Cyberthreat Management Using Behavioral Analytics and Machine Learning With Seceon

Cyberthreat Management Using Behavioral Analytics and Machine Learning With Seceon

Creative Commons

In a recent video interview, Solutions Review Founder and CEO Doug Atkinson sat down with Chandra Pandey, Founder and CEO of Seceon. Seceon is an advanced threat management platform provider based out of Westford, Massachusetts.

In their interview, Mr. Atkinson and Mr. Pandey discuss behavioral analytics and machine learning regarding cyber-threat detection. Mr. Pandey details the different attack tactics at hackers’ disposal, including perimeter breach, credential falsification, and business disruption via ransomware or DDoS.

Mr. Pandey also explains how modern enterprises may have as many as 30 data silos in their network. Often, these silos have minimum perimeter security protecting them—leaving plenty of gaps open for hackers. These silos create so much noise that security teams may ignore warning signs of a breach.

Therefore, Mr. Pandey argues for the necessity of visibility, detection, and containment/elimination capabilities in modern cybersecurity and security analytics platforms. True security requires pulling data from all endpoints, applications, and network locations. Security analytics needs to have a broad and contextual view to gain a richer understanding of security risks, users, and events.      

Want more? You can watch the full conversation between Doug Atkinson and Chandra Pandey of Seceon below.

Please check out our Solutions Review Youtube Channel to find more of our video interviews with industry experts on cybersecurity, data integration, identity, and backup technologies.   

Other Resources:

Get Your Employees to Embrace SIEM Best Practices!

4 Tips to Make Data Breach Detection Easier For Your Enterprise

Enterprises: Don’t Become Complacent in Your Cybersecurity!

How to Make Your SIEM Solution Deployment Easier for Your Enterprise

Comparing the Top SIEM Vendors — Solutions Review

How UEBA Can Prevent Insider Threats in your Enterprise

SIEM vs Security Analytics: What’s the Difference?

Should Risk Analytics Bridge the Cybersecurity Talent Gap?

What’s Changed? The Gartner 2017 Security Information and Event Management (SIEM) Magic Quadrant

The 25 Best Security Analytics and SIEM Platforms for 2018

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner

Leave a Reply

Your email address will not be published. Required fields are marked *