EclecticIQ: Understanding Cyber Threat Intelligence with Graph Visualization

  • Cyber security start-up, EclecticIQ, builds a pioneering threat intelligence platform with KeyLines toolkit.
  • Application bootstraps cyber intelligence activity by empowering the analyst to understand and prioritize complex, disparate threat data.

What is the EclecticIQ mission?

EclecticIQ’s mission is to ‘restore the balance in the fight against cyber adversaries’. Their platform empowers cyber analysts to collate and analyze cyber threat intelligence as a graph, helping them to understand risks and respond accordingly.

In 2015, EclecticIQ used the KeyLines network visualization toolkit to build an interactive graph visualization that sits at the heart of their platform.

The Problem

Governments and large enterprises face the increasingly complex task of keeping critical infrastructure secure. To manage this, large teams of cyber analysts are employed to continuously survey the threat landscape and proactively adjust their cyber defenses accordingly.

Internal data is combined with shared cyber threat intelligence, providing analysts with a huge potential source of insight. The scale and complexity of this information, however, is daunting.

Analysts are required to search for unknown threats in data from many different sources in multiple different formats. Unraveling and prioritizing threats in this scenario is time-consuming and labor intensive.

Using graph visualization to unravel unknown cyber threats

EclecticIQ identified graph visualization as a method to help cyber analysts overcome the scale and complexity challenges of threat intelligence.

As Raymon van der Velde, Co-Founder & VP Product at EclecticIQ, explains:

“Cyber threat intelligence can be anything from a list of IP addresses in an Excel file to a PDF to file hashes, and anything in between. What ties it all together is that this data is big, complex and varied. […] A KeyLines graph visualization is the ideal way to present information of this scale, complexity and variety in a way that’s easy for a user to manage.”

Cyber threat data is complex. Finding an intuitive and effective way to communicate it is key.

Want to see the EclecticIQ platform in action?

Watch our webinar, co-presented with the EclecticIQ team.

Smarter cyber threat intelligence

The Requirements

EclecticIQ first approached Cambridge Intelligence in May 2015, quickly starting an evaluation of the KeyLines toolkit.

They had several specific requirements:

  • Browser based: the graph component needed to fit EclecticIQ’s SaaS model and offer excellent cross-browser compatibility.
  • Scalability: EclecticIQ can scale from a single VM to multiple servers. The graph visualization – and any commercial arrangements – needed to support this.
  • Database flexibility: any solution required enough flexibility to accommodate the platform’s back-end architecture, which combines an object-relational database with a graph database, connected with the Blueprints interface.
  • Visual customization: specific visual requirements included the ability to customize node, link and chart appearance.
  • Functionality: visual analysis methods were required to enhance the analysis performed on the back-end, for example effective graph layouts and KeyLines’ time bar component.
  • Chart serialization and load: to support a ‘Workspace’ system for saving and collaborating on specific charts.

EclecticIQ Threat Intelligence Visualization with the KeyLines SDK

As a start-up, EclecticIQ was keen to maximize their development resources and release the highest quality product to the market as early as possible. KeyLines, as a software development kit (SDK) enabled them to rapidly build a custom solution without diverting all resources away from other aspects of the application.

The Result

By October 2015, the application was ready to be deployed to beta customers, with excellent feedback.

KeyLines has been used to provide interactive means of connecting and exploring very complex data. Functionality has been carefully selected to enhance the analysts’ own capabilities and guide them towards an action. Raymon van der Velde explains the importance of getting this right:

“These cyber analysts are working with the unknowns, and the unknown unknowns.

Only humans are equipped with the analytical and creative skills required to make sense of this information. We can harness the human brain’s pattern recognition capability, but we need to first find a way of interacting with the data.

KeyLines offers that: it gives analysts a way to ‘walk’ the graph. It empowers them to make sense of the data, and it does it in a very efficient way.”

EclecticIQ made use of the KeyLines time bar to help analysts understand the temporal dimension of their data.
When speaking about his experience of working with Cambridge Intelligence, Raymon van der Velde summarized:

“Whenever you work with a technology, there are two very important aspects: first is the quality of the product, second is the support. With KeyLines, both of those have been excellent.

The product is superb and our engineers have found the support to be very flexible and responsive. The experience has been top notch.”

Search results generated by the EclecticIQ platform during cyber threat investigation. Graph visualization is provided by the KeyLines toolkit

Graph Visualization Solutions for Enterprise Platforms

Discover the power of graph visualization solutions for your enterprise platforms and unlock the potential of your data, just like EclecticIQ and others have already. Our software development toolkits provide interactive visual representations of complex relationships, so your team can easily analyze patterns and derive insights that drive strategic decisions.

If you need data visualization solution for your product, now’s a great time to start the conversation. Request a free trial today.

A screen showing a hybrid graph and timeline visualization created using ReGraph and KronoGraph
FREE: Start your trial today

Visualize your data! Request full access to our SDKs, demos and live-coding playgrounds.

TRY OUR TOOLKITS

How can we help you?

Request trial

Ready to start?

Request a free trial

Learn more

Want to learn more?

Read our white papers

“case

Looking for success stories?

Browse our case studies

Registered in England and Wales with Company Number 07625370 | VAT Number 113 1740 61
6-8 Hills Road, Cambridge, CB2 1JP. All material © Cambridge Intelligence 2024.
Read our Privacy Policy.