World Security Report News2017-11-14 08:26:22
Verint Adds Machine Learning and Automation to its Cyber Security Solution for Governments and Critical Infrastructure Providers
Verint® Systems Inc. presented their latest version of its Intelligent Security Operations Center (iSOC) solution at the recent Defense & Security Thailand 2017. The iSOC is a turnkey cyber security solution designed for government and critical infrastructure providers with large security operations center.
Powered by Verint’s comprehensive data mining capabilities, domain expertise and intelligence methodologies, the new iSOC automates data collection and analysis for the security analysts and accelerates time from threat detection to response enabling the operations center to more effectively address complex cyber-attacks.
“As the frequency and sophistication of cyber-attacks continuously increase, governments and critical infrastructure providers face significant challenges. Verint’s iSOC solution was developed to address customers’ needs for a more modern and effective Security Operations Center,” says Elad Sharon, president, Verint Cyber Intelligence Solutions. “Verint’s iSOC levels the playing field, equipping organizations with a comprehensive data mining solution powered by Verint’s deep domain expertise and embedded intelligence methodologies to combat cyber threats,” Sharon concluded.
Verint’s iSOC, delivers a unified view, holistic monitoring, and consistent security management with coordinated and comprehensive incident response. The “virtual analyst” technology and machine learning capabilities automate processes of inspecting alerts and recommending “next best action” to security analysts. The automated iSOC also ensures faster onboarding of security analysts and better team work through visual incident management.
Verint’s iSOC solution can be integrated with a variety of threat intelligence sources including Verint’s Web Intelligence solution that gathers intelligence from dark web and social media sources, providing visibility into external cyber threats, threat actors, malicious campaigns, and evidences of breaches and data leaks.
For more information contact: