This month’s NY Enterprise Tech Meetup was a special one, as the group joined forces with the June Information Security Meetup, with enterprise covering the first half with two extended presentations, and Info Security having a panel discussion with three notable speakers.
CLICK TO READ ALL ABOUT THE JUNE 2014 ENTERPRISE MEETUP
FiscalNote – Real Time Government Analysis Platform
Based in DC and NYC, FiscalNote is a searchable database and web resource for government regulatory information and case laws, reducing uncertainty by delivering real time updates. The traditional means of acquiring legislative information was through newspapers and attorneys, and as is the case with most print media, it needed a transition to digital formats.
FiscalNote categorizes information into over 60 sections, with a user dashboard to access a variety of topics and search functions. Organize content by legislators or other variables, and use the site’s algorithms to guess how likely they are to vote for certain bills. If the algorithm guesses incorrectly, it flags the mistake and the developers work it into improving the model.
Set alerts on specific legislative actions, and also search for text in specific documents, which are scanned and made searchable through the site’s engine.
Logentries – Logs as Data
Using system log data to handle numerous tasks and analytics, Logentries was formed out of a log management solution built for IBM but now applied to a cloud platform.
With thousands of users registering billions of logs each day, Logentries serves as a single location to store real time log data and visualize it into graphs and metrics. Users can examine large quantities of data and zoom into individualized sections, flagging critical events for easy access. Past data can also be accessed and analyzed, in variables of days, hours, or even minutes.
Dimitri Sirota, David Birnbaum, and William Murphy
Information security is becoming more and more important, as high profile companies like Target and PF Changs become victims of cyber-attacks, and this is precisely what panelists Dimitri Sirota, David Birnbaum, and William Murphy addressed:
Sirota: “The traditional security model used to be around building perimeters, but customers are forcing these perimeters to open up. For the first time, companies are much more concerned with security measures as a result.”
Birnbaum: “Companies are now looking for new methods to prevent attacks, as well as responding to current attacks. Larger companies are harder to manage, and must be sectioned in order to keep one potential attack from compromising the whole system.”
Murphy: “In the physical world, security decisions are made on perceived threats, which is a tactic that doesn’t work well for cyberspace. Companies need to increase focus on preventative measures, and also work hard to get users to accept and apply new methods on their end.”