SlideShare a Scribd company logo
1
Correlation & Orchestration
Proven Security Analytics for Unmatched Efficiency
Scaling Talent
2
A company’s greatest resource is its people
• It takes six (6) people to monitor a
desk 7x24.
• The most underqualified security
people fill these slots.
• Most companies outsource due to
the expense.
• Scaling talent is the best means to
maintain quality and reduce costs.
FluencyCorpproprietary
Fluency
3
• Fluency reduces the need to staff 7x24 security monitoring,
by leveraging automated correlation and machine learning
into single view scoring.
• Fluency offers 1st and 2nd tier orchestration using its
patented correlation and risk scoring that increases efficiency
and accuracy.
Automated Correlation/Risk Scoring = Efficiency
FluencyCorpproprietary
How Fluency Works
4
Scoring of Correlated Data
FluencyCorpproprietary
Risk Scoring
5
Performs Validation 7x24 for every system
Fluency uses supporting vectors
What does that mean?
When an analyst validates an alert
they look at the time period around
the event and determine if there are
supporting factors, giving more weight
to factors that are from different
sources. Fluency does the same in
machine learning.
FluencyCorpproprietary
Better than a Human – YES, every time
6
Results match that of top rated analysts
Fluency consistently matches the results of
MTA analysis. Unlike a human, Fluency is
7x24 and focused on every system as if it
was the only system.
FluencyCorpproprietary
Notification
7
Knowing where to start
Notification events are JSON
objects that can be sent or
listed.
The notification page allows
an overview of system
messages along with a
summary and link to its
details.
FluencyCorpproprietary
Scoring
8
Analytics are transparent
FluencyCorpproprietary
Single View
9
User and device insight to events
FluencyCorpproprietary
Technology
10
Proprietary code designed to run in-memory
• U.S. patent for real time correlation based of flow characteristics
• Beginning process of a second patent on orchestrated threat
scoring
• Proprietary graph database
FluencyCorpproprietary
11
Process Flow
FluencyCorpproprietary
Delivery
• Subscription based model (12 month minimum commit)
• Investment based on bandwidth of access points & a fee for total EPS
• Able to provide CAPEX or OPEX proposals depending on customer
need
• Flexibility and willingness to meet customer needs
12
FluencyCorpproprietary
Use Case: 10 Gbps Entry
8,000,000,000 flow events per day
• DDoS EPS spikes
• Large scans
• 1,600,000 nodes with 600
subnets
• IPv6
13
• Compared 3 major detection
products
• FireEye/Blue Coat/Fidelis
• Integration from alert to payload
(Blue Coat Solera)
• Flow analysis
FluencyCorpproprietary
How Tough is 10g
14
488,000 EPS
Fluency was the only security device to maintain operations
during a 488,000 EPS DDoS attack.
FluencyCorpproprietary
Use Case: Finding Impacted User
• Previously, 45 minutes to
determine user from an event
• Policy insight into remote login
(LogMeIn/TeamViewer)
• Determination of events not
blocked
From issue-to-user in one click
• Four diverse ingress/egress
points converted to a single view
• Cisco firewalls and WebSense
• No integration with IT
Recognition
17

More Related Content

PDF
Building Elastic into security operations
PDF
Operationalize with alerting, custom dashboards, and timelines
PDF
8 Reasons to Choose Logrhythm
PPT
Splunk .conf2011: Search Language: Intermediate
PPTX
Security Automation Quick Wins - Siemplify Webinar
PDF
How to Hunt for Lateral Movement on Your Network
PDF
Threat Hunting Platforms (Collaboration with SANS Institute)
PDF
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...
Building Elastic into security operations
Operationalize with alerting, custom dashboards, and timelines
8 Reasons to Choose Logrhythm
Splunk .conf2011: Search Language: Intermediate
Security Automation Quick Wins - Siemplify Webinar
How to Hunt for Lateral Movement on Your Network
Threat Hunting Platforms (Collaboration with SANS Institute)
Automatically Repairing Web Application Firewalls based on Successful SQL Inj...

What's hot (6)

PDF
Taming Big Data with NoSQL
PDF
Cloud - Security - Big Data
PPTX
Detecting and Blocking Suspicious Internal Network Traffic
PPTX
Five SIEM Futures (2012)
PPTX
RSA 2016 Security Analytics Presentation
PDF
Cheatsheet for your cloud project
Taming Big Data with NoSQL
Cloud - Security - Big Data
Detecting and Blocking Suspicious Internal Network Traffic
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
Cheatsheet for your cloud project
Ad

Similar to Fluency Introduction Deck - October, 23, 2017 (7)

PDF
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
PDF
Fluency® - www.fluencysecurity.com
PDF
Lumenate_Fluency_OneSheet
PDF
Fluency-Investor Deck - June 2015
PDF
Audit Fundamentals and Compliance Success Infographic
PDF
eircom Managed Security
PDF
Webinar–Building A Culture of Secure Programming in Your Organization
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency® - www.fluencysecurity.com
Lumenate_Fluency_OneSheet
Fluency-Investor Deck - June 2015
Audit Fundamentals and Compliance Success Infographic
eircom Managed Security
Webinar–Building A Culture of Secure Programming in Your Organization
Ad

Recently uploaded (20)

PPTX
1. Introduction to Computer Programming.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
1. Introduction to Computer Programming.pptx
Getting Started with Data Integration: FME Form 101
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Tartificialntelligence_presentation.pptx
Mushroom cultivation and it's methods.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
cloud_computing_Infrastucture_as_cloud_p
Machine Learning_overview_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
OMC Textile Division Presentation 2021.pptx
Assigned Numbers - 2025 - Bluetooth® Document

Fluency Introduction Deck - October, 23, 2017