The Data Blog
Our engineers have recently created a script that will inject synthetic data that simulates ADAMS data into a file format that can be consumed by commercial network traffic generators. ADAMS data is simulated data for insider threat detection systems based on anomalies in massive data-sets. Data domains include Logon, Device, HTTP, Email, File, Print, LDAP, Organization Directory, Decoy files, and Psychometric files. Why all of the excitement? The current state of the art network traffic generation tools are using very simplistic content that are not designed for the system under test. Once this integration is complete, cyber security testing can be taken to a while new level where sophisticated threat patterns are interwoven into data and consumed by the network. This will enable sophisticated testing of the network's intrusion detection and measurement of true and false positive errors, so these systems can be optimized for cost and risk performance. This alone is a huge leap in the cyber security industry, and we will only continue to move forward with our advancements in the world of technology.
We're excited to announce that we at ExactData have updated our digital footprint by creating social media pages! Keep up with the company, industry, and technology world by following us and looking out for fresh new content!
Like us on Facebook: https://www.facebook.com/ExactDataLLC/
Subscribe to our Channel: https://www.youtube.com/channel/UC_--LOCAtaZvyvDS3d0j82A
Follow us on LinkedIn: https://www.linkedin.com/company/exactdata-llc/
Follow us on Twitter: https://twitter.com/data_exact
Follow us on Instagram: https://www.instagram.com/data_exact/
With the expansion of our social media outreach, we'll have more ways to keep you updated on our progress and how we can help you with our data. Definitely check us out and keep up with us, you won't want to miss anything!
High interest helping to implement Cyber Behavioral Tools was expressed by many potential clients, including the Cyber Innovation Manager from one of the world's largest banks, a Divisional Chief Information Security Officer for one of the biggest US Federal Systems Integrator's and one of the largest Cyber Independent Testing Laboratories. During the demonstrations large amounts of internally consistent data was generated for all desired behaviors. Data was generated over any time-frame to output: