Security Threat Analysis Via Twitter - Dataminr Profile

Author: Brian Karas, Published on Apr 10, 2017

Increasingly, large enterprises are using Twitter's datastream as a source of threat intelligence.

While Twitter is filled with the noise of celebrity fashion trends, bot-spam and shameless marketing promos, it also regularly has people breaking news or sharing real time information about critical events. One company, Dataminr claims to be able to analyze Twitter's 'firehose', spotting emerging threats and other trends.

In this reportm we profile Dataminr and their Twitter analysis service, including how it can be used by those looking for a threat intelligence service.

************, ***** *********** *** ***** *******'* ********** ** * ****** of ****** ************.

***** ******* ** ****** **** *** ***** ** ********* ******* trends, ***-**** *** ********* ********* ******, ** **** ********* *** people ******** **** ** ******* **** **** *********** ***** ******** events. *** *******,************** ** ** **** ** ******* *******'* '********', ******** ******** threats *** ***** ******.

** **** ******* ** ******* ******** *** ***** ******* ******** service, ********* *** ** *** ** **** ** ***** ******* for * ****** ************ *******.

[***************]

Dataminr ********

***** ** *** ****, *** ******* ** ****, ******** *** raised ~$**** ** ******* ******* ** "******* ***** **** ****** ***** *** ******* ** *** ******* and ********** *******". ******** ** *** ** *** ********* **** have ****** ** *******'* '********', *** **** ********** ** *** public ******, ***** **** ******* ***** ********** *** ******* ********* internally ** ******* ** ******* *** ********** ****** ** **** trends *** ******* **** ***** ******* **** ********.

******** ******* *** ********* ********* ************, **************, ***** ********** *******, and **** ************* ******* *** ***** ************ ** ******** ******. The ******* *** **** ***** **** ** ***** *** *** it (** *******) *** ********* ****** ** *** *******, **** as ******* ***'* ****** *** *******.

*** ********* ***** ***** * ****-***** ******** ** *** ******** turns ****** ***** ** ********* **** ** *****:

Product ********

******** ******** * *********-***** *********. ***** *** *** ******** ****** and ****** ******** ** ***** ******** ********,********'* **** ***** ****** **** ** ********* *********, ********* ********* security. ************, ****** ***** *** ** ******* ** *** ****** on ******** ******** ** ****** ** ********, ***** **** ********* and **** ** **** *** ***** ****** *** ***********:

Twitter-Centric **** ******

********* ** ********, ******* ** *** ******* ****** ** ****** media *********** *******, *** ******* *********** ****** ** ***** ******** is ***** *****-****** ** ******* ** ****. *** ******* **** up ** **% ** *** **** ** ******** **** ******* is ******** *****-***** ** *********** **** ***** *******. ******* ****** directly, ** *****-******, ****** *********** **** ** ** ******* **** Dataminr **** *** *** * *********** ** ******* ******* ******** on ***** ******** ** **** ****.

*******

******* ****** ** ~$***/**. *** ** ********** **** **** ******, primarily ********** ** ** ************'* **** *** *******, *** ** metrics **** ****** ** ***** ** ******. ***** ************* ******* to ******* ****** ******** ******* **** ********* *** $*,***+/**.

No ****** ******** ************

****** ** ****** ************ ** ******** ********* ***** ****** ********, alerts *** ** ***** ** ** **** *** ***** ** other *****, ***** **** ****-***** ********* *** *** ** ******* an *****.

Compared ** **** ******* ************

******* *****, ** ****-**** *********, *** ********* ** *********** **** from ******* ** ***** ****** ***** ******** ******** **** ***** platforms. ***** ********* *** ********* ************* ** ******* ****** ** a ***-******* ****, ** ********** ********** ****** *****, **** ****** to ** ***** ** "******" ******* *** ****-**** *********** ** threat ******, ***** ** *** ** ********'* *** ***** ************. In ********, *** ** ********'* ****** ** ******** **** "********" feed, *********** ***/**** ************ *** *** **** ****** ** *** the ****** **** ******** ****, ****** *** **** ******** ********** access **** ** ***** ******, ** ***** ** *** ***********, may ** **********.

Security *** *****

* ******** ************ ***** ** **** ********** ** ************* **** assets ******** ***** *****, ** ** ****-**** *********. ****** ***** be ****** ******* **** *********, ** ****** ******** ****** **** cell ******, ********** *********** ** *** *****. *** **** **** areas, ******** *** ******* ****** ** ******** ******* ** *** area, **** ** ********* ** ********* ********. ***** ********* ** these ****** *** **** ************* **** **** ** ***** ** secure ********* ** ***** ********* ** *** **** ** ********.

Comments (1)

* ******* ** ***** ***** ** *** **** *** *** impressed **** *** ******* ** ***** **** ****** - **** I ****** ****'* ********** *** ****** ** *** ** ****** on *** *** **** ****'* ********* *** *****. * ***** if * ***** ******* ***** ******* ** * ******* *** they ****'* **** **** *********. * ***** **** ***** **** it ** **** ***** ***** ********* ** *** *** ******* that ***** ** ******** ** **** **** ** ******* ** JSON ****** **** * ***** ******* ** ******* ** ** active ****** ** * ****. * ***'* **** (*** ** I ****) ******* ******* ****** / *********** ****** **** ***** job ** ********** **********. ***** ****, **** **************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Profile

ZKAccess Control Tested on Dec 04, 2017
China manufacturer ZKTeco / ZKAcces has been expanding in the West, offering a low-cost access control platform. But how good is it? And how does...
ZoneMinder Open Source Profile on Nov 06, 2017
The first, oldest and probably the best known open source VMS is ZoneMinder. But where has it gone and is it still relevant today in a world of...
Startup Turing Video Segway-Based Security Robot Profile on Sep 13, 2017
If security robots can not replace guards, perhaps the next best thing is a robot the guard can actually ride.  Turing Video has raised $5...
Deep Learning Startup DNNCam Wants Your Custom Analytics Jobs on Sep 07, 2017
Analytics manufacturers frequently turn away custom video analytics requests, as they can be challenging and costly to tackle. A recent...
CNL PSIM Profile on Sep 06, 2017
CNL has been one of the strongest advocates for PSIM, as one of the earliest entrants into the market releasing their command and control software...
Dahua and Hikvision Entering Access Control on Sep 05, 2017
Until now, Chinese video giants Hikvision and Dahua have held back releasing access internationally. Both companies have now pulled the trigger,...
Neurala Deep Learning Platform Profile on Aug 31, 2017
Find lost children? If Neurala has its way with its recent partnership with Motorola, that is the aim as shown in their video below: Neurala has...
IP Camera Specification / RFP Guide 2017 on Aug 14, 2017
RFPs are hard. Do them 'right' and it takes a lot of knowledge and time. Do them 'wrong' and you can be (a) unwittingly locked into a specific...
ONVIF Releases Profile A for Access on Aug 08, 2017
ONVIF has struggled so far in access control. In 2014, ONVIF released Profile C for access control, but in the 3 years since, only 2 companies...
March Networks Company Profile on Jul 17, 2017
March Networks was one of the most well-known video surveillance manufacturers of the 2000s. In 2012, March was acquired by Chinese / American...

Most Recent Industry Reports

Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
Hiring Camera Calculator Product Manager on Dec 12, 2017
We are working on making the Camera Calculator even better and hoping you can help us find the right person to join our team. IPVM is hiring a...
Testing $20 WyzeCam, The Money Losing Amazon Vet Startup on Dec 12, 2017
This startup is perfecting the old adage: We lose money on every sale, but make it up on volume But it is no joke. The company, Wyze Labs, is...
Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks on Dec 12, 2017
The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by...
Robot Vandalism on Dec 11, 2017
Vandalism of security systems is a common concern. It is so common that camera vandalism statistics show that designers routinely sacrifice camera...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
2018 Video Surveillance Cameras Overview on Dec 11, 2017
This report concisely explains the developments for surveillance cameras offered in 2017 and the state of offerings going into 2018, including...
Imperial Capital Security Investor Conference Review on Dec 08, 2017
Investment bank Imperial Capital holds an annual Security Investor Conference where 60+ companies present, including this year: IPVM bought a...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact