Jeff Wilson

Most organizations have massive investments in threat mitigation infrastructure, and in most cases, that infrastructure is layers and layers of products purchased to solve specific problems. The real missing ingredient for organizations who are trying to meaningfully shrink their threat exposure window is a data-gathering and analytics layer that connects to their entire infrastructure; one […]

Read more...

Ovum Andrew Kellet

Too many organizations continue to be breached by security threats that should be detected. Once a break-in has taken place, detection and remediation times at an average of around 200 days remain far too high. More effort is needed to improve threat identification rates and remediation timelines. Two issues are important in achieving these objectives: […]

Read more...

David Monahan

Analyzing data from a wide range of sources and distilling the results greatly reduces the urgent workload of analysts. As a result, OTM can become a force multiplier, enabling a smaller staff to provide better coverage by focusing their efforts. It might even free up people to do more big-picture work.

Read more...

Ovum-Andrew Kellet

Security vendors and service providers that can make significant improvements to cyber-threat detection rates and reduce the time taken to find and fix security breaches have an important role to play. Seceon’s approach to these issues is driven by its combined use of analytics, machine learning, and adaptive detection algorithms to identify and block cyber-attacks, […]

Read more...