Government agencies and the organizations that work with them are collecting, archiving and storing massive volumes of data in repositories — but haven’t been able to derive security value from it.
SNYPRTM is a security analytics platform that transforms Big Data into actionable security intelligence. It delivers the proven power of Securonix analytics with the speed, scale, and affordable, long-term storage of Hadoop in a single, out-of-the box solution.
SNYPR was purpose-built to translate the billions of events from hundreds of different data sources that big organizations generate daily into accurate risk intelligence and real-time threat detection.
SNYPR ingests petabytes of data generated in large organizations, processes it and analyzes it in real-time using a combination of user and entity behavior analytics (UEBA), unsupervised Deep Learning, and threat modeling to deliver true predictive threat detection and unprecedented historical investigation capabilities.
What does SNYPR mean for enterprise security?
- A holistic enterprise security analytics platform that marries best-of-breed Big Data and analytics technologies
- Detect the most sophisticated advanced persistent threats and “low and slow” attacks over extended periods of time
- All historical, security-relevant data is available for investigation
What is SNYPR?
SNYPR runs the Securonix technology and all its features natively on Hadoop and uses Hadoop both as its distributed security analytics engine and long term data retention engine. The more data to be ingested and analyzed, the more Hadoop nodes to be added, the solution scales horizontally as needed.
SNYPR enables the agencies that protect and run our country, and their partners, to detect insider threats, privilege abuse, data exfiltration, advanced persistent threats, and “hard-to-see” breaches involving sophisticated malware.
It harnesses the power of big data and puts actionable intelligence into the hands of security leaders, enabling them to combat cyber threats and reduce risk to their organization with fewer resources and lower costs.
What sets SNYPR apart from other solutions is the use of proprietary signature-less threat detection algorithms that continuously scan data to pinpoint rogue activities, abnormal security events, and access privileges.
Where current event monitoring technologies are focused on data collection, retention and compliance reporting at the perimeter, SNYPR focuses on detecting advanced threat patterns and even insider threats.
SNYPR continuously analyzes the billions of events generated by an organization’s network, systems and applications, and pinpoints suspicious events that require further investigation.
SNYPR delivers the proven power of Securonix analytics with the speed, scale, and affordable, long-term storage of Hadoop in a single, out-of-the box solution.
SNYPR integrates directly with sources of event information the organization already has in place.
In addition to leveraging existing event data, it provides aggregation and enrichment with other relevant sources of information including identity, access, third party intelligence and geolocation information.
SNYPR ingests petabytes of data, processes it, and then analyzes it in real-time using a combination of user and entity behavior analytics (UEBA), unsupervised deep learning and threat modeling to deliver true predictive threat detection.
SNYPR is not only the most sophisticated threat detection capability ever available, it also seamlessly delivers the benefits of long-term data storage and distributed analysis with its out-of-the-box Hadoop deployment.
The world’s top government organizations, as well as the Fortune 1000 and hundreds of other industry leaders, rely on Securonix’s industry-leading platform for security analytics that provides advanced monitoring and threat detection capabilities.
One such customer is a high profile international defense contractor developing advanced defense and security products servicing a global customer base.
The company has over 80,000 employees worldwide and operates in 25 different geographical areas. The company is a leader in defense innovations and sells its products to governments and large organizations.
Faced with a critical need to be able to monitor and gain insights into how and by who their sensitive information is being accessed, this contactor needed a solution that would enable them to detect insider threats, external attacks or activities performed by terminated employees.
Securonix was brought in to provide behavioral analytics on sensitive data access and terminated user accounts.
With Securonix, the contractor was able to:
- Rapidly detect exfiltration attempts
- Significantly reduce the risk of unauthorized data exfiltration
- Reduced the total number of alerts that they need to investigate by up to 90%
- Reduce overall false positive alerts of 99%
- Reduce time and resources that previously had to sift through thousands of false alerts
Most, if not all, of the high profile breaches over the last few years – including the Snowden NSA breach, Target, Anthem and Sony – would have been prevented if those organizations also had Securonix in place.
Securonix is one of a prestigious handful of companies now invited into the halls of the Fortune 500, Federal agencies, think tanks, and even into briefings on Capitol Hill.
Several of the foremost thought leaders in homeland security, cyber security and intelligence have joined Securonix.
Our strategic advisory board includes former NSA Director Mike McConnell, former Secretary of Homeland Security Michael Chertoff, former Chief Information Officer of Bank of America Patrick Gorman, and former NSA Deputy Director Chris Inglis, among others.
Homeland security is so important to Securonix that we’ve produced several significant interviews in our Securonix Visionary Video Series featuring top government thought leaders including Chris Inglis:
(Courtesy of Sharon Vardi and YouTube)
In this first video of a four-part series, Chris Inglis, former deputy director at the NSA and current Chairman of the Securonix advisory board, sits down with Securonix CEO Sachin Nayyar for a candid conversation about cyber security strategy. How is the threat landscape changing? And how should companies defend themselves against the new wave of attacks?
“We as a society have been stuffing wealth and treasure in this place called cyberspace. Because of that, cyberspace will only become a more valuable target for adversaries,” says Inglis.
“There have been some significant recent changes. The idea that a nation state – North Korea – would attack the private sector in such a brazen way that happened two months is remarkable. We need to think our way through how to counter that.”
As deputy director of the NSA at the time of the Snowden attack, Inglis has spent his career on the front lines of cyber warfare. He shares his thoughts on a holistic approach to cyber security that is resilient, proactive and prepared for new and evolving threats.
(Courtesy of Securonix and YouTube)
In this episode of Cyber Security Visionaries, Brian Contos travels to Washington DC for an interview with cyber expert Emilio Iasiello on the future of Cyber War.
(Courtesy of Securonix and YouTube)
Brian Contos, Chief Security Strategist at Securonix interviews Parham Eftekhari, Co-Founder & Sr. Fellow at the Institute for Critical Infrastructure Technology (ICIT), a Washington DC based cybersecurity think tank providing advisory to legislative and agency leaders on Cyber Threats.
Securonix is working to radically transform all areas of data security with actionable security intelligence.
Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment.
Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced data security, insider threats and fraud attacks automatically and accurately.
Globally customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management.