Security Threat Analysis Via Twitter - Dataminr Profile

Author: Brian Karas, Published on Apr 10, 2017

Increasingly, large enterprises are using Twitter's datastream as a source of threat intelligence.

While Twitter is filled with the noise of celebrity fashion trends, bot-spam and shameless marketing promos, it also regularly has people breaking news or sharing real time information about critical events. One company, Dataminr claims to be able to analyze Twitter's 'firehose', spotting emerging threats and other trends.

In this reportm we profile Dataminr and their Twitter analysis service, including how it can be used by those looking for a threat intelligence service.

************, ***** *********** *** ***** *******'* ********** ** * ****** of ****** ************.

***** ******* ** ****** **** *** ***** ** ********* ******* trends, ***-**** *** ********* ********* ******, ** **** ********* *** people ******** **** ** ******* **** **** *********** ***** ******** events. *** *******,************** ** ** **** ** ******* *******'* '********', ******** ******** threats *** ***** ******.

** **** ******* ** ******* ******** *** ***** ******* ******** service, ********* *** ** *** ** **** ** ***** ******* for * ****** ************ *******.

[***************]

Dataminr ********

***** ** *** ****, *** ******* ** ****, ******** *** raised ~$**** ** ******* ******* ** "******* ***** **** ****** ***** *** ******* ** *** ******* and ********** *******". ******** ** *** ** *** ********* **** have ****** ** *******'* '********', *** **** ********** ** *** public ******, ***** **** ******* ***** ********** *** ******* ********* internally ** ******* ** ******* *** ********** ****** ** **** trends *** ******* **** ***** ******* **** ********.

******** ******* *** ********* ********* ************, **************, ***** ********** *******, and **** ************* ******* *** ***** ************ ** ******** ******. The ******* *** **** ***** **** ** ***** *** *** it (** *******) *** ********* ****** ** *** *******, **** as ******* ***'* ****** *** *******.

*** ********* ***** ***** * ****-***** ******** ** *** ******** turns ****** ***** ** ********* **** ** *****:

Product ********

******** ******** * *********-***** *********. ***** *** *** ******** ****** and ****** ******** ** ***** ******** ********,********'* **** ***** ****** **** ** ********* *********, ********* ********* security. ************, ****** ***** *** ** ******* ** *** ****** on ******** ******** ** ****** ** ********, ***** **** ********* and **** ** **** *** ***** ****** *** ***********:

Twitter-Centric **** ******

********* ** ********, ******* ** *** ******* ****** ** ****** media *********** *******, *** ******* *********** ****** ** ***** ******** is ***** *****-****** ** ******* ** ****. *** ******* **** up ** **% ** *** **** ** ******** **** ******* is ******** *****-***** ** *********** **** ***** *******. ******* ****** directly, ** *****-******, ****** *********** **** ** ** ******* **** Dataminr **** *** *** * *********** ** ******* ******* ******** on ***** ******** ** **** ****.

*******

******* ****** ** ~$***/**. *** ** ********** **** **** ******, primarily ********** ** ** ************'* **** *** *******, *** ** metrics **** ****** ** ***** ** ******. ***** ************* ******* to ******* ****** ******** ******* **** ********* *** $*,***+/**.

No ****** ******** ************

****** ** ****** ************ ** ******** ********* ***** ****** ********, alerts *** ** ***** ** ** **** *** ***** ** other *****, ***** **** ****-***** ********* *** *** ** ******* an *****.

Compared ** **** ******* ************

******* *****, ** ****-**** *********, *** ********* ** *********** **** from ******* ** ***** ****** ***** ******** ******** **** ***** platforms. ***** ********* *** ********* ************* ** ******* ****** ** a ***-******* ****, ** ********** ********** ****** *****, **** ****** to ** ***** ** "******" ******* *** ****-**** *********** ** threat ******, ***** ** *** ** ********'* *** ***** ************. In ********, *** ** ********'* ****** ** ******** **** "********" feed, *********** ***/**** ************ *** *** **** ****** ** *** the ****** **** ******** ****, ****** *** **** ******** ********** access **** ** ***** ******, ** ***** ** *** ***********, may ** **********.

Security *** *****

* ******** ************ ***** ** **** ********** ** ************* **** assets ******** ***** *****, ** ** ****-**** *********. ****** ***** be ****** ******* **** *********, ** ****** ******** ****** **** cell ******, ********** *********** ** *** *****. *** **** **** areas, ******** *** ******* ****** ** ******** ******* ** *** area, **** ** ********* ** ********* ********. ***** ********* ** these ****** *** **** ************* **** **** ** ***** ** secure ********* ** ***** ********* ** *** **** ** ********.

Comments (1)

* ******* ** ***** ***** ** *** **** *** *** impressed **** *** ******* ** ***** **** ****** - **** I ****** ****'* ********** *** ****** ** *** ** ****** on *** *** **** ****'* ********* *** *****. * ***** if * ***** ******* ***** ******* ** * ******* *** they ****'* **** **** *********. * ***** **** ***** **** it ** **** ***** ***** ********* ** *** *** ******* that ***** ** ******** ** **** **** ** ******* ** JSON ****** **** * ***** ******* ** ******* ** ** active ****** ** * ****. * ***'* **** (*** ** I ****) ******* ******* ****** / *********** ****** **** ***** job ** ********** **********. ***** ****, **** **************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Profile

VMS Export Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone on Sep 13, 2018
When crimes, accidents or problems occur, exporting video from one's video surveillance system is critical to proving incidents. But who does it...
Door Fundamentals For Access Control Guide on Sep 12, 2018
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
Milestone Co-Founder Invests In Anti Theft Spray SelectaDNA on Sep 06, 2018
Milestone's Co-Founder Henrik Friborg has invested in CSI Protect, exclusive US dealer of forensic marking startup SelectaDNA, a company that...
Directory Of 110+ Video Management Software (VMS) Suppliers on Aug 30, 2018
This directory provides a list of Video Management Software providers to help you see and research what options are available. Listing...
Ligowave Wireless Profile - Ubiquiti Competitor on Aug 27, 2018
Ubiquiti has become the most common choice for wireless in video surveillance (see Favorite Wireless Manufacturers) but not without controversy and...
Inputs/Outputs For Video Surveillance Guide on Aug 24, 2018
While many cameras have Input/Output (I/O) ports, few are actually used and most designers do not even consider them. However, a good understanding...
Luxriot VMS Profile on Aug 23, 2018
Luxriot is more popular than Hikvision and Milestone products according to ASMAG which was probably even surprising to Luxriot. The company has...
Video Analytics Integration Guide on Aug 16, 2018
Video analytics is hot again (at least conceptually) but integrating video analytics with VMSes can be challenging. This is especially significant...
ISS VMS / Video Analytics Company Profile on Aug 16, 2018
Who is ISS? In the past few months, they had one of the craziest ISC West promo items in years. Then, they hired industry veteran and ex-Dahua...
Cut Milestone Licensing Costs 80% By Using Hikvision and Dahua NVRs (Tested) on Aug 13, 2018
Enterprise VMS licensing can be quite expensive, with $200 or more per channel common, meaning a 100 camera system can cost $20,000 in VMS...

Most Recent Industry Reports

Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Chinese Government Praises Hikvision Following Xi Jinping on Sep 17, 2018
The Chinese government council responsible for managing China's state-owned companies praised Hikvision’s obedience to China’s authoritarian leader...
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Favorite Intercom Manufacturers 2018 on Sep 14, 2018
Intercoms are certainly increasing in popularity, driven by the integration of video and IP networking. But who is the favorite? On the one side,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact