Data Fusion Platform
Isolated data islands with valuable information emerge rapidly within organizations. These islands may hold diverse information and may be comprised of structured data such as access control data, log data and process data or they can hold unstructured data such as images, videos and documents.
When organizations want to find valuable information by holistic analysis, it becomes impossible with continuous growth and addition of new data islands. It might take days, if not months, to find the critical information on which the organizations have to act. Even if there is only one data island within an organization, representation and packing of the data might prevent uncovering the information
Published on July 17, 2019
Introducing: Cyber Threat Monitoring Platform
Identify potential security vulnerabilities, detect threats and prevent data leaks.
The average time it takes to identify a cyber security incident is 197 days, according to the 2018 Cost of a Data Breach Study by the Ponemon Institute, funded by IBM. Companies that identify and combat an incident within 30 days have a significant advantage over their less responsive competitors and save an average of $1 million in containment costs.
Collected data should be pre-evaluated and, if relevant, confirmed or re-evaluated by an analyst. The aim is to provide realisable insights. Detected threats can indicate various risks within the company. The best protection is to combine the intelligence of qualified investigators and AI to effectively transform raw data into actionable intelligence.
The Traversals Cyber Threat Monitoring Platform is aimed at all companies seeking active protection.
“Employing dark web monitoring solutions that allow the use of focused filters to identify key phrases, such as your brand and product names, that may contain information that can negatively affect your organization is a good start in your effort to glean useful intelligence from the dark web…”
Published on July 9, 2019
A Secure Software Supply Chain to Deal With Cyber Threats, Technical Debt and License Violations
— by Tim Riffer and supervised by Dirk Kolb
The continuous introduction and implementation of the DevOps concept and the associated automation of software creation and delivery has made the software supply chain a business-critical unit in companies. What many publications and blog posts that deal with DevOps rarely mention, is that traditional software delivery pipelines do not address security issues, license violations or technical debt. Considering how often complex software systems are used in critical infrastructures, it would be negligent to ignore these issues in the DevOps environment.
We tasked ourselves to build a secure software supply chain for our Data Fusion Platform. As an advocate of innovative IT solutions, we are committed to deliver innovative, state-of-the-art and secure software to our customers and partners.
Published on July 5, 2019
Building a React Library with a Cesium Component
— by Prasanna Mahadevaswamy and supervised by Dirk Kolb
In this article, we will show you how to build a shared React component library with Cesium and Resium using Webpack. We tasked ourselves to build a UI component library that can be used for various solution implementations provided by our Data Fusion Platform.
Published on May 8, 2019