A History of Solving Complex Problems

Before IKANOW, the founders were applying big data analytics to identify IED locations in Iraq and Afghanistan. It was a complex problem that mattered. Lives were at stake. Big data analytics made a difference. The answers to likely IED locations were found in tiny footprints left in enormous troves of data from a large and shifting group of data sources.

The transition from detecting threats in the military theater to the information security environment was driven by customer demand and had some obvious parallels. Both are about tiny footprints, correlations, context and insight. Both require speed and accuracy of big data analysis. Both are about survival. The IED in the enterprise is the cybersecurity breach.


An Open Source Heritage Benefits End Users

IKANOW was built on open source technologies to deliver better performance and eliminate many of the limitations of vendor lock-in. It integrates easily to an unlimited number of data source. That means data from your many proprietary software vendors can be combined, analyzed and previously undetected breaches identified. It also means you can generate a comprehensive view of your risk posture for the first time.

A Commitment to Open Source Technologies

IKANOW’s founders adopted open source software for IED detection because it was the only solution that could meet the scale and extensibility requirements of the job. Information security has similar characteristics and in some cases the volume of data is even greater.

After the war, the founders recognized that open source analytics capable of handling big data scale could help organizations answer a lot of difficult questions of their own. The IKANOW Community Edition became the first Open Source Software Analytics platform. IKANOW Information Security Analytics is its cousin, packaged for the enterprise, built on the same platform and optimized for specific information security challenges related to breach detection, correlated search, vulnerability prioritization and threat feed evaluation.