Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
(Darktrace)
Line 23: Line 23:
 
<youtube>L3200ry4ysw</youtube>
 
<youtube>L3200ry4ysw</youtube>
 
<youtube>R9lkyJL2LlQ</youtube>
 
<youtube>R9lkyJL2LlQ</youtube>
 +
 +
 +
 +
== ExtraHop ==
 +
[http://www.youtube.com/results?search_query=BluVector Youtube search...]
 +
 +
* [http://www.extrahop.com/platform/security/ ExtraHop Reveal]
 +
 +
<youtube>Nt4vsXgqjd8o</youtube>
 +
<youtube>pVl02OhIWBE</youtube>
 +
 +
 +
== BluVector ==
 +
[http://www.youtube.com/results?search_query=BluVector Youtube search...]
 +
 +
* [http://www.bluvector.io/products/cortex/ BluVector Cortex]
 +
 +
<youtube>LqZvvA_RAfE</youtube>
 +
<youtube>MUfuOT0emfs</youtube>
  
  

Revision as of 12:02, 31 July 2018

Youtube search...


ExtraHop

Youtube search...


BluVector

Youtube search...


Darktrace

Youtube search...

Watson

Youtube search...


National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)

YouTube search...

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence