Difference between revisions of "Cybersecurity Companies/Products"
| Line 12: | Line 12: | ||
== Splunk == | == Splunk == | ||
[http://www.youtube.com/results?search_query=Splunk+cyber+security Youtube search...] | [http://www.youtube.com/results?search_query=Splunk+cyber+security Youtube search...] | ||
| + | [http://www.google.com/search?q=Splunk ...Google search] | ||
*[http://www.splunk.com/en_us/customers/success-stories/sandia-national-labs.html Leveraging HADES for Advanced Threat Intelligence] | *[http://www.splunk.com/en_us/customers/success-stories/sandia-national-labs.html Leveraging HADES for Advanced Threat Intelligence] | ||
| Line 26: | Line 27: | ||
== BluVector == | == BluVector == | ||
[http://www.youtube.com/results?search_query=BluVector Youtube search...] | [http://www.youtube.com/results?search_query=BluVector Youtube search...] | ||
| + | [http://www.google.com/search?q=BluVector ...Google search] | ||
* [http://www.csoonline.com/article/3250681/machine-learning/review-bluvector-enables-machines-to-protect-themselves.html Review: BluVector enables machines to protect themselves | CSO] | * [http://www.csoonline.com/article/3250681/machine-learning/review-bluvector-enables-machines-to-protect-themselves.html Review: BluVector enables machines to protect themselves | CSO] | ||
| Line 37: | Line 39: | ||
== CISCO == | == CISCO == | ||
[http://www.youtube.com/results?search_query=CISCO+security Youtube search...] | [http://www.youtube.com/results?search_query=CISCO+security Youtube search...] | ||
| + | [http://www.google.com/search?q=CISCO+security ...Google search] | ||
* [http://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html Cisco poised to become a cybersecurity force | CSO] | * [http://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html Cisco poised to become a cybersecurity force | CSO] | ||
| Line 48: | Line 51: | ||
== Bricata == | == Bricata == | ||
[http://www.youtube.com/results?search_query=Bricata Youtube search...] | [http://www.youtube.com/results?search_query=Bricata Youtube search...] | ||
| + | [http://www.google.com/search?q=Bricata ...Google search] | ||
* [http://www.csoonline.com/article/3263728/network-security/review-bricata-adds-threat-hunting-to-traditional-ips-ids.html Review: Bricata adds threat hunting to traditional IPS/IDS | CSO] | * [http://www.csoonline.com/article/3263728/network-security/review-bricata-adds-threat-hunting-to-traditional-ips-ids.html Review: Bricata adds threat hunting to traditional IPS/IDS | CSO] | ||
| Line 57: | Line 61: | ||
== Darktrace == | == Darktrace == | ||
[http://www.youtube.com/results?search_query=darktrace Youtube search...] | [http://www.youtube.com/results?search_query=darktrace Youtube search...] | ||
| + | [http://www.google.com/search?q=Darktrace ...Google search] | ||
<youtube>E5StCBRk6qo</youtube> | <youtube>E5StCBRk6qo</youtube> | ||
| Line 65: | Line 70: | ||
== ExtraHop == | == ExtraHop == | ||
[http://www.youtube.com/results?search_query=BluVector Youtube search...] | [http://www.youtube.com/results?search_query=BluVector Youtube search...] | ||
| + | [http://www.google.com/search?q=ExtraHop ...Google search] | ||
* [http://www.extrahop.com/platform/security/ ExtraHop Reveal] | * [http://www.extrahop.com/platform/security/ ExtraHop Reveal] | ||
| Line 73: | Line 79: | ||
== Watson == | == Watson == | ||
[http://www.youtube.com/results?search_query=watson+qradar Youtube search...] | [http://www.youtube.com/results?search_query=watson+qradar Youtube search...] | ||
| + | [http://www.google.com/search?q=Watson+cybersecurity ...Google search] | ||
<youtube>MYZOIdK4o1M</youtube> | <youtube>MYZOIdK4o1M</youtube> | ||
| Line 80: | Line 87: | ||
== Insight Engines == | == Insight Engines == | ||
| − | [http://www.youtube.com/results?search_query=Insight+ | + | [http://www.youtube.com/results?search_query=Insight+Engines Youtube search...] |
| + | [http://www.google.com/search?q=Insight+Engines ...Google search] | ||
* [http://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] | * [http://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] | ||
Revision as of 22:29, 3 March 2019
- Cybersecurity
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Government Services
- Capabilities
- Cybersecurity Frameworks, Architectures & Roadmaps
- Radial Basis Function Network (RBFN)
Splunk
Youtube search... ...Google search
- Leveraging HADES for Advanced Threat Intelligence
- What Is Splunk? A Beginners Guide To Understanding Splunk | edureka! Splunk Tutorial Series
- Splunk
Splunk (the product) captures, indexes, and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards, and visualizations. Apply machine learning to your data for actionable insights to make faster, more informed decisions.
BluVector
Youtube search... ...Google search
- Review: BluVector enables machines to protect themselves | CSO
- Comparing BluVector, Darktrace | Gertner
- Comparing BluVector, NSFOCUS | Gertner
- BluVector Cortex
CISCO
Youtube search... ...Google search
Bricata
Youtube search... ...Google search
Darktrace
Youtube search... ...Google search
ExtraHop
Youtube search... ...Google search
Watson
Youtube search... ...Google search
Insight Engines
Youtube search... ...Google search
- Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO
- Insight Engines
- AI-Powered Search