Market-leading security data platform also introduces an open data analytics cloud and automated SOC workflow enhancements
Devo Technology, the security data analytics company, is launching data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements, offering security teams data control, cost optimizations, and efficient automation.
Security teams are grappling with the vast amounts of data they need to manage and analyze, as many traditional SIEMs do not cost-efficiently ingest data from any source. With the launch of Devoโs new data orchestration and data analytics cloud, organizations arenโt forced to omit data sources because itโs too expensive. Devoโs SOC workflow enhancements also enable analysts to easily act on that data with AI-driven automation for precise threat detection and incident response.
Also Read:ย Top 10 Test Data Management Tools for Clean and Secure Data
โNo organization should have to forgo security because of high vendor costs that balloon with scale,โ said Rakesh Nair, SVP of product and engineering at Devo. โWhile there have been many changes in the SIEM market, weโve remained unwaveringly focused on enabling our customers to maintain control while providing them with the flexibility they need to meet their unique SOC needs. Built on the principles of agnostic data support, we empower security teams to analyze and actโfast.โ
Devo integrates data orchestration into the ingest pipeline for cost efficiency
Devo Data Orchestrationย gives companies total control of their data so they can manage and analyze it from any sourceโat scale and on their terms. It filters and routes data to destinations such as Amazon S3, Databricks, Snowflake, and others to ensure the most valuable data is available for real-time analytics and alerting, while optimizing where less valuable data is stored. This gives enterprises and managed security service providers (MSSPs) the flexibility to manage costs while scaling to meet growing data volumes.
โThe exponential expansion of the attack surface is leading many security teams to make hard decisions about what data sources they do and donโt ingest. However, this can introduce blind spots, leaving them vulnerable to cyberattacks,โ said Michelle Abraham, research director, security and trust, IDC. โHaving data orchestration capabilities embedded directly within a SIEM is very attractive, as many organizations seek this functionality to reduce data costs while continuing to scale.โ
Devo introduces an open data analytics cloud to give organizations control
With the increase in data sources, organizations need flexible solutions that enable them to control and customize as needed.ย Devo Data Analytics Cloudย orchestrates and ingests petabytes of structured and unstructured data from any source or data lake. It also enables security teams and MSSPs to build custom security applications and integrations. Organizations can also use Devoโs pre-built alerts, applications, and dashboards to get started fast.
Devo automates the most time-intensive SOC workflows to improve analyst experience
SOC teams need solutions that enable them to work more efficiently and make decisions faster. Building on the launch ofย Devo DeepTrace, which made Devo the only SIEM with attack-tracing AI, Devo continues to embed AI throughout the SOC workflow, giving security teams the right context to act quicklyโand confidently.
Also Read:ย Intelโs Lunar Lake Processors: Arriving Q3 2024
- Devo ThreatLinkโขย offers centralized, automated case management to help security teams track and collaborate on security incidents and alerts. It automates alert triage by correlating and enriching alerts into high-fidelity cases, reducing analyst workload from thousands of alerts to tens of cases per day. Comprehensive reporting offers valuable insights into SOC performance, enabling data-driven operations and demonstrating value to stakeholders. Devo ThreatLink helps analysts prioritize threats, investigate efficiently, and take decisive action.
- Devo Behavior Analyticsย is a UEBA solution that uncovers anomalous activity across users, devices, and domains within multi-petabyte datasets. It now delivers enhanced threat detection with tunable risk-based alerting, instantaneous anomaly flagging through a new streaming architecture, and targeted monitoring of high-risk assets combined with noise reduction via flexible whitelisting capabilities. Analysts can easily prioritize high-risk threats with Behavior Analyticsโ entity risk context within Devo ThreatLink.
โSince deploying Devo ThreatLink, our security team has seen a significant reduction in irrelevant alerts, enabling them to focus their time and energy on the threats that matter,โ said Duane Hopkins, head of global cybersecurity at Carhartt. โThe team can collaborate more easily and efficiently, greatly improving our ability to investigate and respond to incidents. Itโs critical for us to continue to scale our security operations, and solutions like Devoโs enable us to do that by accelerating alert triage so our analysts donโt waste time and instead focus on true threats.โ
Also Read:ย The Evolution of Private Cloud: Addressing Modern Enterprise Needs
[To share your insights with us as part of editorial or sponsored content, please write toย psen@itechseries.com]

