Security Analytics



Humio’s transformative site license is removing logging constraints and shifting the organizational culture to improve cybersecurity, privacy and business resilience. By removing obstacles to give customers autonomy, Humio enables users to determine their logging practices without concerns for restrictive technological, hardware or financial resources. With Humio’s instant visibility, security teams have continuous insights that enable immediate responses and actions to strengthen the performance across systems, prevent infrastructure breakdowns and protect against attacks.

  Their Stories With Humio

  Latest News from Humio

  Where Can You Find Humio?



Devo Advanced Directory.jpg

Devo delivers real-time operational and business insights from analytics on streaming and historical data to operations, IT, security and business teams at the world’s largest organizations.

The Devo Data Operations platform offers the speed to deliver blazing-fast insights, the simplicity to ensure non-technical users can discover their own insights, and the scale to meet the data volume and query demands of the world’s largest organizations.

Customers in telco, financial services, manufacturing, IoT and other sectors use Devo to gain real-time operational intelligence from their streaming and historical data.

  Live and On-Demand Webinars with Devo


An InfoSec Life Column is Made Possible by the Generosity of Devo.

We are ever so grateful for your support!


  Where Can You Find Devo?

  Latest News and Updates from Devo

  Devo Conversations on ITSPmagazine


Vectra Networks


Vectra® is transforming cybersecurity by applying advanced AI to proactively detect and respond to hidden cyberattackers in cloud, data center and enterprise environments. Powered by AI, Vectra and its flagship Cognito® platform enable the world’s most consequential organizations to detect attackers in real time and empower threat hunters to perform conclusive incident investigations.

  Webinars and Videos on ITSP TV

  Recent Contributions to ITSPmagazine




Balbix’s predictive breach risk platform is the industry’s first system to leverage predictive analytics and AI to provide enterprises with a comprehensive and continuous risk and resilience calculation visualized via a searchable and clickable heat map. We designed our platform for CIOs, CISOs and IT security teams who wish to proactively understand their breach risk and cyber-resilience. The Balbix system can predict critical breach scenarios, help users prioritize security operations and projects, and ultimately improve cyber-resilience.

  Podcasts on ITSP Radio

Enterprise security risk management: A new approach by Balbix

In this episode, Chenxi Wang, host of The New Factor on ITSPmagazine, chats with Gaurav Banga, CEO of Balbix, on enterprise security risk management. Balbix engineered an interesting new approach to help both security professionals and business leaders to understand their security risks and prioritize tasks to manage the various aspects of risks. Chenxi and Gaurav discussed why effective risk management must start from concrete information from the technology layer, with the appropriate infrastructure and application context, and evaluated against a framework that is slated for automation. We discussed use cases, challenges, as well as the directions of which enterprise risk management will follow in the foreseeable future.




Cyphort, Inc. is a security software company providing mid- and large-size enterprise customers with innovative security analytics for advanced threat defense. The solution is built with an open architecture that integrates with existing security tools to discover and contain the advanced threats that bypass the first line of security defense in an organization.

  Podcasts on ITSP Radio

Mounir Hahad from Cyphort Labs reminds us: the end goal is to protect our customers and users

Mounir Hahad, Sr. Director at Cyphort Labs connected with ITSPmagazine’s Sean Martin during the Black Hat USA 2017. During their conversation, Hahad reminds us all that the end goal for the industry is to protect our customers and provide a safe environment for the end users to conduct their business. With this in mind, Hahad also puts a call out to the industry at large to work together, suggesting that business and technical partnerships should not be limited to the behemoths that want to control the market nor the startups that are looking for a creative, partnership-driven means to enter the market. In other words, it’s going to require all of us to work together if we are to successfully tackle the problem of cybercrime.

As Mournir described the threat landscape for me, he noted that, while accessing malicious content via the web is still a prevalent threat, email seems to be the most common vector for delivery of malicious code - such as that found in some of the recent ransomware attacks. As organizations look to address the threat of ransomware, Mounir offered some fundamental recommendations to help them prepare for a pending ransomware attack: 1) back up your data safely offline, 2) employ a defense in depth model while not relying on a single technology for protection, and 3) patch, patch, patch.

  Webinars on ITSP.TV

  Recent Contributions to ITSPmagazine




Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built, advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced insider threats, data security and fraud attacks automatically and accurately. Globally, customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management.

  Recent Contributions to ITSPmagazine




Reveelium Inc. is a software developer which provides the best of solutions in keeping cyber-threats away from business. We are a technology leader in predictive cybersecurity analytics, employing a variety of statistical and predictive models, machine learning, data mining and big data technologies.
We market two different types of solutions:

1. IKare: A competitive vulnerability scanner which can work autonomously on-site.

2. Reveelium: Awarded best cybersecurity behavior analysis technology in detecting unknown threats.

Reveelium Inc. holds a SOC infrastructure, capable of supervising the overall security of its customers. The SOC is especially designed to enable clients to focus on their core business activities while we handle their cybersecurity issues. Different models are available according to customer needs. Our team is dedicated to your satisfaction, do not hesitate to contact us with any of your cybersecurity concerns. 




OnApproach is a CUSO that focuses on providing credit unions with the power to use data as a competitive advantage both independently and cooperatively. With OnApproach, credit unions can now harness the value of Big Data/Analytics through integration, advanced reporting, and predictive analytics. This deeper understanding of data allows credit unions to discover vital trends in member behavior, resulting in improved financial performance, reduced risk, and enriched relationships with members.