Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Overview
IKANOW Threat Information Security Analytics , helps adjust the levers of your enterprise to cohesively align strategic, tactical, and tactical operational functions with speed. Threat Information Security Analytics first simplifies the data ingestion process , by giving your analyst team tools for ingestion and curation without the need for customized development. By using this single sheet of sterilized data, threat intel and attack surface information can then be fused applying filters or removing unnecessary data points. Now, ready-made visualizations can be applied to identify patterns and anomalies while being shared with other teams to further your enterprise learning about attacks. Work with our data science team to build techniques for advanced analysis, finding the optimal mediums for correlation and comparison. With customized visualizations and templates, you are now armed to baseline repeatable metrics and build cascading scorecards, dashboards, across functions to mechanize response to and prediction of cyber risks. Threat Analytics equips security teams’ by coalescing insights and creating discipline so they can achieve accelerated decision throughout.
FeaturesResponding to and anticipating cyber risks is a highly surgical process and requires a specialized set of tools, infrastructure and support. IKANOW’s revolutionary offering helps security stakeholders’ structure, perform customized analysis and achieve decision automation so security strategies can be executed with ease.
For additional technical assistance, please contact us at 1 (888) 420-3846 or via e-mail at support@ikanow.com.
The IKANOW Promise
As a Customer you have entrusted IKANOW with accelerating your decision making and closing gaps on cyber risks. IKANOW is your partner in obtaining the visibility you require on the attack surface and adjusting to risks rapidly. Speed is not only critical to your enterprise, it is most important at IKANOW. Every additional click is lost time. As security data grows and becomes increasing complex, it can have the propensity to slow down your enterprise and thereby increase risk. Our pledge is that Customers' can find anything within ISA or it's respective User Guide in 30 seconds or less. If your experience is any less than that, we need to hear about it using the contact information indicated above. Continuous improvement is mandatory at IKANOW at every level, whether during Customer Support inquiries or waiting for a single webpage to render.
Image Added
Description of Roles
CISO: Chief Information Security Officer. Is the senior-level executive within his organization responsible for securing information assets and technologies.
Director of Information Security Intel: Obtain daily snapshot of all analyst activities, active or possible Information Securitys and ensure security teams are closing vulnerability gaps.
Features
This alignment of an organizations various functional areas is easily achieved using Information Security Analytics platform. The following core features make it easy to ingest, curate and visualize the pertinent security data to accelerate decision making.
Ingestion
There are no limits to the types of information that can be ingested, using our three-step process. Using structured, unstructured and semi structured information, from logs to social media all data can be easily absorbed into the Threat Information Security Analytics platform.
To learn more about ingesting data into the platform, see section Manage.
Curation & Fusion
While adding any data sources is a huge benefit, it is also necessary to perform cleansing and ongoing data hygiene. Visually associating and combining data sources helps to align relationships relationships within internal and external data. It is not necessary to hire a developer or contact your vendor to perform these tasks.
For more information, learn more about the Source Builder.
Visualize & Collaborate
Tools must be designed to discover patterns and anomalies. Visualizations can be shared with team members throughout the analytical process. Enterprises can therefore create the necessary structures to perform self-learning to develop an accurate pictures of results.
Cascading Scorecards
Since each enterprise is different, a set of scorecards will aid your stakeholders so they can measure and monitor critical security information in an adaptive way. On-going measurement that changes as you do.
Next Steps:
Learn how to ingests data sources using the Manager.
For more information, see section Workspaces, and Search.
Administration & User Management
Information Security Analytics uses a role-based user management mechanism to simplify administration of the platform. For more information, see Access Controls.
Core Concepts
There are two major sections to the ISA platform
- The Manager: The management interface enables administrators to easily add data sources using source builder, and then assign access to data via User Groups and Data Groups. When users are added to the system they can be assigned administrative permissions.
- The Workspaces: Users such as CISOs, IT professionals, and analysts will spend most of their time inWorkspaces. There is a Global workspace with pre-defined Dashboard views to get users up-and-running quickly with a baseline view of data. A user's view of the Global Workspace is based on the data they have been given access to by an administrator. Users can also create their own Project Workspace to collaborate with others using subsets of this data. In Project workspaces users can visualize data, view Dashboards, and generate reports.
The following list of topics provides a deeper dive into some of the core concepts of the platform:
Information Security Analytics Terminology
Next Steps:
Ready to Get Started?
- Learn how to ingest data sources using the Manage.
- Learn how to visualize data sources using Project Workspace Workspaces and Search.
Panel | ||||||
---|---|---|---|---|---|---|
In this section:
|
Panel |
---|
Related User Guide Documentation: |
Related Interface References:
Project Workspace Interface Reference