CSPI...Thanks. I kind of view CSPI as a savings account that pays good interest (with the chance of hitting a big one). Just too hard to trade this stock with such big gaps between bid & ask and the low liquidity.
CSPI...Big news out of India this week regarding Seceon. And we know there is a strong connection between CSPi & Seceon!! This could get interesting...
Sept 16, 2019
Seceon and Modi Infosol have partnered to develop new channels for the Seceon Open Threat Management (OTM) platform and the two solutions – aiSIEM and aiMSSP - built on the platform.
The combination of Seceon's Dynamic Threat Model (DTM), machine learning, AI with actionable intelligence for proactive threat detection of known or unknown threats, and automated containment/elimination, empowers enterprises and MSSPs with comprehensive cybersecurity.
“Modi Infosol is a well estabilished value-added distributor with a large channel across the Asia-Pacific region and working together we hope to bring the disruptive innovation in cyber security market to this region for all organizations irrespective of their size. We are confident that this will be huge success for the customers and the market in the region,” says Lalit at Seceon. https://www.channelworld.in/news/seceon-appoints-modi-infosol-value-added-distributor-india
CSPI...Could this be a Golden Ticket??!!!?!...Palo Alto Networks launches new version of Demisto SOAR platform...
(Side Note: I'm not an expert here, and time will tell if CSPi is tied to Demesto's new SOAR platform. The kicker is, Demesto was brought up twice in CSPi's latest cc!!!)
New features to the Demisto platform include a customizable user interface, threat intelligence, database scaling and a mobile app providing chat support and updates for users.
11 Oct 2019 - Palo Alto Networks this week rolled out Demisto version 5.0, a security orchestration, automation and response platform, following its acquisition of Demisto in February.
- Demisto 5.0's UI is customizable depending on incident types and lets users visualize and act on threat indicator intelligence to help security teams manage and automate incident response. The load management and scaling of resources aim to help an organization be secured as its size grows, according to Palo Alto Networks.
- Enhanced threat intelligence: The threat intelligence feature in the new Demisto SOAR platform enables users to access threat indicator intelligence from integrated sources and take action on them, according to Palo Alto Networks. Users can create custom indicator layouts that display relevant data for each type.
A technology that help organizations collect security threats data and alerts from different sources, SOAR products are gaining popularity and adoption rate among businesses aiming to improve security operations centers. Gartner predicted the SOAR technology market will rise from a 1% adoption rate in 2018 to 15% by 2020. https://searchsecurity.techtarget.com/news/252472189/Palo-Alto-launches-new-version-of-Demisto-SOAR-platform
From CSPI's Q3 2019 cc...
- "We recently developed integration functionality with Demisto, SOAR product, that's a security orchestration, automation and response." - - "This is the first of many high-potential integration opportunities that we are working on."
- "We continue to work with other manufacturers -- like I mentioned Demisto, with companies like -- just big manufacturers of networking security gear. So it's just now integrating into their products as well as continue our custom applications that we can sell standalone." https://finance.yahoo.com/news/edited-transcript-cspi-earnings-conference-155329996.html
From March 2019...
CSPi Announces ARIA SDS Packet Intelligence Application for Automated Threat Remediation Immediate Identification and Disruption of Threats with Superior Enterprise-wide Network Intelligence
BOSTON, March 05, 2019 (GLOBE NEWSWIRE) -- CSPi (NASDAQ: CSPI), a provider of cybersecurity and packet capture products, managed IT and professional services and technology solutions today announces the ARIA SDS Packet Intelligence (PI) application at the RSA 2019 conference in San Francisco. The latest offering in the patented ARIA SDS portfolio solves the inability to monitor all network traffic, in some cases up to 80% unmonitored, leading to a sizable blind spot in network activity. Through the Packet Intelligence application security resources have complete network visibility, including east-west traffic, as well as automated capabilities for threat detection, disruption and network policy enforcement all without impacting network or application performance. Depending upon an organization's security needs, the ARIA SDS solution is offered in several configurations from software only to hardened appliances.
For organizations that already have threat detection tools, including SIEMs, UEBA, IDS/IPS integrated into their security infrastructure the ARIA PI application dramatically improves the effectiveness and performance. These tools are only as good as the data that is directed to them for analysis, the greater the irrelevant data that is ingested, the greater the resulting false alerts. ARIA PI was designed to feed modern ML and AI detection enhanced tools with the flow metadata they can ingest to properly detect critical threats in minutes. ARIA PI can monitor the entire network East-West as well as North-South and send unsampled network metadata to these tools allowing them to efficiently detect network born threats in real-time.
Threat detection is only one step in the chain to remediation. Analysts often need to fully investigate and scope a threat. ARIA PI can send specific requested data – that which contains the actual threat conversations - radically reducing investigative response (IR) effort and time. Since many organizations have critical information stored on particular assets, PI can actively monitor these assets data conversations in their entirety at the packet level - looking for threats, all while allowing such conversations to run without performance impact.
Detecting threats quickly and performing rapid IR is only half the battle. Threats need to be stopped. ARIA PI performs this function as well: Pushbutton as directed by a SOC analyst- or fully automated via its APIs that work with most modern SIEMs and SOAR tool sets. Such commands can be used to stop particular threat conversations – east west as well as north south and it’s done independently without impacting network gear and firewalls with complicated error prone policies. What’s truly unique is the ability to stop a threat conversation from within the network without shutting down a particular compromised asset like a critical server. This can keep production processes running while safely bringing up backup devices to take over.
These unique capabilities increase not only the speed and accuracy of detecting network born threats but does the same for incident remediation – a true breakthrough. The reduced data can also reduce costs if charges are assessed based upon the amount of data ingested.
With the central orchestration and management provided by the ARIA SDS Platform the PI application is not only simple to deploy but also scales to one or hundreds of instances across a wide-spread organization. The ARIA PI solution is offered in four configurations, each designed to meet a variety of security needs:
Threat Analytics This fully automated solution identifies and classifies all network traffic at full line rates of 10G or 25G with no loss of application performance. The PI Threat Analytics configuration improves network visibility by providing Netflow metadata and application ID information for each traffic stream, allowing for quicker identification of threats.
Passive Detection Deployed either through a tap or switch span the classified and specified traffic streams are directed to the appropriate security toolsets, including SIEMs, IDS, UEBA, and DLP for further analysis. Additional, adaptive filtering, including shunting, allows detection tools to operate more effectively by focusing analysis on the most relevant traffic.
Active Protection When deployed in-line and paired with security threat detection solutions supporting automated scripts and workflows including SOAR solutions, threats can be immediately stopped as they are detected. Direct central management and control, through the GUI allows SOC teams to quickly stop a threat. While leveraging the APIs offers the ability to eliminate the manual effort required to stop the threats. The solution’s high-availability features provide the resiliency required for critical production network in-line deployment.
Turnkey Protection The most robust configuration is a complete turnkey approach providing full network-based threat detection or protection via direct integration with third party IDS tools, to detect threats or if in-line: via IPS to detect and to take automatic, actions to stop or disrupt threats once detected. This preconfigured solution gives organizations a cost-effective centralized and orchestrated way to secure their environment, and provides the right data needed for security teams to perform any required IR activities. https://www.globenewswire.com/news-release/2019/03/05/1748340/0/en/CSPi-Announces-ARIA-SDS-Packet-Intelligence-Application-for-Automated-Threat-Remediation.html
CSPI...CSPi will announce Q4/FY2019 early this year (hope this is a good sign)...
CSP Inc. to Announce Fiscal Fourth Quarter and Full Year 2019 Financial Results on Tuesday, December 10th 12/04/2019 LOWELL, Mass., Dec. 04, 2019 (GLOBE NEWSWIRE) -- CSP Inc. (NASDAQ: CSPI), a provider of security and packet capture products, managed IT and professional services and technology solutions, announced that it will issue its fiscal fourth quarter and full year 2019 financial results before the open of the market on Tuesday, December 10, 2019