Q1 Labs launches real-time social network tracking

Q1 Labs' new SIEM system brings real-time social network and application monitoring to the market.

Social Networking

Q1 Labs has launched a new security information and event management (SIEM) system, giving companies the ability to track employees' social network and multimedia use.

QRadar 7.0 is able to check anomalies in workers' use of applications to help detect any threats, as well as pick up on the kinds of information employees are making public in real-time.

Social network use can also be correlated with other access information. This allows administrators to check what sensitive databases have been accessed before the user has visited a social network, in case of any foul play or unwanted transmission of information onto the likes of Facebook or Twitter.

Another major feature of Q1 Labs' newest product is client-side vulnerability profiling, which identifies any potential threats on a network and then alerts when these are exposed.

Firms using QRadar 7.0 can also prioritise remediation steps based on the risk profile of each application.

On showing IT PRO the product in action, John Burnham, vice president of marketing for Q1 Labs, explained how the firm was delighted to have achieved an industry first in its social media and application monitoring, stressing the impact social networks have had on business.

"Social media is what the web was to enterprises in the mid-1990s," Burnham said.

The recent HP acquisition of ArcSight, along with the addition of this new product, will place Q1 Labs in a better position in the SIEM space, Burnham suggested.

"We were really pleased ArcSight was bought," he explained, adding that Q1 Labs is now the biggest independent firm in security intelligence.

As for whether Q1 Labs would ever be sold, Burnham stressed the company is "not for sale," although he expected to see other acquisitions in the space.

"Our goal is to become the Oracle of security intelligence," he added.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021
Weekly threat roundup: SAP, Windows 10, Chrome
vulnerability

Weekly threat roundup: SAP, Windows 10, Chrome

21 Jan 2021
Biden nominees highlight tough cyber security challenges
cyber security

Biden nominees highlight tough cyber security challenges

20 Jan 2021

Most Popular

SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021