iSight Partners, a company that specializes in computer security, has taken the next step in viral protection. The analysts from iSight “spend their day digging around the underground web, piecing together hackers' intentions, targets and techniques to provide their clients with information like warnings of imminent attacks and the latest tools and techniques being used to break into computer networks.” This company stands to protect United States military personnel from explosive detonations and other types of bombs in the field of battle.
The biggest loss of life in Iraq was not from Snipers or general combatants, but from concealed explosive devices. The goal of the company, when they increase in size is to prevent IEDs explosions and save lives of military and natives. These bombs often take the lives of innocent natives as collateral damage in hopes of killing American troops.
iSight separates themselves from normal online cyber-security organizations is that the iSight anticipates what enemies plan to do before they have their own plan set. These online securities only act after the fact of cyber-invasion or attack. The analysts from iSight are fluent over 21 languages and watch the creators of the bombs buy and assemble their bombs through underground cyber tools.
iSight did not invent cyber protection and analytics, therefore, they have numerous competitors. Their largest competitors come from banks. Banks hire former intelligence members to find suspicious activity, primarily identify fraud. This is such an important cause that the current chief executive officer of Bank of America said there is no cap to their cyber-security fund. It is critical for all people of society.
Business across all field have “been investing in ‘big data’ analytics tools that sound alarms anytime someone does something unusual.” The one problem with this is that these servers are constantly alarming because nearly all activity is being noted. “The average organization receives 16,937 alerts a week. Only 19% of these are deemed ‘reliable.’” The software needs more of a filter as far as what it takes in form information. That is the problem with “big data.”
A problem with this software is that they are wasting billions of dollars on alerts. A venture capitalist that invests in the company stated “they don’t have time. They need human, actionable threat intelligence.” They have great technology in their iSight software, but they need an intelligent human to sift through data in a more efficient way. The states for a future IPO may project success, but it’s the human being that makes the important call.
This field is growing rapidly, and iSight is leading the way. Gartner, a research firm, believes iSight will be used by “60% of businesses to incorporate threat intelligence into their defensive threat strategy” by 2018. The need for online security is underrated at the moment. The benefits of this can go way beyond just military use. Identity fraud and online theft can be prevented before a customer loses their assets.