Fortscale launched its Private Beta in the annual global event of Splunk

“Fortscale 1.0 is the first product that was specifically designed to address the most severe challenges of cyber security analysts’ teams in commercial enterprises. Its main goal is to turn raw data and logs into valuable intelligence that can be used by security analysts and subsequently by the enterprise’s management. It is designed to provide the cyber security knowhow required to translate the event and log data collected by Big Data platforms or traditional SIEM systems into risk based prioritized leads and events”.

 

Fortscale, an Israeli-based Big Data cyber security analytics start-up, today announced that it will unveil Fortscale 1.0 at .conf2013, Splunk’s annual worldwide users’ conference, being held this week (September 30 - October 3) in Las Vegas. Fortscale’s exhibit will showcase a live product demo featuring analytics use cases that pinpoint high-risk user behavior and access activity.

Currently in private beta mode, Fortscale 1.0 enables enterprises to easily run big data analytics for cyber security, regardless of their technical know-how in machine learning or in advanced cyber warfare techniques. These advanced analytics are layered on top of the existing capabilities of Big Data platforms, to provide timely intelligence that can be used by security analysts to discover, investigate and remediate security threats.

Splunk’s .conf2013 marks the first time Fortscale has presented its working product in a public forum. Until now, the product has only been available to Fortscale’s private beta partners in the US and Israel.

“Splunk is a true pioneer and the leader in the big data ecosystem, and we couldn’t have found a more appropriate venue to unveil our breakthrough big data analytics for cyber security,” said Idan Tendler, CEO & co-founder of Fortscale. “Based on the results we have seen from our installations, we believe that our advanced security analytics solution gives security analysts an effective toolbox to gain intelligence about malicious or rogue users, discover advanced attacks and investigate potential security breaches.”