Difference between revisions of "Cybersecurity Companies/Products"
m |
|||
(28 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | + | {{#seo: | |
+ | |title=PRIMO.ai | ||
+ | |titlemode=append | ||
+ | |keywords=ChatGPT, artificial, intelligence, machine, learning, GPT-4, GPT-5, NLP, NLG, NLC, NLU, models, data, singularity, moonshot, Sentience, AGI, Emergence, Moonshot, Explainable, TensorFlow, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Hugging Face, OpenAI, Tensorflow, OpenAI, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Meta, LLM, metaverse, assistants, agents, digital twin, IoT, Transhumanism, Immersive Reality, Generative AI, Conversational AI, Perplexity, Bing, You, Bard, Ernie, prompt Engineering LangChain, Video/Image, Vision, End-to-End Speech, Synthesize Speech, Speech Recognition, Stanford, MIT |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools | ||
− | * [[Cybersecurity]] | + | <!-- Google tag (gtag.js) --> |
− | + | <script async src="https://www.googletagmanager.com/gtag/js?id=G-4GCWLBVJ7T"></script> | |
− | + | <script> | |
− | + | window.dataLayer = window.dataLayer || []; | |
− | + | function gtag(){dataLayer.push(arguments);} | |
− | + | gtag('js', new Date()); | |
− | * [[ | + | |
+ | gtag('config', 'G-4GCWLBVJ7T'); | ||
+ | </script> | ||
+ | }} | ||
+ | [https://www.youtube.com/results?search_query=cybersecurity+security+RSA+best+artificial+intelligence Youtube search...] | ||
+ | [https://www.google.com/search?q=cybersecurity+security+artificial+intelligence ...Google search] | ||
+ | |||
+ | * [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]] | ||
+ | * [[Risk, Compliance and Regulation]] ... [[Ethics]] ... [[Privacy]] ... [[Law]] ... [[AI Governance]] ... [[AI Verification and Validation]] | ||
* [[Radial Basis Function Network (RBFN)]] | * [[Radial Basis Function Network (RBFN)]] | ||
+ | * [[Development]] ... [[Notebooks]] ... [[Development#AI Pair Programming Tools|AI Pair Programming]] ... [[Codeless Options, Code Generators, Drag n' Drop|Codeless, Generators, Drag n' Drop]] ... [[Algorithm Administration#AIOps/MLOps|AIOps/MLOps]] ... [[Platforms: AI/Machine Learning as a Service (AIaaS/MLaaS)|AIaaS/MLaaS]] | ||
+ | |||
+ | |||
+ | == Tanium == | ||
+ | [https://www.youtube.com/results?search_query=Tanium Youtube search...] | ||
+ | [https://www.google.com/search?q=Tanium ...Google search] | ||
+ | |||
+ | * [https://www.tanium.com/ Tanium] | ||
+ | * [https://www.forbes.com/sites/briansolomon/2015/04/15/meet-tanium-the-secret-cybersecurity-weapon-of-target-visa-and-amazon/#416ea67162a6 Secret Cybersecurity Weapon Of Target, Visa And Amazon | Brian Solomon - Forbes] | ||
+ | |||
+ | <youtube>Zs5sGrjq3uY</youtube> | ||
== Splunk == | == Splunk == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Splunk+cyber+security Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Splunk+cyber+security ...Google search] |
− | *[ | + | *[https://www.splunk.com/en_us/customers/success-stories/sandia-national-labs.html Leveraging HADES for Advanced Threat Intelligence] |
− | *[ | + | *[https://www.edureka.co/blog/what-is-splunk/ What Is Splunk? A Beginners Guide To Understanding Splunk | edureka! Splunk Tutorial Series] |
− | *[ | + | *[https://www.splunk.com/ Splunk] |
Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions. | Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions. | ||
− | |||
<youtube>FEb8KZoEyzI</youtube> | <youtube>FEb8KZoEyzI</youtube> | ||
<youtube>dcfXwwyRakc</youtube> | <youtube>dcfXwwyRakc</youtube> | ||
Line 26: | Line 47: | ||
== BluVector == | == BluVector == | ||
− | [ | + | [https://www.youtube.com/results?search_query=BluVector+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=BluVector+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.csoonline.com/article/3250681/machine-learning/review-bluvector-enables-machines-to-protect-themselves.html Review: BluVector enables machines to protect themselves | CSO] |
− | * [ | + | * [https://www.gartner.com/reviews/market/intrusion-prevention-systems/compare/BluVector-vs-darktrace Comparing BluVector, Darktrace | Gertner] |
− | * [ | + | * [https://www.gartner.com/reviews/market/intrusion-prevention-systems/compare/BluVector-vs-nsfocus Comparing BluVector, NSFOCUS | Gertner] |
− | * [ | + | * [https://www.bluvector.io/products/cortex/ BluVector Cortex] |
<youtube>LqZvvA_RAfE</youtube> | <youtube>LqZvvA_RAfE</youtube> | ||
Line 38: | Line 59: | ||
== CISCO == | == CISCO == | ||
− | [ | + | [https://www.youtube.com/results?search_query=CISCO+security+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=CISCO+security+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html Cisco poised to become a cybersecurity force | CSO] |
− | * [ | + | * [https://www.cisco.com/c/en/us/products/security/solution-listing.html CISCO] |
<youtube>WFrj3sdcOIU</youtube> | <youtube>WFrj3sdcOIU</youtube> | ||
<youtube>0yKHmsCGjlE</youtube> | <youtube>0yKHmsCGjlE</youtube> | ||
<youtube>Jb8U1BrJlXo</youtube> | <youtube>Jb8U1BrJlXo</youtube> | ||
− | |||
== Bricata == | == Bricata == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Bricata Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Bricata ...Google search] |
− | * [ | + | * [https://www.csoonline.com/article/3263728/network-security/review-bricata-adds-threat-hunting-to-traditional-ips-ids.html Review: Bricata adds threat hunting to traditional IPS/IDS | CSO] |
− | * [ | + | * [https://www.bricata.com/ Bricata] |
<youtube>SjVpJnfZGLE</youtube> | <youtube>SjVpJnfZGLE</youtube> | ||
Line 60: | Line 80: | ||
== Darktrace == | == Darktrace == | ||
− | [ | + | [https://www.youtube.com/results?search_query=Darktrace+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Darktrace+artificial+intelligence ...Google search] |
<youtube>E5StCBRk6qo</youtube> | <youtube>E5StCBRk6qo</youtube> | ||
− | |||
− | |||
<youtube>USHgnyIGAXI</youtube> | <youtube>USHgnyIGAXI</youtube> | ||
+ | |||
+ | == Watson == | ||
+ | [https://www.youtube.com/results?search_query=watson+cybersecurity Youtube search...] | ||
+ | [https://www.google.com/search?q=Watson+cybersecurity ...Google search] | ||
+ | |||
+ | <youtube>VGEz1mKqtaQ</youtube> | ||
+ | <youtube>xG9jazUpEus</youtube> | ||
+ | |||
+ | == Insight Engines == | ||
+ | [https://www.youtube.com/results?search_query=Insight+Engines+artificial+intelligence Youtube search...] | ||
+ | [https://www.google.com/search?q=Insight+Engines+artificial+intelligence ...Google search] | ||
+ | |||
+ | * [https://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] | ||
+ | * [https://insightengines.com/ Insight Engines] | ||
+ | * [[Embedding]] ... [[Fine-tuning]] ... [[Retrieval-Augmented Generation (RAG)|RAG]] ... [[Agents#AI-Powered Search|Search]] ... [[Clustering]] ... [[Recommendation]] ... [[Anomaly Detection]] ... [[Classification]] ... [[Dimensional Reduction]]. [[...find outliers]] | ||
+ | |||
+ | <youtube>Imdeaw2Vo9E</youtube> | ||
+ | |||
+ | == CrowdStrike == | ||
+ | [https://www.youtube.com/results?search_query=CrowdStrike+artificial+intelligence Youtube search...] | ||
+ | [https://www.google.com/search?q=CrowdStrike+artificial+intelligence ...Google search] | ||
+ | |||
+ | * [https://www.crowdstrike.com/ CrowdStrike] | ||
+ | * [https://www.forbes.com/sites/stuartanderson/2018/12/03/crowdstrikes-immigrant-co-founder-fighting-cyber-criminals/#49a75020176c CrowdStrike's Immigrant Cofounder Fighting Cyber Criminals | Stuart Anderson - Forbes] | ||
+ | |||
+ | <youtube>OkvhAUWXbvM</youtube> | ||
== ExtraHop == | == ExtraHop == | ||
− | [ | + | [https://www.youtube.com/results?search_query=ExtraHop+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=ExtraHop+artificial+intelligence ...Google search] |
− | * [ | + | * [https://www.extrahop.com/platform/security/ ExtraHop Reveal] |
− | <youtube> | + | <youtube>2n_Pos47NpY</youtube> |
<youtube>pVl02OhIWBE</youtube> | <youtube>pVl02OhIWBE</youtube> | ||
− | == | + | == Trend Micro == |
− | [ | + | [https://www.youtube.com/results?search_query=Trend+Micro+artificial+intelligence Youtube search...] |
− | [ | + | [https://www.google.com/search?q=Trend+Micro+artificial+intelligence ...Google search] |
+ | |||
+ | * [https://www.trendmicro.com/en_us/business/products/hybrid-cloud/security-data-center-virtualization.html Data Center and Virtualization Security | Trend Micro] | ||
+ | * [https://www.trendmicro.com/en_us/business/products/hybrid-cloud.html Hybrid Cloud Security Solution | Trend Micro] | ||
+ | |||
+ | <youtube>xxvjk4NMRFk</youtube> | ||
+ | <youtube>qOZWDy7Wt0w</youtube> | ||
+ | |||
+ | == ForeScout == | ||
+ | [https://www.youtube.com/results?search_query=ForeScout+artificial+intelligence Youtube search...] | ||
+ | [https://www.google.com/search?q=ForeScout+artificial+intelligence ...Google search] | ||
+ | |||
+ | * [https://www.ForeScout.com ForeScout CounterACT - Enterprise Manager] | ||
+ | * [https://www.esecurityplanet.com/products/forescout-counteract.html ForeScout CounterACT: NAC Product Overview and Insight | Drew Robb - eSecurity Planet] | ||
+ | |||
+ | <youtube>xT8yD7thiPM</youtube> | ||
+ | <youtube>uEmwvLTaJ_g</youtube> | ||
+ | |||
+ | == Vectra == | ||
+ | [https://www.youtube.com/results?search_query=Vectra+Cognito+AI+artificial+intelligence Youtube search...] | ||
+ | [https://www.google.com/search?q=Vectra+Cognito+AI+artificial+intelligence ...Google search] | ||
+ | |||
+ | * [https://www.vectra.ai/industries/federal Vectra Cognito] | ||
+ | |||
+ | Vectra Cognito is an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. | ||
+ | |||
+ | <youtube>WaTIiD5tw8k</youtube> | ||
+ | <youtube>AE0L85nP_ls</youtube> | ||
− | + | == SafeBreach == | |
− | + | [https://www.youtube.com/results?search_query=SafeBreach Youtube search...] | |
− | + | [https://www.google.com/search?q=SafeBreach ...Google search] | |
− | |||
− | + | * [https://www.SafeBreach.com SafeBreach] | |
− | [ | + | * [https://www.scmagazine.com/home/reviews/safebreach-breach-attack-simulation-platform/ SafeBreach Breach & Attack Simulation Platform | Dan Cure] |
− | [ | ||
− | |||
− | |||
− | |||
− | <youtube> | + | <youtube>luLrzG160XI</youtube> |
− |
Revision as of 11:55, 13 September 2023
Youtube search... ...Google search
- Cybersecurity ... OSINT ... Frameworks ... References ... Offense ... NIST ... DHS ... Screening ... Law Enforcement ... Government ... Defense ... Lifecycle Integration ... Products ... Evaluating
- Risk, Compliance and Regulation ... Ethics ... Privacy ... Law ... AI Governance ... AI Verification and Validation
- Radial Basis Function Network (RBFN)
- Development ... Notebooks ... AI Pair Programming ... Codeless, Generators, Drag n' Drop ... AIOps/MLOps ... AIaaS/MLaaS
Contents
Tanium
Youtube search... ...Google search
Splunk
Youtube search... ...Google search
- Leveraging HADES for Advanced Threat Intelligence
- What Is Splunk? A Beginners Guide To Understanding Splunk | edureka! Splunk Tutorial Series
- Splunk
Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions.
BluVector
Youtube search... ...Google search
- Review: BluVector enables machines to protect themselves | CSO
- Comparing BluVector, Darktrace | Gertner
- Comparing BluVector, NSFOCUS | Gertner
- BluVector Cortex
CISCO
Youtube search... ...Google search
Bricata
Youtube search... ...Google search
Darktrace
Youtube search... ...Google search
Watson
Youtube search... ...Google search
Insight Engines
Youtube search... ...Google search
- Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO
- Insight Engines
- Embedding ... Fine-tuning ... RAG ... Search ... Clustering ... Recommendation ... Anomaly Detection ... Classification ... Dimensional Reduction. ...find outliers
CrowdStrike
Youtube search... ...Google search
ExtraHop
Youtube search... ...Google search
Trend Micro
Youtube search... ...Google search
ForeScout
Youtube search... ...Google search
- ForeScout CounterACT - Enterprise Manager
- ForeScout CounterACT: NAC Product Overview and Insight | Drew Robb - eSecurity Planet
Vectra
Youtube search... ...Google search
Vectra Cognito is an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy.
SafeBreach
Youtube search... ...Google search