka.co/blog/what-is-splunk/ What Is Splunk? A Beginners Guide To Understanding Splunk | edureka! Splunk Tutorial Series] |
− | *[ | + | *[https://www.splunk.com/ Splunk] |
Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions. | Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions. | ||
Line 56: | Line 56: | ||
== BluVector == | == BluVector == | ||
− | [ | + | [https://www.youtube.com/results?search_query=BluVector+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=BluVector+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.csoonline.com/article/3250681/machine-learning/review-bluvector-enables-machines-to-protect-themselves.html Review: BluVector enables machines to protect themselves | CSO] |
− | * [ | + | * [https://www.gartner.com/reviews/market/intrusion-prevention-systems/compare/BluVector-vs-darktrace Comparing BluVector, Darktrace | Gertner] |
− | * [ | + | * [https://www.gartner.com/reviews/market/intrusion-prevention-systems/compare/BluVector-vs-nsfocus Comparing BluVector, NSFOCUS | Gertner] |
− | * [ | + | * [https://www.bluvector.io/products/cortex/ BluVector Cortex] |
<youtube>LqZvvA_RAfE</youtube> | <youtube>LqZvvA_RAfE</youtube> | ||
Line 68: | Line 68: | ||
== CISCO == | == CISCO == | ||
− | [ | + | [https://www.youtube.com/results?search_query=CISCO+security+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=CISCO+security+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html Cisco poised to become a cybersecurity force | CSO] |
− | * [ | + | * [https://www.cisco.com/c/en/us/products/security/solution-listing.html CISCO] |
<youtube>WFrj3sdcOIU</youtube> | <youtube>WFrj3sdcOIU</youtube> | ||
Line 80: | Line 80: | ||
== Bricata == | == Bricata == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Bricata Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Bricata ...Google search] |
− | * [ | + | * [https://www.csoonline.com/article/3263728/network-security/review-bricata-adds-threat-hunting-to-traditional-ips-ids.html Review: Bricata adds threat hunting to traditional IPS/IDS | CSO] |
− | * [ | + | * [https://www.bricata.com/ Bricata] |
<youtube>SjVpJnfZGLE</youtube> | <youtube>SjVpJnfZGLE</youtube> | ||
Line 90: | Line 90: | ||
== Darktrace == | == Darktrace == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Darktrace+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Darktrace+artificial+intelligence ...Google search] |
<youtube>E5StCBRk6qo</youtube> | <youtube>E5StCBRk6qo</youtube> | ||
Line 99: | Line 99: | ||
== Watson == | == Watson == | ||
− | [ | + | [https://www.youtube.com/results?search_query=watson+cybersecurity Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Watson+cybersecurity ...Google search] |
<youtube>MYZOIdK4o1M</youtube> | <youtube>MYZOIdK4o1M</youtube> | ||
Line 108: | Line 108: | ||
== Insight Engines == | == Insight Engines == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Insight+Engines+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Insight+Engines+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] |
− | * [ | + | * [https://insightengines.com/ Insight Engines] |
* [[AI-Powered Search]] | * [[AI-Powered Search]] | ||
Line 119: | Line 119: | ||
== CrowdStrike == | == CrowdStrike == | ||
− | [ | + | [https://www.youtube.com/results?search_query=CrowdStrike+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=CrowdStrike+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.crowdstrike.com/ CrowdStrike] |
− | * [ | + | * [https://www.forbes.com/sites/stuartanderson/2018/12/03/crowdstrikes-immigrant-co-founder-fighting-cyber-criminals/#49a75020176c CrowdStrike's Immigrant Cofounder Fighting Cyber Criminals | Stuart Anderson - Forbes] |
<youtube>OkvhAUWXbvM</youtube> | <youtube>OkvhAUWXbvM</youtube> | ||
Line 129: | Line 129: | ||
== ExtraHop == | == ExtraHop == | ||
− | [ | + | [https://www.youtube.com/results?search_query=ExtraHop+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=ExtraHop+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.extrahop.com/platform/security/ ExtraHop Reveal] |
<youtube>2n_Pos47NpY</youtube> | <youtube>2n_Pos47NpY</youtube> | ||
Line 138: | Line 138: | ||
== Trend Micro == | == Trend Micro == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Trend+Micro+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Trend+Micro+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.trendmicro.com/en_us/business/products/hybrid-cloud/security-data-center-virtualization.html Data Center and Virtualization Security | Trend Micro] |
− | * [ | + | * [https://www.trendmicro.com/en_us/business/products/hybrid-cloud.html Hybrid Cloud Security Solution | Trend Micro] |
<youtube>xxvjk4NMRFk</youtube> | <youtube>xxvjk4NMRFk</youtube> | ||
Line 148: | Line 148: | ||
== ForeScout == | == ForeScout == | ||
− | [ | + | [https://www.youtube.com/results?search_query=ForeScout+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=ForeScout+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.ForeScout.com ForeScout CounterACT - Enterprise Manager] |
− | * [ | + | * [https://www.esecurityplanet.com/products/forescout-counteract.html ForeScout CounterACT: NAC Product Overview and Insight | Drew Robb - eSecurity Planet] |
<youtube>xT8yD7thiPM</youtube> | <youtube>xT8yD7thiPM</youtube> | ||
Line 158: | Line 158: | ||
== Vectra == | == Vectra == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Vectra+Cognito+AI+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Vectra+Cognito+AI+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.vectra.ai/industries/federal Vectra Cognito] |
Vectra Cognito is an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. | Vectra Cognito is an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. | ||
Line 169: | Line 169: | ||
== SafeBreach == | == SafeBreach == | ||
− | [ | + | [https://www.youtube.com/results?search_query=SafeBreach Youtube search...] |
− | [ | + | [https://www.google.com/search?q=SafeBreach ...Google search] |
− | * [ | + | * [https://www.SafeBreach.com SafeBreach] |
− | * [ | + | * [https://www.scmagazine.com/home/reviews/safebreach-breach-attack-simulation-platform/ SafeBreach Breach & Attack Simulation Platform | Dan Cure] |
<youtube>zSpistEfCM8</youtube> | <youtube>zSpistEfCM8</youtube> | ||
<youtube>luLrzG160XI</youtube> | <youtube>luLrzG160XI</youtube> |
Revision as of 08:11, 28 March 2023
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Radial Basis Function Network (RBFN)
Contents
Chronicle Security
Youtube search... ...Google search
- Chronicle Security
- Alphabet Launches New Cybersecurity Company Chronicle Out of Its X Moonshot Factory | Frederic Lardinois
Tanium
Youtube search... ...Google search
Splunk
Youtube search... ...Google search
- Leveraging HADES for Advanced Threat Intelligence
- What Is Splunk? A Beginners Guide To Understanding Splunk | edureka! Splunk Tutorial Series
- Splunk
Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions.
BluVector
Youtube search... ...Google search
- Review: BluVector enables machines to protect themselves | CSO
- Comparing BluVector, Darktrace | Gertner
- Comparing BluVector, NSFOCUS | Gertner
- BluVector Cortex
CISCO
Youtube search... ...Google search
Bricata
Youtube search... ...Google search
Darktrace
Youtube search... ...Google search
Watson
Youtube search... ...Google search
Insight Engines
Youtube search... ...Google search
- Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO
- Insight Engines
- AI-Powered Search
CrowdStrike
Youtube search... ...Google search
ExtraHop
Youtube search... ...Google search
Trend Micro
Youtube search... ...Google search
ForeScout
Youtube search... ...Google search
- ForeScout CounterACT - Enterprise Manager
- ForeScout CounterACT: NAC Product Overview and Insight | Drew Robb - eSecurity Planet
Vectra
Youtube search... ...Google search
Vectra Cognito is an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy.
SafeBreach
Youtube search... ...Google search