AdaptiveMobile launches Tethra


Big Data analytics platform provides real time threat detection and response for service provider security

AdaptiveMobile, provider of mobile security, has announced the launch of Tethra, a Hadoop-based security threat analytics platform designed to defend service provider networks.

Tethra provides powerful real time continuous monitoring of threats, evaluating the billions of events occurring every day within the typical mobile and fixed line service provider.

Unlike traditional approaches to network security, which rely on daily feeds to databases of signatures and categorisation decisions, Tethra is uniquely able to respond immediately to new threats as they emerge within the network.

Tethra draws on the scalability of the Hadoop framework to power AdaptiveMobile's proprietary network-security predictive threat engine; identifying new threats based on the content, sequences and interactions between devices. The framework is the first of its kind designed to meet the volume and complex analysis requirements of service providers, and is already active in the networks of some of the largest operators worldwide.

The launch of Tethra comes as Gartner identifies the three top security concerns as being mobile security, big data and advanced threats, all three of these coming together in the service provider's network. Gartner stated these three security concerns were being exasperated by the prevalence and increase of BYOD within corporates.

'Securing an operator's network is the ultimate Big Data problem,' said Gareth Maclachlan, chief operating officer, AdaptiveMobile. 'With billions of events occurring per day and with the vast majority of these being legitimate revenue generating activity, finding new threats that may be coordinated across thousands of individual devices, without impacting subscriber privacy, is the number one security challenge. Tethra has been designed specifically to address the challenges of big security; maintaining the integrity of a service provider's network and the privacy of their subscribers.'


About Author

Comments are closed.