Briefing Room on demand webinar on thatDot Youtube channel: The Unreasonable Effectiveness of Streaming Graph thatDot founder and CEO Ryan Wright discussed the power of thatDot Streaming Graph and Novelty to detect the most well-hidden threats with the Bloor Group's Eric Kavenagh and Mark Lynd, who was ranked #1 global thought leader in cybersecurity by Thinkers360. With high-profile data breaches hitting the headlines every other day now, the way we're doing this is clearly a losing battle....
Novelty
Novelty Demo
Novelty Tutorial https://youtu.be/JuvAjtTmLa8?feature=shared This 12 min video demonstration walks through a Jupyter notebook powered scenario illustrating how to use thatDot Novelty to analyze CDN logs for anomalous activity. Click here to download the CDN dataset for this example.Download the Jupyter notebook and try the demo yourself with an AWS instance of thatDot Novelty. Demo Summary Novelty Score Endpoints The demo interacts with thatDot Novelty through its interactive REST API. You...
Novelty Technology
Introduction: a New Approach to Anomaly Detection Anomaly detection is a technique for finding important data. Decades of research has been spent on creating tools for anomaly detection with numeric data. But most data produced in the real world is not numbers—it is user names, identifiers, log statements, email addresses, URLs, access credentials, service names, file paths, timestamps, IP addresses, API paths, and a seemingly endless list of valuable data that is not a number. Non-numeric...
The Future of Modern Threat Hunting is Streaming Graph
Standards-based threat detection & automated response using Quine streaming graph.
Dynamic Duo: Quine & Novelty Detector for Insider Threats
In a big update to the VAST Advanced Persistent Threat blog, we demonstrate an end-to-end Quine plus Novelty Detector workflow.
Network Log Analysis Using Categorical Anomaly Detection
The distributed nature of modern virtualized software architectures has created added complexity in the networking stack, making it difficult to attribute behavior to any single service.
Reducing False Positive Alerts With Contextual Anomaly Detection
Traditionally, monitoring alerts are produced comparing metrics against thresholds to identify behavior outside the norm.
Real-time Blockchain Monitoring is Hard without A Streaming Graph
As crypto currencies go mainstream, better techniques for protecting users from fraud are needed. Enter streaming graph.
AWS Names thatDot’s Novelty Detector As A Containers Anywhere Partner
Bringing cloud-based data management into the enterprise data center, where much enterprise data still lives, is now simpler than ever.
Stop Insider Threats With Automated Behavioral Anomaly Detection
Advanced: Finding a malicious employee is one of the toughest cyber-security challenges in the industry.
Data Exfiltration Detection in AWS CloudTrail Logs Using Categorical Data
This blog on AWS data exfiltration detection explains the use of categorical data in anomaly detection to identify multi-stage exploit campaigns in AWS CloudTrail logs.
The Known Security Challenge of the Unknown
Destructive attack campaigns succeed because they integrate new techniques or new hardcoded credentials to access and victimize their targets.
Find Stolen Credentials Use in AWS CloudTrail Logs using Quine Graph
The move to the cloud represents new challenges for enterprise security teams. Use thatDot Novelty Detector to detect the attack quickly.
New to Quine’s Novelty Detector: Visualizations and Enhancements
thatDot’s real-time Novelty Detector for categorical has updated its data exploration and data transformation capabilities.












