SAP to power ThreatConnect threat intelligence system

The product will improve response time and provide more in-depth insights for better protection

security button on keyboard

ThreatConnect's ecurity analysis platform is now powered by SAP HANA, providing better insights and faster response times for organisations.

SAP HANA allows data to be collected and analysed, sending actionable insights to team members who can then act upon the information to ensure they are suitably protected against threats.

ThreatConnect said the move reflects a shift in the security market, which now relies upon a single platform for intelligence-driven defence. By pooling resources and threat intelligence from a number of sources, ThreatConnect enables organisations to make the most of the insights they extract from their security investments, it claimed.

"All organisations share several similar and critical cybersecurity challenges," said ThreatConnect CEO Adam Vincent.

Advertisement
Advertisement - Article continues below

"With the latest iteration of our platform, built on SAP HANA, SOC teams can considerably increase computing speed and analytic performance.

He added: "Couple that with simplifying their technology stack and noticeably reducing multiple layers of hardware as well as software complexity and the results are a team that is efficient and effective in reducing threats to an organisation."

ThreatConnect powered by SAP HANA supports the ingestion of structured, unstructured and streaming data, ensuring all inputs are analysed equally, providing insight for decision makers in almost real time.

Faster response times mean threats can be countered or avoided more quickly, enabling better overall security management.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/security/cyber-security/354246/millions-of-text-messages-leaked-through-exposed-truedialog-server
cyber security

Millions of text messages leaked through exposed TrueDialog server

2 Dec 2019