Pentaho Adaptive Big Data LayerPentaho Business Analytics
Pentaho furthers innovation in Big Data integration and launches Pentaho Labs Delivering the future of analytics, Pentaho Corporation today introduced a new adaptive big data layer in its platform that accelerates access and integration to the latest versions and capabilities of popular big data stores. It also announced a “think tank” called Pentaho Labs for innovating breakthrough big data-driven technologies in areas such as predictive and real-time analytics. The Pentaho adaptive big data layer supports Hadoop distributions from Cloudera, Hortonworks, MapR and Intel, as well as popular NoSQL databases Cassandra and MongoDB, and introduces support for Splunk. With Pentaho, data can be accessed once then processed, combined and consumed anywhere. These new Pentaho big data innovations bring greater flexibility, insulation from change and increased competitive advantage to companies facing the relentless evolution of the big data ecosystem. According to Richard Daley, founder and chief strategy officer at Pentaho, “The relatively breakneck speed at which big data analytics technology evolves as compared to the relational world is paralyzing many companies. The innovations we’re announcing today overcome this paralysis and allow companies to keep their big data technology options open, reduce risk and save considerable development time while taking advantage of the latest innovations in popular Big Data stores.” PivotJ – PivotJ – Pentaho BI Plugin Pentaho Adaptive Big Data LayerPentaho Business Analytics can literally plug into leading edge big data technologies with an advanced adaptive big data layer that supports the latest versions of Hadoop distributions, NoSQL databases and specialized big data stores. New capabilities include:• Hadoop distributions: Pentaho’s new adaptive big data layer supports the following Hadoop distributions: Cloudera CDH 4.1.2, 4.1.3, 4.2.0, 4.2.1; Intel’s IDH 2.3; Horton’s HDP 1.2.x and MapR 2.0.x and 2.1.x.• NoSQL databases: Pentaho also delivers support for the latest features in MongoDB and Cassandra.• Splunk: Machine data is one of the fastest growing and most pervasive segments of big data. Pentaho’s new Splunk adapter allows reading and writing data to Splunk. New Pentaho LabsPentaho Labs, led by Richard Daley, is staffed with top industry experts and a renowned data scientist to incubate breakthrough advanced analytic capabilities driven by big data. Pentaho Labs encourages seeding of new approaches and technologies that can over time be merged into the Pentaho roadmap based on market demand. According to Krishna Roy, BI and Analytics Analyst at 451 Research, “We are talking to many companies who are very interested in big data analytics, but lack the knowledge, skills and resources to keep up with the rapid pace of change in the ecosystem or even get started. Pentaho recognizes this and today’s announcements help lower the barriers to entry and accelerate innovation. Cybersecurity Industry Leaders Launch the Cyber Threat Intelligence Capability Maturity Model PRESS RELEASE WILMINGTON, Del.–(BUSINESS WIRE) — Today, Intel 471, the premier provider of cyber intelligence-driven solutions worldwide, sponsored a partnership of 28 industry leaders serving public and private organizations across the vendor and consumer community. Together, these professionals volunteered their time, effort, and experience to launch the first version of the Cyber Threat Intelligence Capability Maturity Model (CTI-CMM), designed as the first-of-its kind vendor agnostic and universally applicable resource to support organizations of all shapes and sizes across the CTI industry. In today’s evolving threat landscape, the sign of a successful Cyber Threat Intelligence (CTI) program is a mature program that seamlessly integrates with an organization’s core objectives and key outcomes. “Unlocking the full potential of your CTI program requires alignment with the capabilities of each stakeholder it supports, and a tangible measurement of success synchronized with organizational priorities,” said Michael DeBolt, Chief Intelligence Officer at Intel 471. “The CTI Capability Maturity Model (CTI-CMM) is designed to support CTI teams in building their capabilities by aligning to defined practices for stakeholder business domains unique to each organization. The Model establishes shared values and principles across the industry to empower organizations to take a holistic approach to cyber threat intelligence with stakeholders in mind.” “Advising numerous clients globally, I have observed a consistent need for an outcome-focused model for cyber intelligence programs. The CTI-CMM bridges the gap to help CTI programs create impactful and demonstrable value for their organization,” said Colin Connor, CTI Services Manager at IBM X-Force. The all-volunteer team behind the CTI-CMM is comprised of professionals representing a wide range of sectors, geographic regions, backgrounds and experiences, including leaders from Intel 471, IBM, Kroger, Venation, Mandiant, IntL8, Regfast, Trellix, Autodesk, Centre for Cybersecurity Belgium (CCB), Northwave Cyber Security, Workday, Marsh McLennan, Signify, Tidal Cyber, DeepSeas, BP, Gojek, SAND and many more. These individuals created CTI-CMM to elevate cyber threat intelligence across the industry through knowledge and experiences. Together, they defined the following values and principles to support the CTI community moving forward: Shared Values Intelligence provides value through collaboration with our stakeholders and supporting their decision-making process. Intelligence is never completed. Improvement is continuous. This also applies to adoption. Constant improvement is crucial for success and distinguishing from other models which failed to keep up with the time. Intelligence is not proprietary, nor is it prescriptive. Therefore, the model should never be claimed by a single commercial party. Shared Principles Contextualizing threat intelligence within risk Continuous self-assessment and improvement Actionable intelligence based on stakeholder needs Quantitative and qualitative measurement of intelligence Collaborative and iterative intelligence processes This team made the decision to design the CTI-CMM to align with industry best practices and the concepts and format of a recognized cybersecurity maturity model, the Cybersecurity Capability Maturity Model (C2M2). Similar to the C2M2, the CTI-CMM is organized into ten domains. Each domain includes a “Domain Purpose” followed by a “CTI Mission” description describing how the CTI function supports it and consists of the CTI Use Cases and CTI Data Sources. The CTI-CMM is the blueprint for a successful and effective CTI program. It exists to support the people who make decisions and take action to protect organizations. For more information, please visit: https://cti-cmm.org/ About Intel 471 Intel 471 empowers enterprises, government agencies, and other organizations to win the cybersecurity war using the real-time insights …