The cyber-attack surface is defined by machine data that is constantly generated from above the proxy global data, and data from below the proxy network, and existing security appliances. “@RISK fuses this data using technologies such as Spark®, BigInsights™, IBM Connections and Watson™” said Stan Blanton, VP and CTO of @RISK Technologies. “@RISK leverages IBM Security technology and enhances best-in-class security appliances with cognitive computing to surface the often unforeseen, hidden and unknown. @RISKs isolates interdisciplinary relationships to yield discovery and enable organizations to measure the effectiveness of their existing cyber security posture.
Together, @RISK Technologies, Inc. and IBM can help companies protect their most sensitive assets and secure their future success.