Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Hexadite Wants to Outsource Your Cyber Security- to Machines

byEileen McNulty
August 15, 2014
in News
Home News
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Eran Barak, CEO of security startup Hexadite believes that security technology has become very sophisticated with the vast majority of applications and services concentrating on detection. Once a problem within the system is identified, it requires a solution — and there are significantly fewer solutions around to do that, and none of them automated.

Cyber security startup Hexadite, which provides an Automated Cyber Incident Response Solution, was launched by three former Israeli intelligence officials, and came out of stealth mode in July to announce $2.5m in seed funding round.

“Hexadite creates a paradigm shift in the cybersecurity incident response market by automating and vastly accelerating previously manual processes,” points out Yoav Leitersdorf, managing partner for YL Ventures.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

“No one can possibly go through the log files that record intrusion attempts and figure out what they mean in the context of an attack,” Barak said. “Security today is very much a big data play not only because of the volume of data that must be checked, but because of the sophistication of attacks.”

Malware can incubate for months before it is activated, and the chances of tracking it down under those circumstances — where a file is surreptitiously installed onto a system but doesn’t do anything — are extremely low, because administrators don’t even know what they are looking at, Barak said.

Essentially, Hexadite is the ‘outsourcing’ of IT security — to machines. Question regarding the willingness of corporations and enterprises to hand over control of their sensitive tech infrastructure remain unanswered.

Read more here.
(Featured image credit: Hexadite)

Follow @DataconomyMedia

Related Posts

New Apple TV: Faster, smarter and maybe cheaper

New Apple TV: Faster, smarter and maybe cheaper

July 14, 2025
Hackers hunt your emails with Google Gemini

Hackers hunt your emails with Google Gemini

July 14, 2025
xAI apologizes for Grok’s antisemitic and violent posts

xAI apologizes for Grok’s antisemitic and violent posts

July 14, 2025
This is the biggest change to Android and Chrome in a decade

This is the biggest change to Android and Chrome in a decade

July 14, 2025
Is Google’s foldable phone already dead on arrival?

Is Google’s foldable phone already dead on arrival?

July 11, 2025
Google simplifies Lens to make room for its Gemini AI

Google simplifies Lens to make room for its Gemini AI

July 11, 2025
Please login to join discussion

LATEST NEWS

New Apple TV: Faster, smarter and maybe cheaper

Hackers hunt your emails with Google Gemini

xAI apologizes for Grok’s antisemitic and violent posts

This is the biggest change to Android and Chrome in a decade

Is Google’s foldable phone already dead on arrival?

Google simplifies Lens to make room for its Gemini AI

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.