Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview

IKANOW Information Security Analytics helps adjust the levers of your enterprise to cohesively align strategic, tactical, and operational functions. Information Security Analytics first simplifies the data ingestion process by giving your analyst team tools for ingestion and curation without the need for customized development. By using this single sheet of sterilized data, Information Security intel and attack surface information can then be fused, applying filters or removing unnecessary data points. 

The alignment of the strategic, tactical, and operational facets of your organization is achieved by the Information Security Analytics platform through a tight integration with organizational roles.  Role-based access to cascading scorecards enables the right individuals to have access to critical data and visualizations when needed, driving changes to keep overall security posture aligned.

Philosophy

The effects of disrupting competitive advantage a la cyber attacks has had catastrophic effect on the reputation of enterprises, thereby leaving some permanently damaged. Staying ahead of these risks is front-of-mind of management teams and Board’s alike, as they seek a real-time picture of the Information Security landscape. Attacks, although technical in nature, have a massive affect on a brand and the public’s perception, resulting in direct impact to the bottom line.

Solution: Responding to and anticipating cyber Information Securitys is a highly surgical process and requires a specialized set of tools, infrastructure and support. IKANOW’s revolutionary offering helps security stakeholders’ structure, perform customized analysis and achieve decision automation so security strategies can be executed with ease.

 

Gliffy
size650
namealigning functions and roles

Roles

Organizational functions are mapped to user roles as follows:

Strategic: CISO

Tactical: Director of Information Security Intel

Operational: Analyst, IT Security Engineer

Description of Roles

CISO:

Chief Information Security Officer.  Is the senior-level executive within his organization responsible for securing information assets and technologies.

Director of Information Security Intel:

Obtain daily snapshot of all analyst activities, active or possible Information Securitys and ensure security teams are closing vulnerability gaps.

 

Cyber Analyst:
Protects information systems, assets & people by using automated and manual data mining techniques.

Features

This alignment of an organizations various functional areas is easily achieved using Information Security Analytics platform.  The following core features make it easy to ingest, curate and visualize the pertinent data. 

 

Ingestion 

There are no limits to the types of information that can be ingested, using our three-step process. Using structured, unstructured and semi structured information, from logs to social media all data can be easily absorbed into the Information Security Analytics platform.

To learn more about ingesting data into the platform, see section Manager.

Curation & Fusion

While adding any data sources is a huge benefit, it is also necessary to perform cleansing and ongoing data hygiene. Visually associating and combining data sources helps to align relationships within internal and external data. It is not necessary to hire a developer or contact your vendor to perform these tasks.

For more information, learn more about the Source Builder.

Visualize & Collaborate

Tools must be designed to discover patterns and anomalies.  Visualizations can be shared with team members throughout the analytical process. Enterprises can therefore create the necessary structures to perform self-learning to develop an accurate pictures of results.

For more information, see section ProjectsWorkspaces, and Search.

Cascading Scorecards

Since each enterprise is different, a set of scorecards will aid your stakeholders so they can measure and monitor critical security information in an adaptive way. On-going measurement that changes as you do.

For more information, see section ProjectsWorkspaces.

User Management

Information Security Analytics uses a role-based user management mechanism to simplify administration of the platform.  For more information, see User Management.


Next Steps:

Take a deeper dive into some of the patform's core concepts

Information Security Analytics Core Concepts

Ready to Get Started?

Panel

In this section:

Table of Contents
maxLevel2
indent16px

 


 

Panel

Related Procedural Documentation:

Manager

Introduces you to the basic concepts of Information Security Analytics source management, before taking you through some common procedural workflows for getting up-and-running with source management.

Source Builder

Wizard-based interface for ingesting data sources.

ProjectsWorkspaces

Workspace for User Access, Dashboards, Cascading Scorecards etc.

Search

Query the platform and view the search results as Information Security Analytics documents (entities, associations, geo and temporal data etc.)

Panel

Related Interface References:

Manager Interface Reference

Quick reference field definitions for the Manager interfaces.

Projects Workspaces Interface Reference

Quick reference field definitions for the Project Workspace interfaces.