The name of the base system (platform): | Jet inView |
Developers: | Jet Infosystems |
Date of the premiere of the system: | April, 2013 |
Last Release Date: | November, 2014 |
Technology: | Cybersecurity - A fraud detection system (fraud), cybersecurity - Information management and events in a security system (SIEM) |
In April, 2013 the company announced an exit of Jet inView Security. By software it is based on BI technologies and allows to accumulate and analyze information from different security subsystems and business systems with the subsequent conversion and giving in the form of analytical panels of the different abstraction layer. Its emergence became the answer to the existing requirements of the Russian companies for raznourovnevy cybersecurity analytics and involvement in security not only technical divisions, but also business. Jet inView Security will become the key tool when implementing projects on creation of monitoring systems of efficiency of cybersecurity.
Jet inView Security, combining functionality of Business Intelligence and Data Mining, provides accumulation and information analysis from different security subsystems and business systems with the subsequent its conversion and giving in the form of analytical panels of the different detail level.
The architecture of Jet inView Security is based on three function levels:
- data concentration about security. The special connectors providing communication with the systems of providing Information Security, business systems, the auxiliary systems are developed for effective collection of information from the most different sources (for example, personnel). In each specific project their structure can vary depending on infrastructure of the customer and his requirements;
- analysis and data translation. The analytical engine based on BI technologies allows to connect among themselves different data, to carry out necessary calculations and correlation;
- information representation using visualization modules – analytical panels. Their number includes Dashboard'Y containing high-level information, and the module Analytics connecting databases of all means of protecting and which is carrying out on them end-to-end analytics. The developed interface allows to interpret and provide the obtained analytical data in a necessary form, and the Drill Down function does possible to analyze information on the principle "from the general to the particular" (and vice versa).
More than 30 connectors which are expected connection of the most popular technologies in the market of cybersecurity are developed (SIEM DLP security scanners, etc.). Roadmap Jet inView Security assumes building of number of the connected data sources taking into account the changing business needs and IT technologies.
Modular approach allows to provide the high level of flexibility of a product which easily is customized and adapts according to individual needs of each customer. Besides, there is possible a step-by-step transfer to operation of fully functioning system elements in process of connection of data sources. Thanks to it the customer already at a stage of implementation gets experience with a system and fixes return from its use. Thus, terms of system deployment and achievement of the level of maximum efficiency by it are actually reduced.
"Use of Jet inView Security will allow not only to carry out deep analytics, but also to visually represent its results taking into account needs of employees of different level. For example, security service specialists will be able quickly to obtain up-to-date information that there is in processes a cybersecurity what data provide the systems of providing Information Security what between them there are causes and effect relationships, – Anna Kostina, the head of safety management systems of Information Security Center of Jet Infosystems company comments. – The head of department of cybersecurity, using a system, will gain an impression about the overall level of security even in the conditions of geographically distributed structure of the organization. And top management, in turn, will be able to keep track of high-level dynamics of security of the company and business processes in general".
Jet inView Security is a key part of an ecosystem of security of Jet inView which already includes Jet inView Identity Manager and services delivered to Jet Security Operations Center, providing integration of all products based on one platform of management and a single system of visualization of analytical information.
2014: Jet inView Security (JiVS) 1.5
The Jet Infosystems company released the updated analytical Jet inView Security (JiVS) system of version 1.5 in December, 2014. The release had enhanced capabilities for automation of the analysis and assessment of cybersecurity risks, control of interrelations and process performance of providing Information Security, their business impact, investigation of incidents and profiling of activity of users in terms of cybersecurity.
"The basic functionality of an analytical system is expanded in four the directions, most relevant for the domestic companies, today. It includes the centralized cybersecurity analytics, determination of actual level of security of business systems taking into account relevant threats, behavioural job analysis of systems and users and also assessment of effectiveness and process performance and division now", – Kostina Anna, the head of safety management systems of Information Security Center of Jet Infosystems company tells.
In JiVS 1.5 the KPI directory of processes of providing Information Security containing a set of standard performance indicators and allowing to estimate automatically each process according to the data obtained from the connected information security tools is configured. On their basis more high-level indicators necessary for business form. Also analytical system allows to build interrelation between IT infrastructure objects, applications, business processes and to estimate criticality of a specific event or incident of cybersecurity for this or that business process.
The functionality of the centralized monitoring of the distributed territorial platforms – an analytical core for the situational centers – implemented in JiVS 1.5, allows to book full audit of a status of cybersecurity and work of processes of cybersecurity in the geographically distributed organization, with a possibility of a binding to cards and time zones.
Also new release of a product has tools for monitoring of behavioural anomalies of employees (deviations from a standard profile of work) in terms of cybersecurity that allows to monitor fluctuations of loyalty of employees, to reduce risk of incidents of cybersecurity, information leak, to accumulate statistics, necessary for investigation of incidents of cybersecurity. The configured sheaf between the data obtained from the available means of protecting, and an organization structure of the company reveals system deviations in providing Information Security, imperceptible at the level of technical data.
The data provided in JiVS by means of protecting of one class regardless of the producer uniformly are visualized that considerably simplifies work of the cybersecurity analyst, accelerates reporting and decision making at the IB tactical level. The updated dashboard'y Jet inView Security allow to estimate shared state of cybersecurity at specific timepoint and also show data at the level of accomplishment of the defined points of separate cybersecurity processes.
"Roadmap of a product includes, first of all, development of additional connectors and basic analytical models for new cybersecurity solutions and the adjacent systems – monitoring of IT, personnel, etc. and also expansion of number of the analytical cases solved using Jet inView Security. And in this case we are guided by best practice and relevant tasks of our clients", – Anna Kostina comments.