Security Threat Analysis Via Twitter - Dataminr Profile

Author: Brian Karas, Published on Apr 10, 2017

Increasingly, large enterprises are using Twitter's datastream as a source of threat intelligence.

While Twitter is filled with the noise of celebrity fashion trends, bot-spam and shameless marketing promos, it also regularly has people breaking news or sharing real time information about critical events. One company, Dataminr claims to be able to analyze Twitter's 'firehose', spotting emerging threats and other trends.

In this reportm we profile Dataminr and their Twitter analysis service, including how it can be used by those looking for a threat intelligence service.

************, ***** *********** *** ***** *******'* ********** ** * ****** of ****** ************.

***** ******* ** ****** **** *** ***** ** ********* ******* trends, ***-**** *** ********* ********* ******, ** **** ********* *** people ******** **** ** ******* **** **** *********** ***** ******** events. *** *******,************** ** ** **** ** ******* *******'* '********', ******** ******** threats *** ***** ******.

** **** ******* ** ******* ******** *** ***** ******* ******** service, ********* *** ** *** ** **** ** ***** ******* for * ****** ************ *******.

[***************]

Dataminr ********

***** ** *** ****, *** ******* ** ****, ******** *** raised ~$**** ** ******* ******* ** "******* ***** **** ****** ***** *** ******* ** *** ******* and ********** *******". ******** ** *** ** *** ********* **** have ****** ** *******'* '********', *** **** ********** ** *** public ******, ***** **** ******* ***** ********** *** ******* ********* internally ** ******* ** ******* *** ********** ****** ** **** trends *** ******* **** ***** ******* **** ********.

******** ******* *** ********* ********* ************, **************, ***** ********** *******, and **** ************* ******* *** ***** ************ ** ******** ******. The ******* *** **** ***** **** ** ***** *** *** it (** *******) *** ********* ****** ** *** *******, **** as ******* ***'* ****** *** *******.

*** ********* ***** ***** * ****-***** ******** ** *** ******** turns ****** ***** ** ********* **** ** *****:

Product ********

******** ******** * *********-***** *********. ***** *** *** ******** ****** and ****** ******** ** ***** ******** ********,********'* **** ***** ****** **** ** ********* *********, ********* ********* security. ************, ****** ***** *** ** ******* ** *** ****** on ******** ******** ** ****** ** ********, ***** **** ********* and **** ** **** *** ***** ****** *** ***********:

Twitter-Centric **** ******

********* ** ********, ******* ** *** ******* ****** ** ****** media *********** *******, *** ******* *********** ****** ** ***** ******** is ***** *****-****** ** ******* ** ****. *** ******* **** up ** **% ** *** **** ** ******** **** ******* is ******** *****-***** ** *********** **** ***** *******. ******* ****** directly, ** *****-******, ****** *********** **** ** ** ******* **** Dataminr **** *** *** * *********** ** ******* ******* ******** on ***** ******** ** **** ****.

*******

******* ****** ** ~$***/**. *** ** ********** **** **** ******, primarily ********** ** ** ************'* **** *** *******, *** ** metrics **** ****** ** ***** ** ******. ***** ************* ******* to ******* ****** ******** ******* **** ********* *** $*,***+/**.

No ****** ******** ************

****** ** ****** ************ ** ******** ********* ***** ****** ********, alerts *** ** ***** ** ** **** *** ***** ** other *****, ***** **** ****-***** ********* *** *** ** ******* an *****.

Compared ** **** ******* ************

******* *****, ** ****-**** *********, *** ********* ** *********** **** from ******* ** ***** ****** ***** ******** ******** **** ***** platforms. ***** ********* *** ********* ************* ** ******* ****** ** a ***-******* ****, ** ********** ********** ****** *****, **** ****** to ** ***** ** "******" ******* *** ****-**** *********** ** threat ******, ***** ** *** ** ********'* *** ***** ************. In ********, *** ** ********'* ****** ** ******** **** "********" feed, *********** ***/**** ************ *** *** **** ****** ** *** the ****** **** ******** ****, ****** *** **** ******** ********** access **** ** ***** ******, ** ***** ** *** ***********, may ** **********.

Security *** *****

* ******** ************ ***** ** **** ********** ** ************* **** assets ******** ***** *****, ** ** ****-**** *********. ****** ***** be ****** ******* **** *********, ** ****** ******** ****** **** cell ******, ********** *********** ** *** *****. *** **** **** areas, ******** *** ******* ****** ** ******** ******* ** *** area, **** ** ********* ** ********* ********. ***** ********* ** these ****** *** **** ************* **** **** ** ***** ** secure ********* ** ***** ********* ** *** **** ** ********.

Comments (1)

* ******* ** ***** ***** ** *** **** *** *** impressed **** *** ******* ** ***** **** ****** - **** I ****** ****'* ********** *** ****** ** *** ** ****** on *** *** **** ****'* ********* *** *****. * ***** if * ***** ******* ***** ******* ** * ******* *** they ****'* **** **** *********. * ***** **** ***** **** it ** **** ***** ***** ********* ** *** *** ******* that ***** ** ******** ** **** **** ** ******* ** JSON ****** **** * ***** ******* ** ******* ** ** active ****** ** * ****. * ***'* **** (*** ** I ****) ******* ******* ****** / *********** ****** **** ***** job ** ********** **********. ***** ****, **** **************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
ONVIF Favorability Results 2019 on Mar 15, 2019
In the past decade, ONVIF has grown from a reaction to the outside Cisco-lead PSIA challenge, to being the de facto video surveillance standard...
BCDVideo Expansion And Switch From HP To Dell Examined on Mar 11, 2019
BCDVideo says they have more than tripled revenue in the past 5 years and are continuing to grow, powered most recently by switching their lead...
Start Up Safe Zone $150 Gunfire Detector Profile on Mar 06, 2019
While gunfire detectors have been around for years, typically they are limited to enterprise level or municipal deployments. Startup AVidea, makers...
Prysm PSIM Profile on Mar 05, 2019
A decade ago, PSIM promised significant potential but has always suffered from significant problems. Now, a number of PSIMs have either gone out of...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry. We originally reported on them in 2015. At the...
Ubiquiti Favorability Results 2019 on Feb 18, 2019
Ubiquiti has quietly grown into a $1+ billion annual revenue company, with offerings across wireless, wireline network and video surveillance (see...
Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Solink Raises $12 Million - Company Profile on Feb 12, 2019
Most industry professionals have never heard of Solink, a company whose tagline is: It's time to revolutionize the way business uses...
PlateSmart LPR Profile on Jan 31, 2019
PlateSmart Technologies claims to "turn any conventional surveillance camera into a license plate recognition camera" We spoke with PlateSmart to...

Most Recent Industry Reports

Casino Security Consultant Carl Lindgren Interview on Mar 26, 2019
For more than 20 years, Carl Lindgren worked as a casino surveillance pro, while being active (and sometimes outspoken) on various online video...
Lenel Favorability Results 2019 on Mar 26, 2019
The positive news for Lenel is that integrators do not dislike them as much as they used to.  The negative news for Lenel is that integrators...
9 UK MPs Call Out Hikvision Over Human Rights Violations on Mar 26, 2019
A group of nine MPs in the UK has released a letter calling out Hikvision for its surveillance deals in Xinjiang and Tibet, alleging Hikvision...
Access Control Course Spring 2019 on Mar 26, 2019
The member's price is normally $299, but register early for a $50 discount, for a price of $249. The price covers classes, personal help and...
UTC Interlogix Series 6 Tested on Mar 25, 2019
UTC Interlogix has long been deceptively OEMing Hikvision as our 2017 results show. Now, Interlogix is back with their newest IP camera series,...
Outdoor Camera Installation Guide on Mar 25, 2019
Outdoor camera installation can be fraught with problems. Creating a sturdy and weather tight mount is key for camera performance and longevity,...
Favorite Video Storage / Server Manufacturers 2019 on Mar 25, 2019
189 integrators answered this question: "What is your favorite storage device / server manufacturer for recording video? Why?" In general...
IBM / Genetec Surveillance System Investigated Over Philippines Human Rights Abuses on Mar 22, 2019
A lengthy investigation into an IBM video surveillance project in the Philippines, raising concerns IBM helped local police conduct a bloody...
Eagle Eye Favorability Results 2019 on Mar 21, 2019
Eagle Eye has been the biggest spender in the cloud VMS market including (via their owner) acquiring Brivo for $50 million and CameraManager from...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact