Free Submission Public Relations & NewsPR-inside.com
Home
Deutsch English

Business

21CT Turns Big Data Into Big Insight With Release of Graph Search for More Powerful Pattern Detection Company Also Awarded Patent for Faster and More Efficient Graph Search to Quickly Identify and Mitigate Cyber Attacks, Fraud, and Criminal Activity


Print article Print article
© Marketwire 2013

Using the newly enhanced LYNXeon graph search, these organizations now intuitively correlate and visualize data to detect never before seen patterns and gain the operational insight needed to identify embedded cyber attackers, detect fraud, and document criminal behavior.
Using the newly enhanced LYNXeon graph search, these organizations now intuitively correlate and visualize data to detect never before seen patterns and gain the operational insight needed to identify embedded cyber attackers, detect fraud, and document criminal behavior.
2013-02-26 12:03:28 -

SAN FRANCISCO, CA -- (Marketwire) -- 02/26/13 -- RSA Conference -- 21CT Inc., provider of investigative analytics : ctt.marketwire.com/?release=989271&id=2654977&type=1& .. and pattern-detection solutions, today announced enhanced graph search capabilities for LYNXeon™. Challenged by commodity tools that simply regurgitate log data, enterprises and government organizations need more effective and efficient solutions that can turn big data into big insight. Using the newly enhanced LYNXeon graph search, these organizations now intuitively correlate and visualize data to detect never before seen patterns and gain the operational insight needed to identify embedded cyber attackers, detect fraud, and document criminal behavior.





The company also announced today an additional patent award (U.S. Patent 8,316,060) for rapidly and efficiently performing graph searches on massive data sets, a key technological advantage in 21CT solutions.



Turning Big Data Into Big Insight for Cyber Hunters
"Machine-based attacks can be caught by machines, but today's advanced human-based attacks, whether cyber or physical, require hunters," said Robert Williams, Chief Product Officer, 21CT. "Global organizations and governments have teams of analysts and investigators that use data analysis to hunt out and mitigate cyber attacks, fraud, and criminal behavior. These hunters don't care about the marketing buzz of Big Data, they want big insights in order to detect patterns and get to the right answer, faster. The new LYNXeon graph search capability brings data analytics to a new level, efficiently providing visibility into the links that a hunter can use to get answers and doing it in a fraction of the time of legacy or homegrown solutions."



Today's update to LYNXeon, automatically available to all users under maintenance, enhances capabilities for cyber security analysis : ctt.marketwire.com/?release=989271&id=2654980&type=1& .. , fraud detection analytics : ctt.marketwire.com/?release=989271&id=2654983&type=1& .. , digital forensics investigations : ctt.marketwire.com/?release=989271&id=2654986&type=1& .. , and more, including:



  • Graph Search for Powerful Pattern Detection - The enhanced LYNXeon graph search capability provides users with more effective analysis and visualization of data paths and links. Using this state-of-the-art graph search allows analysts and investigators to:

    • Visualize previously undetectable threats and malicious activity to fortify IT infrastructure

    • Dramatically shorten time-to-detect and increase their ability to investigate potential damage, down to the individual user level, from identified attacks

    • Shorten time-to-mitigate cycles, preventing any further damage to the infrastructure





To understand how 21CT's investigative analytics and pattern-detection solutions can enhance your intelligence-driven security, schedule your LYNXeon demo : ctt.marketwire.com/?release=989271&id=2654989&type=1& .. today.



About 21CT, Inc.



21CT Inc. investigative analytics and pattern-detection solutions secure your world. Using LYNXeon from 21CT, organizations rapidly import enriched and disparate data, analyze and visualize it to find previously undetectable patterns, and gain the operational insight needed to identify embedded cyber attackers, detect malicious fraud, and document criminal behavior. For more information and to find out how we can help secure your world, visit www.21CT.com : ctt.marketwire.com/?release=989271&id=2654992&type=1& .. .


Embedded Video Available : www2.marketwire.com/mw/release_html_b1?release_id=989271

Image Available: www2.marketwire.com/mw/frame_mw?attachid=2237405 : www2.marketwire.com/mw/frame_mw?attachid=2237405
Embedded Video Available: www2.marketwire.com/mw/frame_mw?attachid=2237409 : www2.marketwire.com/mw/frame_mw?attachid=2237409



Add to Digg : digg.com/submit?phase=2&url= www2.marketwire.com/mw/release_html_b1?release_id=989271 Bookmark with del.icio.us : del.icio.us/post?v=4&noui&jump=close&url= www2.marketwire.com/mw/release_html_b1?release_id=989271 Add to Newsvine : www.newsvine.com/_tools/seed&save?u= www2.marketwire.com/mw/release_html_b1?release_id=989271




Contact Info
Scott Spinola
Email Contact : www2.marketwire.com/mw/emailprcntct?id=C8AA147D9DCC342E
512-682-4000



Press Information:




Contact Person:


Disclaimer: (c) 2014 Market Wire. All of the press releases contained herein are protected by copyright and other applicable laws, treaties and conventions. Information contained in the releases is furnished by Market Wire's, who warrant that they are solely responsible for the content, accuracy and originality of the information contained therein. All reproduction, other than for an individual user's personal reference, is prohibited without prior written permission.
Latest News
Read the Latest News
www.newsenvoy.com

 


Terms & Conditions | Privacy | About us | Contact PR-inside.com