SenSage Opens Security Data To Off-The-Shelf Business Intelligence Tools
Enterprises can use BI to help navigate and analyze logs and events, company says
Security information and event management (SIEM) software vendor SenSage today said it will enable enterprises to use mainstream business intelligence (BI) tools to analyze security data.
SenSage 4.6 is the first SIEM product that supports Open Database Connectivity/Java Database Connectivity (ODBC/JDBC) application programming interfaces, the company says.
The idea is to enable companies to use the BI tools and expertise they already have to mine the boatloads of security information they collect from hardware, software, and security systems around the network.
"We're seeing companies develop a greater appetite for data mining in security," says Joe Gottlieb, CEO of SenSage. "They want to be able to ask any question and get a quick result. They want to build executive dashboards that help improve measurement of security operations. They want to be able to run algorithms against security data to do predictive analytics."
Using ODBC and JDBC, business intelligence tools such as Pentaho will be able to mine security data and use mainstream data analysis methods and processes to help identify potential vulnerabilities and develop more effective defenses, SenSage says.
SenSage 4.6 also can also accept alerts from third-party systems and network management products, like IBM Tivoli and HP OpenView, using both SNMP and proprietary protocols. A new analytics installer and log adapters will make it easier for enterprises to harvest log data to create new views of security data as well as source-specific reports.
Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024