Applying graph visualization to cyber-security analysis

preview_player
Показать описание
Security information and event management/log management (SIEM/LM) evolve continuously to match new security threats. Nevertheless, these solutions often lack appropriate forensics tools to investigate the massive volumes of data they generate. This makes it difficult for security analysts to quickly and efficiently extract the information they need. Modeling this data into a graph database and adding a graph visualisation solution like Linkurious on top of the company’s security dashboard can solve this problem.

In this webinar, based on a real-world example, you will learn how Linkurious can help:

* detect and investigate visually suspicious patterns using the power of graph;
* perform advanced post attack forensics analysis and locate vulnerabilities;
* work collaboratively and locate suspicious IP’s using the geospatial localisation feature.
Рекомендации по теме