Security Threat Analysis Via Twitter - Dataminr Profile

By: Brian Karas, Published on Apr 10, 2017

Increasingly, large enterprises are using Twitter's datastream as a source of threat intelligence.

While Twitter is filled with the noise of celebrity fashion trends, bot-spam and shameless marketing promos, it also regularly has people breaking news or sharing real time information about critical events. One company, Dataminr claims to be able to analyze Twitter's 'firehose', spotting emerging threats and other trends.

In this reportm we profile Dataminr and their Twitter analysis service, including how it can be used by those looking for a threat intelligence service.

************, ***** *********** *** using *******'* ********** ** a ****** ** ****** intelligence.

***** ******* ** ****** with *** ***** ** celebrity ******* ******, ***-**** and ********* ********* ******, it **** ********* *** people ******** **** ** sharing **** **** *********** about ******** ******. *** company,************** ** ** **** to ******* *******'* '********', spotting ******** ******* *** other ******.

** **** ******* ** profile ******** *** ***** Twitter ******** *******, ********* how ** *** ** used ** ***** ******* for * ****** ************ service.

[***************]

Dataminr ********

***** ** *** ****, and ******* ** ****, Dataminr *** ****** ~$**** in ******* ******* ** "******* ***** **** ****** media *** ******* ** the ******* *** ********** sectors". ******** ** *** of *** ********* **** have ****** ** *******'* 'firehose', *** **** ********** of *** ****** ******, which **** ******* ***** algorithms *** ******* ********* internally ** ******* ** analyze *** ********** ****** to **** ****** *** extract **** ***** ******* find ********.

******** ******* *** ********* financial ************, **************, ***** commercial *******, *** **** organizations ******* *** ***** notification ** ******** ******. The ******* *** **** under **** ** ***** for *** ** (** Twitter) *** ********* ****** to *** *******, **** as ******* ***'* ****** *** revoked.

*** ********* ***** ***** a ****-***** ******** ** how ******** ***** ****** about ** ********* **** an *****:

Product ********

******** ******** * *********-***** interface. ***** *** *** trending ****** *** ****** relative ** ***** ******** vertical,********'* **** ***** ****** uses ** ********* *********, including ********* ********. ************, ****** ***** can ** ******* ** see ****** ** ******** keywords ** ****** ** keywords, ***** **** ********* and **** ** **** and ***** ****** *** originating:

Twitter-Centric **** ******

********* ** ********, ******* is *** ******* ****** of ****** ***** *********** sharing, *** ******* *********** posted ** ***** ******** is ***** *****-****** ** Twitter ** ****. *** company **** ** ** 20% ** *** **** it ******** **** ******* is ******** *****-***** ** information **** ***** *******. Whether ****** ********, ** cross-posted, ****** *********** **** up ** ******* **** Dataminr **** *** *** a *********** ** ******* similar ******** ** ***** services ** **** ****.

*******

******* ****** ** ~$***/**. and ** ********** **** each ******, ********* ********** by ** ************'* **** and *******, *** ** metrics **** ****** ** users ** ******. ***** organizations ******* ** ******* global ******** ******* **** typically *** $*,***+/**.

No ****** ******** ************

****** ** ****** ************ to ******** ********* ***** within ********, ****** *** be ***** ** ** sent *** ***** ** other *****, ***** **** PSIM-style ********* *** *** to ******* ** *****.

Compared ** **** ******* ************

******* *****, ** ****-**** platforms, *** ********* ** incorporate **** **** ******* or ***** ****** ***** services ******** **** ***** platforms. ***** ********* *** generally ************* ** ******* tweets ** * ***-******* area, ** ********** ********** search *****, **** ****** to ** ***** ** "mining" ******* *** ****-**** indications ** ****** ******, which ** *** ** Dataminr's *** ***** ************. In ********, *** ** Dataminr's ****** ** ******** full "********" ****, *********** VMS/PSIM ************ *** *** have ****** ** *** the ****** **** ******** does, ****** *** **** security ********** ****** **** to ***** ******, ** those ** *** ***********, may ** **********.

Security *** *****

* ******** ************ ***** be **** ********** ** organizations **** ****** ******** large *****, ** ** high-risk *********. ****** ***** be ****** ******* **** employees, ** ****** ******** assets **** **** ******, electrical *********** ** *** wells. *** **** **** areas, ******** *** ******* alerts ** ******** ******* in *** ****, **** as ********* ** ********* protests. ***** ********* ** these ****** *** **** organizations **** **** ** react ** ****** ********* or ***** ********* ** the **** ** ********.

Comments (1)

I stopped by their booth at the show and was impressed with the breadth of their data mining - what I really didn't understand and failed to get an answer on was why they didn't syndicate the feeds. I asked if I could consume their content as a service and they didn't have that available. I think they would kill it if they would allow customers to pay for streams that could be embedded in some form of Restful or JSON stream that I could display as content in an active stream in a GSOC. I don't want (nor do I need) another website taking / distracting guards from their job of monitoring situations. Great idea, poor implementation.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
10 Facial Recognition Providers Review (Secutech) on May 09, 2019
Adding to our 19 Facial Recognition Providers Profiled report from ISC West, IPVM focused on facial recognition technology for our Day 2 coverage...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Bastille Cell Phone Tracking Profile on Apr 30, 2019
Is tracking someone by their cellphone the next generation of surveillance? Bastille is a US startup which tracks people by their cellphone or...
Verkada Gets Half Billion Dollar Valuation on Apr 26, 2019
Last week, when we profiled Verkada (The Fastest Growing Video Surveillance Sales Organization Ever - Verkada), we predicted they would raise $40...
ACRE Acquires RS2, Explains Acquisition Strategy on Apr 19, 2019
ACRE continues to buy, now acquiring RS2, just 5 months after buying Open Options. One is a small access control manufacturer from Texas, the...
UK Installer CCTV Aware - Flat Pricing, No Salespeople on Apr 10, 2019
This is a different kind of company. They do flat pricing, they do not have any salespeople and 50% of their sales are sold and booked...
Airship VMS Profile on Apr 03, 2019
Airship has been developing VMS software for over 10 years, however, with no outside investment, and minimal marketing, the company is not well...
Cambium Wireless Video Surveillance Profile on Mar 27, 2019
Cambium Networks, spun out of Motorola Solutions in 2011, says "outdoor durable radios are in their DNA" and they are targeting video surveillance...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...

Most Recent Industry Reports

Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Inside Look Into Scam Market Research on May 17, 2019
Scam market research has exploded over the last few years becoming the most commonly cited 'statistics' for most industries, despite there clearly...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Panasonic 32MP Multi Imager Camera Tested (WV-X8570N) on May 16, 2019
Panasonic has released their first multi imager models including the 32MP (4x4K) WV-X8570N, claiming "Extreme image quality for evidence capturing...
Trump Signs 'Huawei Ban' - Executive Order Targeting Foreign Adversary Technology on May 16, 2019
US President Donald Trump has signed an executive order targeting technology provided by 'foreign adversaries', in what is widely being called a...
Bank Security Manager Interview on May 15, 2019
Bank security contends with many significant threats - from fraudsters to robbers and more. In this interview, IPVM spoke with bank security...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
San Francisco Face Recognition Ban And Surveillance Regulation Details Examined on May 14, 2019
San Francisco passed the legislation 8-1 today. While the face recognition 'ban' has already received significant attention over the past few...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
Hikvision VP On Muslim Oppression on May 14, 2019
Hikvision has won tens of millions of dollars, at least, in direct contracts with the Chinese government that oppresses Muslims, including a forced...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact