Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 60 Next »

Overview

IKANOW Information Security Analytics helps adjust the levers of your enterprise to cohesively align strategic, tactical, and operational functions with speed. Information Security Analytics simplifies the data ingestion process by giving your analyst team tools for ingestion and curation without the need for customized development. Responding to and anticipating cyber risks is a highly surgical process and requires a specialized set of tools, infrastructure and support. IKANOW’s revolutionary offering helps security stakeholders’ structure, perform customized analysis and achieve decision automation so security strategies can be executed with ease. 

For additional technical assistance, please contact us at 1 (888) 420-3846 or via e-mail at support@ikanow.com

The IKANOW Promise

As a Customer you have entrusted IKANOW with accelerating your decision making and closing gaps on cyber risks.  IKANOW is your partner in obtaining the visibility you require on the attack surface and adjusting to risks rapidly.  Speed is not only critical to your enterprise, it is most important at IKANOW.  Every additional click is lost time.  As security data grows and becomes increasing complex, it can have the propensity to slow down your enterprise and thereby increase risk.  Our pledge is that Customers' can find anything within ISA or it's respective User Guide in 30 seconds or less.  If your experience is any less than that, we need to hear about it using the contact information indicated above.  Continuous improvement is mandatory at IKANOW at every level, whether during Customer Support inquiries or waiting for a single webpage to render. 

Description of Roles

CISO: Chief Information Security Officer. Is the senior-level executive within his organization responsible for securing information assets and technologies.


Director of Information Security Intel: Obtain daily snapshot of all analyst activities, active or possible Information Securitys and ensure security teams are closing vulnerability gaps.

 

Cyber Analyst: Protects information systems, assets & people by using automated and manual data mining techniques.

Features

This alignment of an organizations various functional areas is easily achieved using Information Security Analytics platform. The following core features make it easy to ingest, curate and visualize the pertinent security data to accelerate decision making.

Ingestion 

There are no limits to the types of information that can be ingested, using our three-step process. Using structured, unstructured and semi structured information, from logs to social media all data can be easily absorbed into the Information Security Analytics platform.

To learn more about ingesting data into the platform, see section Manage.

Curation & Fusion

While adding any data sources is a huge benefit, it is also necessary to perform cleansing and ongoing data hygiene. Visually associating and combining data sources helps to align relationships within internal and external data. It is not necessary to hire a developer or contact your vendor to perform these tasks.

For more information, learn more about the Source Builder.

Visualize & Collaborate

Tools must be designed to discover patterns and anomalies.  Visualizations can be shared with team members throughout the analytical process. Enterprises can therefore create the necessary structures to perform self-learning to develop an accurate pictures of results.

For more information, see section Workspaces, and Search.

Administration & User Management

Information Security Analytics uses a role-based user management mechanism to simplify administration of the platform.  For more information, see Access Controls.

Core Concepts

There are two major sections to the ISA platform

  • The Manager:  The management interface enables administrators to easily add data sources using source builder, and then assign access to data via User Groups and Data Groups.  When users are added to the system they can be assigned administrative permissions.

  • The Workspaces:  Users such as CISOs, IT professionals, and analysts will spend most of their time inWorkspaces.  There is a Global workspace with pre-defined Dashboard views to get users up-and-running quickly with a baseline view of data.  A user's view of the Global Workspace is based on the data they have been given access to by an administrator.  Users can also create their own Project Workspace to collaborate with others using subsets of this data.  In Project workspaces users can visualize data, view Dashboards, and generate reports.

The following list of topics provides a deeper dive into some of the core concepts of the platform:

Information Security Analytics Terminology

Workspace

User Management


Next Steps:

Ready to Get Started?

  • Learn how to ingest data sources using the Manage.

  • Learn how to visualize data sources using Workspaces and Search.

In this section:

 

 

  • No labels