Tag Archives: behavioral analytics

Forcepoint’s Sean Berg: Agencies Should Consider User-Focused Approach to Zero Trust

Sean Berg SVP

Sean Berg, senior vice president and general manager for global governments and critical infrastructure at Forcepoint, has said that organizations should prioritize the monitoring of user perimeters through a zero-trust approach. “With people as the new perimeter, zero trust is a non-negotiable first step for securing newly distributed agency workforces and ensuring users are who they say they are,“ Berg wrote in a guest piece for FedScoop.

Read More »

Forcepoint's Nicolas Fischbach: User Activity Monitoring Could Help Agencies Protect Data

Nicolas Fischbach Global CTO Forcepoint

Nicolas Fischbach, global chief technology officer at Forcepoint, wrote in a guest piece published Friday on Nextgov that government agencies should prioritize data visibility and data loss prevention as they head into 2021. He said agencies should determine how employees and other users interact with government data through user activity monitoring with the aid of behavioral analytics to better detect compromised accounts and malicious actors.

Read More »

NTT Data to Sell GDS360 Information Protection, Data Security Tech to Public Sector Clients

NTT Data will offer GDS360-built information protection and data security platforms to the former’s public sector client base as part of a multi-year teaming agreement. GDS360 said Wednesday its end-to-end products combine elements such as zero-knowledge encryption key management, user identity management, behavioral analytics and access audits to help clients meet …

Read More »

NIST to Demo CyberX Industrial Cybersecurity Platform

The National Institute of Standards and Technology has partnered with cybersecurity startup CyberX to demonstrate the company’s industrial cybersecurity platform. NIST’s National Cybersecurity Center of Excellence will demonstrate the CyberX ICS tool in simulated manufacturing environments with human-machine interfaces, programmable logic controllers and operational technology protocols, the company said Thursday. The effort seeks to create an NIST …

Read More »

Verint Systems to Help Latin American Country Establish Govt Security Operations Hub

Verint Systems is part of an industry consortium that won a multimillion dollar project to establish a government security operations center for a Latin American country to help government organizations address sophisticated cyber threats. The company said Thursday it will provide a threat detection and analysis platform to the future GSOC as a member of the ELTA Systems-led Israeli Cyber …

Read More »

Haiyan Song: Organizations will Integrate Machine Learning Tech to Automate Data Breach Response

Haiyan Song, Splunk vice president of security markets, said more organizations will adopt adaptive response, behavioral analytics and machine learning strategies to automate response, retrieval and sharing in multivendor environments. Song wrote in an opinion piece published Tuesday machine learning-based systems will increase in 2017 as government and industry organizations look …

Read More »

OGSystems, TransVoyant Form Predictive Analytics Tech Partnership

TransVoyant and OGSystems have partnered to integrate a predictive analytics tool with OGSystems’ platform that works to help customers gain situational awareness as well as receive anomaly alerts and reports on operational risks. The partnership aims to add TransVoyant’s Precise Predictive Intelligence system to the BlueGlass platform OGSystems designed to generate real-time insights through remote sensing, big …

Read More »

DLT, Sqrrl Form Threat Detection and Response Platform Partnership; Alan Marc Smith Comments

DLT Solutions and Sqrrl have formed a partnership to provide government agencies with a threat detection and response platform. The Sqrrl Enterprise platform works to target and disrupt cyber threats through the use of user and entity behavior analytics, DLT said Tuesday. “Recent cyber incidents teach us that advanced cyber adversaries will be able …

Read More »