Novelty Demo

Novelty Demo

Novelty Tutorial This 12 min video demonstration walks through a Jupyter notebook powered scenario illustrating how to use thatDot Novelty to analyze CDN logs for anomalous activity. Click here to download the CDN dataset for this example.‍Download the Jupyter...
Novelty Technology

Novelty Technology

Introduction: a New Approach to Anomaly Detection Anomaly detection is a technique for finding important data. Decades of research has been spent on creating tools for anomaly detection with numeric data. But most data produced in the real world is not numbers—it is...
The Future of Modern Threat Hunting is Streaming Graph

The Future of Modern Threat Hunting is Streaming Graph

Towards a new model of threat hunting The continuous expansion of threat vectors and attack techniques requires a modern threat hunting architecture capable of large scale operations, real-time deep/complex event processing to identify Indicators of Behavior (IoB),...
Dynamic Duo: Quine & Novelty Detector for Insider Threats

Dynamic Duo: Quine & Novelty Detector for Insider Threats

Adding Quine to the Insider Threat Detection Proof of Concept A lot has changed since we first posted the Stop Insider Threats With Automated Behavioral Anomaly Detection blog post. Most significantly, thatDot released Quine, our streaming graph, as an open source...