The demonolithization of #SIEM frees up space for a more composable architecture built on top of pipelines, fabrics, and lakes. #SecDataOps
Tenzir
Computer- und Netzwerksicherheit
Hamburg, Hamburg 1.630 Follower:innen
Open-source Security Data Pipelines
Info
At Tenzir, we're pioneering the future of open-source security operations with a revolutionary concept - SecDataOps. Our mission? To transform the foundational framework of cybersecurity operations. Our blueprint for this transformation is driven by an elegant philosophy - composable data flow pipelines. Anyone can easily create powerful pipelines by chaining together operators, similar to Unix pipes or Powershell commands, with the difference that our operators are specially designed for security data operations use cases. You can unify dataflows by combining pipelines and build intricate security stacks that connect to the whole universe of security and data tools. o Connect any security data technology with a few operators. o Collect, reshape, enrich and route any security data. o Drastically reduce SIEM, cloud and data costs by up to 80%. o Decouple the security data layer from detection and response. o Eliminate data wrangling and free up your security team to focus on what matters most - hunting threats. Discover more at https://tenzir.com Become a part of the community on Discord | https://discord.com/invite/xEyaRSMCPQ For more technical details, check out our documentation | https://vast.io/docs/about For inquiries, reach us at [email protected]. Stay connected: LinkedIn | https://www.linkedin.com/company/tenzir/ Twitter | https://twitter.com/tenzir_company Legalese: Legal Information: https://tenzir.com/legal-notice/ Privacy Policy: https://tenzir.com/privacy-statement/
- Website
-
https://tenzir.com
Externer Link zu Tenzir
- Branche
- Computer- und Netzwerksicherheit
- Größe
- 11–50 Beschäftigte
- Hauptsitz
- Hamburg, Hamburg
- Art
- Privatunternehmen
- Gegründet
- 2017
- Spezialgebiete
- security operations, security analytics, data engineering, threat detection, SIEM, secops, siem architecture und open-source security
Orte
-
Primär
Nagelsweg 41
Hamburg, Hamburg 20097, DE
Beschäftigte von Tenzir
Updates
-
Always wondered what a Security Data Fabric is? Cole Grolmus has a solid definition 👇. ✋ We'd just add one more feature that makes a #datafabric security: in addition to transporting and optimizing security telemetry, we need the ability to *act* on security telemetry. That is: 1. Enriching events with relevant context, in real-time and at scale 2. Matching with #threatintel and generating sightings, either live or retrospectively—we bundle this in a single operator: https://lnkd.in/eZQr7Kdr) 3. Executing detection rules on events, e.g., #SIGMA and #YARA All of these should be first-class supported to optimally support #SOC and D&R workflows beyond the basic data integration features.
I've written about the security data fabric market a couple times now, and one thing is clear: There's a lot of confusion about what a 'security data fabric' actually is. We need a clear set of core capabilities. Here's a summary of my definition for a security data fabric — roughly translated from Gartner's definition of the Data Fabric architecture with adaptations for cybersecurity use cases. → Integration and Connectivity The whole point of a security data fabric is to reduce the effort required to integrate and move security data. That means pre-built connectors for the hundreds of potential sources for logs and other data, both on-premise and cloud. If you (or a SI) has to build a bunch of custom integrations or model your own schema, it's probably not a *security* data fabric. Collecting data is required. Delivering data is technically optional (according to Gartner). It's not really optional for most security teams, especially those moving towards data lakes (Snowflake, Databricks, etc.) for their security use cases. → Data Handling Security data fabrics need to have their own data model to standardize, enrich, and reduce the volume of log data. For example, recognizing an endpoint or identity has been seen before and correlating events for it across different log sources. Security teams also need flexibility in the data model to support downstream systems. You want the security data fabric to support the destination's data model so you don't have to transform data yourself. → Security Data Observability and Governance A security data fabric has to come with data observability and governance built in. It's responsible for a company's most critical and sensitive security data. There can be no blind spots, missing data, or issues with sensitive data correction. → Reliability and Performance Security data fabrics move data from a lot of sources. Built-in fault tolerance, scaling, and high availability are foundational. You don't want to have yet another tool in the mix to monitor the health and performance of your security data integrations. → AI/ML Support Use of AI/ML for data structuring and enrichment is a core data fabric feature from Gartner, so we should expect this from security data fabrics too. An emerging use case is using AI to learn from the data streams and provide insights across data sources on the fly. --- By this definition, I'd say companies like DataBahn.ai have focused on building a complete product/platform. Other companies like Tenzir, Prevalent AI, Observo AI, and more have also built several of the capabilities that I have listed here. Now that we have a directional definition in place, I'll be working on a more detailed market map. Stay tuned.
-
-
🚀 We're thrilled about our successful participation in the AFCEA Bonn Exhibition 2024, where we showcased the innovative SOVEREIGN project with the #Cyberagentur. The #AI and #ZeroTrust SOVEREIGN platform integrates sensors and actuators to detect and counteract security breaches and complex cyber attacks early on. With decentralized data management and AI-supported attack detection, it provides dynamic risk assessment and autonomous countermeasures, including self-healing and reconfiguration capabilities via FPGAs. 🙏 Special thanks to our partners at Langlauf Security Automation GmbH, Prof. Mathias Fischer from the University of Hamburg, and Christine Skropke, the Cyber Security Director of AFCEA, for their involvement. We look forward to further collaboration and exciting advancements in #cybersecurity! Photo from left to right: 📸 - Dr. Julian L., Cyberagentur - Sofie Galleguillos, Cyberagentur - Prof. Mathias Fischer, University of Hamburg - Christine Skropke, Vorstand Cybersicherheit AFCEA - Johan Hesse, Tenzir GmbH - Jan Stijohann, Langlauf Security Automation GmbH - Jürgen Freudenberger, Cyberagentur
-
-
From UC Berkeley back to Germany, we're proud to contribute deep tech to the European ecosystem! 🇪🇺🇩🇪 In the photo, Tenzir's leadership 📸: Johan Hesse, Matthias Vallentin, Julia Vallentin
𝗧𝗲𝗻𝘇𝗶𝗿'𝘀 𝗝𝗼𝘂𝗿𝗻𝗲𝘆 𝗶𝗻 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 In the wake of a significant cyber-attack on the Hamburg University of Applied Sciences, the importance of robust cybersecurity has never been clearer. Tenzir, a Hamburg-based startup, is at the forefront of this battle. Tenzir provides innovative solutions to protect data infrastructures against inevitable cyber threats. With a strong research background from Berkeley University, Tenzir bridges the gap between data management and security. Tenzir was founded in Hamburg in 2017 by Matthias Vallentin. The company then needed a manager, who is familiar with administrative issues. Tenzir found the right support within its own ranks when Matthias brought his sister, the lawyer Julia Vallentin, on board the deep-tech company. Initially funded by the Hamburgische Investitions- und Förderbank (IFB Hamburg) and angel investors, Tenzir has grown into a professional enterprise with a focus on rapid scaling and innovation. 👉 Read more about their story: https://lnkd.in/ehnBmy9T #startupcityhamburg #StartedInHamburg #Cybersecurity #DataProtection photo © Tenzir
-
-
🌟 Farewell to an Outstanding Intern! 🌟 Today, we bid a bittersweet farewell to Bala Vinaithirthan from Stanford University. His contributions during his internship have been nothing short of amazing! 🤯 Curious about his journey? 👉 Check out Bala's reflection blog: https://lnkd.in/e9w6zwcj
An Intern's Reflection | Tenzir
docs.tenzir.com
-
SuriCon is always a highlight for us, as we pump a lot of Suricata data through our data pipelines and enjoy providing value to Suricata users. We are gladly sponsoring this event! 🫶
Attention! Returning Community Friend Sponsor, Tenzir, deserves all the hype and recognition! We want to thank you for supporting SuriCon each year and we can’t wait to meet up in Madrid! Like us, Tenzir supports the open source community providing tools for those to easily connect to open source security solutions like Suricata! You are an inspiration to us and we can’t tell you enough how thankful we are to have you backing #SuriCon2024! Learn more about Tenzir here: https://tenzir.com/ #SuriCon #Sponsors #Suricata #OISFoundation Open Information Security Foundation
-
-
👋 Meet our management team at #Infosec2024 in a London. Grab one of the few slots from the meeting calendar right now. 👇
In London next week? Come find us and book a meeting with Johan Hesse and me. We're eager to talk with you about the latest in #SecDataOps at Tenzir. 👉 https://lnkd.in/eUQPxArW #Infosec2024 #Infosecurity
-
-
If you're at Infosecurity Europe (Jun 4–6), use the opportunity to meet our leadership in person. 👇
In London next week? Come find us and book a meeting with Johan Hesse and me. We're eager to talk with you about the latest in #SecDataOps at Tenzir. 👉 https://lnkd.in/eUQPxArW #Infosec2024 #Infosecurity
-
-
Want to stay ahead of the curve in #SecDataOps? The first installment of our SecDataOps newsletter goes out this Friday! Topics that will be covered over the next months: ✅ Building a decentralized #SecurityDataFabric ✅ Creating a centralized #SecurityDataLake ✅ Architecting your SOC for the disaggregation of #SIEM ✅ Saving SIEM, cloud, and data costs with security #ETL ✅ Practical #SecOps use cases, like contextualization, operationalizing threat intel, and executing detections 🗞️ Subscribe here: https://lnkd.in/ecnTYM9E
-