Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Deloitte Advisory Cyber Risk Services and Cray Offer Advanced Cyber Reconnaissance and Analytics Services

July 2016 by Marc Jacob

Deloitte Advisory Cyber Risk Services and Cray Inc. introduced the first commercially available high-speed, supercomputing threat analytics service, Cyber Reconnaissance and Analytics. The subscription-based offering is designed to help organizations effectively discover, understand and take action to defend against cyber adversaries.

The threat intelligence reports generated through this service are already enabling clients, including the Department of Defense, to focus remediation teams by providing detailed, actionable information on potential threat vectors and identifying specific flows, network locations, times and events. “We are leveraging Deloitte Advisory’s Cyber Reconnaissance service to enable large scale cyber data analytics to more proactively defend our networks and support critical national missions,” said Clayton Jones, USPACOM J6 Senior Advisor and Strategic Cyber Integrator.

The Cyber Reconnaissance and Analytics service is powered by the Cray® Urika®-GX system – Cray’s new agile analytics platform that fuses the Company’s supercomputing technologies with an open, enterprise-ready software framework for big data analytics. The Cray Urika-GX system gives customers unprecedented versatility for running multiple analytics workloads concurrently on a single platform that exploits the speed of a Cray supercomputer.

By changing the perspective, increasing the volume of data and applying advanced analytics, an organization can have a clearer view of true risk, exposure and malicious activity. This vantage point provides potential weaknesses, vulnerabilities and threat vectors that may highlight risks involving anomalous activities.

Big data, cloud computing and highly-distributed enterprises are also impacting the threat landscape; and greatly increasing an enterprise’s potential surface area for attackers to compromise. Dynamic interconnections among entities (e.g., third parties, customers and the public) encourage free flow of data where the “system boundaries” are often beyond an agency’s or organization’s (physical) walls. Data is generated and stored at a much faster rate than it can be analyzed, leaving open opportunities for malicious content to hide and maneuver undetected.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts