Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Bay Dynamics Launches Risk Fabric Portal to Identify Threat Patterns

Bay Dynamics, a provider of information risk intelligence solutions, today launched a new portal designed to help customers identify threat patterns, trends and behaviors based on deviations from normal user activities.

Bay Dynamics, a provider of information risk intelligence solutions, today launched a new portal designed to help customers identify threat patterns, trends and behaviors based on deviations from normal user activities.

Called the Risk Fabric Remediation Portal, the feature is a component of the company’s user and information oriented analytics platform, and helps organizations search out the root cause of an incident and take action to avert threats and prevent security events from recurring.

The Remediation Portal is able to work with large data sets and can take automated actions or provide guidance for remediating these threats, the company said.

“Today, organizations are drowning under their big data initiatives, lacking the ability to effectively filter and analyze the information in a timely manner to support their protection efforts,” said Feris Rifai, CEO of Bay Dynamics. “With the Risk Fabric Remediation Portal, we are putting all of this information through a user-centric lens for greater clarity and context. This unique approach elevates security incident and event remediation to focus on dealing with patterns, trends, and behaviors.”

The Risk Fabric Remediation Portal enables technical staff to conduct forensic analysis, remediate security events, and accelerate incident response. Additionally, it helps customers identify broken processes and accept or reject the risks associated with the handling of their own data. The platform also helps CIOs and CISOs better understand the effectiveness and implications of broader protection efforts.

According to San Francisco, California-based Bay Dynamics, the solution can leverage machine learning and behavior analysis capabilities to maintain intelligence about problems and proper categorizing, prioritization, and resolution.

Additionally, it automatically enriches and adds to the basic security event data generated by network and endpoint tools, adding the relevant context (for example: users, accounts, account attributes, machines and machine attributes) to detect threats, including organized or collusive activities.

Pricing for the solution is based on the number of employees and starts at $10 per employee.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...