SAP to power ThreatConnect threat intelligence system

The product will improve response time and provide more in-depth insights for better protection

security button on keyboard

ThreatConnect's ecurity analysis platform is now powered by SAP HANA, providing better insights and faster response times for organisations.

SAP HANA allows data to be collected and analysed, sending actionable insights to team members who can then act upon the information to ensure they are suitably protected against threats.

ThreatConnect said the move reflects a shift in the security market, which now relies upon a single platform for intelligence-driven defence. By pooling resources and threat intelligence from a number of sources, ThreatConnect enables organisations to make the most of the insights they extract from their security investments, it claimed.

Advertisement - Article continues below

"All organisations share several similar and critical cybersecurity challenges," said ThreatConnect CEO Adam Vincent.

"With the latest iteration of our platform, built on SAP HANA, SOC teams can considerably increase computing speed and analytic performance.

He added: "Couple that with simplifying their technology stack and noticeably reducing multiple layers of hardware as well as software complexity and the results are a team that is efficient and effective in reducing threats to an organisation."

ThreatConnect powered by SAP HANA supports the ingestion of structured, unstructured and streaming data, ensuring all inputs are analysed equally, providing insight for decision makers in almost real time.

Advertisement
Advertisement - Article continues below

Faster response times mean threats can be countered or avoided more quickly, enabling better overall security management.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020