Blog > Use Cases > Cybersecurity

Logtrust: Democratizing real time big data

Logtrust: Democratizing real time big data

Marketing Director
21st February, 2017 | 5 min read

We’ll explore how Logtrust empowers analysts to harness the connections in their big data, with the help of...

Anomaly detection in cyber security visualizations

Anomaly detection in cyber security visualizations

Marketing Director
6th April, 2016 | 4 min read

There are lots of ways for a cyber security analyst to look at their data – as tables, bar charts, line...

EclecticIQ: Understanding Cyber Threat Intel as a Graph

EclecticIQ: Understanding Cyber Threat Intel as a Graph

Marketing Director
13th January, 2016 | 4 min read

Learn how cyber security start-up, EclecticIQ, launched a pioneering threat intelligence platform including a...

Graphs & cyber security intelligence with ElecticIQ

Graphs & cyber security intelligence with ElecticIQ

Marketing Director
13th January, 2016 | 5 min read

Cyber intelligence data is big, complex and varied. Graph visualization is fast becoming a ‘must-have’...

Cyber hijacking: Detecting BGP spoofs with KeyLines

Cyber hijacking: Detecting BGP spoofs with KeyLines

Intern - Software Development
6th October, 2015 | 4 min read

Maintaining the integrity of cyberinfrastructure and understanding network vulnerabilities is a critical task for...

CyberFlow: Securing the Internet of Things

CyberFlow: Securing the Internet of Things

Marketing Director
16th December, 2014 | 4 min read

Highlights KeyLines integrated into award-winning cyber security analytics solution Designed to visualize...

Registered in England and Wales with Company Number 07625370 | VAT Number 113 1740 61
6-8 Hills Road, Cambridge, CB2 1JP. All material © Cambridge Intelligence 2022.
Read our Privacy Policy.