Difference between revisions of "Cybersecurity Companies/Products"
Line 16: | Line 16: | ||
* [[Cybersecurity Frameworks, Architectures & Roadmaps]] | * [[Cybersecurity Frameworks, Architectures & Roadmaps]] | ||
* [[Radial Basis Function Network (RBFN)]] | * [[Radial Basis Function Network (RBFN)]] | ||
+ | |||
+ | |||
+ | == Chronicle Security == | ||
+ | [http://www.youtube.com/results?search_query=Chronicle+Security+Google Youtube search...] | ||
+ | [http://www.google.com/search?q=Chronicle+Security+Google ...Google search] | ||
+ | |||
+ | * [http://chronicle.security/ Chronicle Security] | ||
+ | |||
+ | <youtube>2n_Pos47NpY</youtube> | ||
+ | <youtube>6MYF6Zo6i6A</youtube> | ||
+ | |||
== Tanium == | == Tanium == | ||
Line 29: | Line 40: | ||
== Splunk == | == Splunk == | ||
[http://www.youtube.com/results?search_query=Splunk+cyber+security Youtube search...] | [http://www.youtube.com/results?search_query=Splunk+cyber+security Youtube search...] | ||
− | [http://www.google.com/search?q=Splunk ...Google search] | + | [http://www.google.com/search?q=Splunk+cyber+security ...Google search] |
*[http://www.splunk.com/en_us/customers/success-stories/sandia-national-labs.html Leveraging HADES for Advanced Threat Intelligence] | *[http://www.splunk.com/en_us/customers/success-stories/sandia-national-labs.html Leveraging HADES for Advanced Threat Intelligence] | ||
Line 42: | Line 53: | ||
== BluVector == | == BluVector == | ||
− | [http://www.youtube.com/results?search_query=BluVector Youtube search...] | + | [http://www.youtube.com/results?search_query=BluVector+artificial+intelligence Youtube search...] |
− | [http://www.google.com/search?q=BluVector ...Google search] | + | [http://www.google.com/search?q=BluVector+artificial+intelligence ...Google search] |
* [http://www.csoonline.com/article/3250681/machine-learning/review-bluvector-enables-machines-to-protect-themselves.html Review: BluVector enables machines to protect themselves | CSO] | * [http://www.csoonline.com/article/3250681/machine-learning/review-bluvector-enables-machines-to-protect-themselves.html Review: BluVector enables machines to protect themselves | CSO] | ||
Line 54: | Line 65: | ||
== CISCO == | == CISCO == | ||
− | [http://www.youtube.com/results?search_query=CISCO+security Youtube search...] | + | [http://www.youtube.com/results?search_query=CISCO+security+artificial+intelligence Youtube search...] |
− | [http://www.google.com/search?q=CISCO+security ...Google search] | + | [http://www.google.com/search?q=CISCO+security+artificial+intelligence ...Google search] |
* [http://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html Cisco poised to become a cybersecurity force | CSO] | * [http://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html Cisco poised to become a cybersecurity force | CSO] | ||
Line 76: | Line 87: | ||
== Darktrace == | == Darktrace == | ||
− | [http://www.youtube.com/results?search_query= | + | [http://www.youtube.com/results?search_query=Darktrace+artificial+intelligence Youtube search...] |
− | [http://www.google.com/search?q=Darktrace ...Google search] | + | [http://www.google.com/search?q=Darktrace+artificial+intelligence ...Google search] |
<youtube>E5StCBRk6qo</youtube> | <youtube>E5StCBRk6qo</youtube> | ||
Line 85: | Line 96: | ||
== Watson == | == Watson == | ||
− | [http://www.youtube.com/results?search_query=watson+ | + | [http://www.youtube.com/results?search_query=watson+cybersecurity Youtube search...] |
[http://www.google.com/search?q=Watson+cybersecurity ...Google search] | [http://www.google.com/search?q=Watson+cybersecurity ...Google search] | ||
Line 94: | Line 105: | ||
== Insight Engines == | == Insight Engines == | ||
− | [http://www.youtube.com/results?search_query=Insight+Engines Youtube search...] | + | [http://www.youtube.com/results?search_query=Insight+Engines+artificial+intelligence Youtube search...] |
− | [http://www.google.com/search?q=Insight+Engines ...Google search] | + | [http://www.google.com/search?q=Insight+Engines+artificial+intelligence ...Google search] |
* [http://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] | * [http://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] | ||
Line 105: | Line 116: | ||
== CrowdStrike == | == CrowdStrike == | ||
− | [http://www.youtube.com/results?search_query=CrowdStrike Youtube search...] | + | [http://www.youtube.com/results?search_query=CrowdStrike+artificial+intelligence Youtube search...] |
− | [http://www.google.com/search?q=CrowdStrike ...Google search] | + | [http://www.google.com/search?q=CrowdStrike+artificial+intelligence ...Google search] |
* [http://www.crowdstrike.com/ CrowdStrike] | * [http://www.crowdstrike.com/ CrowdStrike] | ||
Line 115: | Line 126: | ||
== ExtraHop == | == ExtraHop == | ||
− | [http://www.youtube.com/results?search_query= | + | [http://www.youtube.com/results?search_query=ExtraHop+artificial+intelligence Youtube search...] |
− | [http://www.google.com/search?q=ExtraHop ...Google search] | + | [http://www.google.com/search?q=ExtraHop+artificial+intelligence ...Google search] |
* [http://www.extrahop.com/platform/security/ ExtraHop Reveal] | * [http://www.extrahop.com/platform/security/ ExtraHop Reveal] | ||
+ | |||
+ | <youtube>2n_Pos47NpY</youtube> | ||
+ | <youtube>pVl02OhIWBE</youtube> | ||
+ | |||
+ | == Trend Micro == | ||
+ | [http://www.youtube.com/results?search_query=Trend+Micro+artificial+intelligence Youtube search...] | ||
+ | [http://www.google.com/search?q=Trend+Micro+artificial+intelligence ...Google search] | ||
+ | |||
+ | * [http://www.TrendMicro.com Trend Micro] | ||
+ | |||
+ | <youtube>2n_Pos47NpY</youtube> | ||
+ | <youtube>pVl02OhIWBE</youtube> | ||
+ | |||
+ | == ForeScout == | ||
+ | [http://www.youtube.com/results?search_query=ForeScout+artificial+intelligence Youtube search...] | ||
+ | [http://www.google.com/search?q=ForeScout+artificial+intelligence ...Google search] | ||
+ | |||
+ | * [http://www.ForeScout.com ForeScout] | ||
+ | |||
+ | <youtube>2n_Pos47NpY</youtube> | ||
+ | <youtube>pVl02OhIWBE</youtube> | ||
+ | |||
+ | == SafeBreach == | ||
+ | [http://www.youtube.com/results?search_query=SafeBreach Youtube search...] | ||
+ | [http://www.google.com/search?q=SafeBreach ...Google search] | ||
+ | |||
+ | * [http://www.SafeBreach.com SafeBreach] | ||
<youtube>2n_Pos47NpY</youtube> | <youtube>2n_Pos47NpY</youtube> | ||
<youtube>pVl02OhIWBE</youtube> | <youtube>pVl02OhIWBE</youtube> |
Revision as of 23:13, 3 March 2019
Youtube search... ...Google search
- Cybersecurity
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Government Services
- Capabilities
- Cybersecurity Frameworks, Architectures & Roadmaps
- Radial Basis Function Network (RBFN)
Contents
Chronicle Security
Youtube search... ...Google search
Tanium
Youtube search... ...Google search
Splunk
Youtube search... ...Google search
- Leveraging HADES for Advanced Threat Intelligence
- What Is Splunk? A Beginners Guide To Understanding Splunk | edureka! Splunk Tutorial Series
- Splunk
Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions.
BluVector
Youtube search... ...Google search
- Review: BluVector enables machines to protect themselves | CSO
- Comparing BluVector, Darktrace | Gertner
- Comparing BluVector, NSFOCUS | Gertner
- BluVector Cortex
CISCO
Youtube search... ...Google search
Bricata
Youtube search... ...Google search
Darktrace
Youtube search... ...Google search
Watson
Youtube search... ...Google search
Insight Engines
Youtube search... ...Google search
- Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO
- Insight Engines
- AI-Powered Search
CrowdStrike
Youtube search... ...Google search
ExtraHop
Youtube search... ...Google search
Trend Micro
Youtube search... ...Google search
ForeScout
Youtube search... ...Google search
SafeBreach
Youtube search... ...Google search