Search:
 
SCALABLE & FLEXIBLE

Open Source

 

An Open Source Heritage

Before IKANOW, the company’s founders were applying big data analytics to locate IED locations in Iraq and Afghanistan. Speed mattered. If the analytics were not deployed quickly and accurately, people could die. Open source software was the best answer.  After the war, they recognized that open source analytics capable of handling big data scale could help organizations answer a lot of difficult questions. The IKANOW Community Edition became the first open source software analytics platform.

Turning to Information Security

This work led to private sector requests to apply IKANOW analytics capabilities to information security challenges. It led to some new questions:

  • Why are most information security software solutions proprietary and closed?
  • Why do these proprietary platforms such at SIEM break down under heavy data loads?
  • Why are query times so long and incapable of producing consistent results?
  • Why are these proprietary solutions so hard to integrate with new data sources?
  • Why are they so expensive relative to the value delivered?

It is apparent that the proprietary bias of security software vendors imposes serious limitations when attempting to apply analytics to identify information security breaches and threats. The closed solutions cannot handle the scale or the need to quickly integrate with a large number of data sources. This means that too often the needle remains hidden in the haystack.

Open-Source_Slide1a
Open-Source_Slide2
Open-Source_Slide3
Open-Source_Slide1a

Leading Open Source Technologies

Open source technologies ranging from Hadoop, Logstash and Spark to Elasticsearch, Titan, Mongo, YARN and others are leveraged to meet the scale, accuracy and integration needs of enterprise information security.

Open-Source_Slide2

Massively Scalable

IKANOW’s Information Security Analytics can analyze 40TB of data included in 42 thousand records every second. Results come back in just five seconds. An unlimited number of data feeds can be quickly integrated to provide a holistic view of an organizational risk posture for the first time.

Open-Source_Slide3

Easy Integrations

Breaches that previously remained hidden are exposed as internal and external data sources are correlated based on even minor data footprints left by threat actors.

cta-logo-small-ikanow
LEARN HOW YOU CAN TAKE BACK CONTROL OF YOUR INFORMATION SECURITY

FEATURED WHITEPAPER

Ik-Whitepapers-Hadoop2

Here at IKANOW, we are big fans of MongoDB. It has decent performance, it scales sensibly, and above all its schema-less JSON approach ensures easy integration with a host of other modern technology platforms.

Video: TAKE BACK CONTROL

 

KANOW Information Security Analytics is lightning fast, scalable and extensible because it was built upon open source technologies from the ground up.

LEARN MORE
cta-logo-small-ikanow
LEARN HOW YOU CAN TAKE BACK CONTROL OF YOUR INFORMATION SECURITY

Warning: Parameter 1 to W3_Plugin_TotalCache::ob_callback() expected to be a reference, value given in H:\root\home\adhams-001\www\ikanow\site\wp-includes\functions.php on line 3594