Version 5 is Here! – ThreatWatch Cyber-Threat Detection Platform Now Powered by SuperScale Analytics

ThreatWatch Version 5 Significantly Reduces Threat Detection Time, Offering 10-100 Times Improved Log Query Performance

Version 5 Portal & ThreatWatch Analytics Platform Enhancements

  • Unbelievable speed & performance with a brand new customer portal featuring a simplified user interface & easier navigation
  • Simplified query capability for non-technical casual users while providing advanced query capabilities for power users
  • New Portal Design offering fully interactive charts, graphs, and alert drill-downs
  • New Log & Reporting Center page that allows interactive log analysis & on-the-fly report generation
  • Streamlined new Reports Manager with new report templates, easier scheduling, and improved performance
  • Support for New Advanced Correlation Sources that expands the specialized ability to secure DNS threats & Analysis of Flow data
  • Expanded Device & Use Case Support including Office 365, Cisco Umbrella, NAC, WAF, and many other products
  • Enhanced Artificial Intelligence/Machine Learning capabilities that drive threat detection of advanced threats and speed time to detection
  • New Threat Intelligence gathering resources from our Threat Recon Unit (TRU), providing advanced threat intelligence capabilities such as “pre-threat”

The Changing Threat Landscape

It’s no longer about alerts, logs & flows…

Hackers are quickly evolving. Defending your data and your brand the old ways, like using a SIEM (Security Incident Event Management) system simply isn’t working. Threat is the main issue – Is your company about to or being breached?  Is your company’s brand & image going to suffer a loss?

We. Can. Help.
Take control of your environment with the Version 5 ThreatWatch Log Analysis Service.  Based on based on Artificial Intelligence (AI), human-bio immune modeled attack response and supervised & unsupervised machine learning approaches, we can find anomalies and threats that others can’t see, much less detect.

170 Days to Detect?*  How About A Few Hours?
We find breaches with patented SuperScale Analytics: At speeds that are hard to be believed. ThreatWatch Log Analysis offers robust and highly scalable event collection architecture that collects and analyzes over 100 billion customer log events every week, while reducing detection time from months, to hours, or even minutes.

Hackers are Human. So Is Our Solution:  24x7x365 Security Operations Center
But we don’t let machines and AI get in the way of the human touch. Our analysts build and model highly detailed threat cases that help us quickly detect and respond fast to threats.

When you don’t hear from us, it’s a good thing!
So much time is wasted chasing down “false positive” alerts, spending valuable IT resources on investigations that don’t pan out into anything real. We prove our value every day by not spamming you with excessive amounts of low quality false alerts.

We’ve thought through all the parts.
Our solution provides customers with all the necessary components to utilize the solution including collectors, hardware, licenses, software, labor, engineering, security analysts/experts, and a robust, but easy to use, customer portal.

  • Real-time Log collection, storage, and custom query ability in real-time
  • Automated Asset discovery of your devices – both monitored & non-monitored
  • Customer Portal for personalized threat landscape visibility
  • Scans Surveillance – to see how and where you are being scanned and attacked
  • ThreatWatch Advanced Analytics Platform
  • 24×7 Expert threat analysis
  • Remediation recommendations for critical events
  • Comprehensive reports with compliance templates
  • Threat Hunting
  • Automated Remediation/Orchestration Option

SOD Threat Flash Alert

HIPPA SSAE16 certification
data security compliance

Compliance Made Easy

Performs the logging of devices required by PCI, HIPAA and other regulatory acts and provides a single pane of glass where you can generate the necessary compliance reporting.

Data visibility and control

Reduce Time to Detection

Customized portal views allow staff to look at trends across the business, enabling rapid identification of emerging threats; while individual departments see only what is relevant to their group.

brand trust

Defending Your Brand

We cut through the noise and bring forward YOUR critical threats. By detecting threats faster and providing actionable notifications, we help you minimize the impact of attacks.

Latest News

Next Generation, Patented SuperScale Analytics™ Technology Now Fuels Platform, Sifting through Petabytes of Customer Log Data In Minutes FOR IMMEDIATE RELEASE: SAN DIEGO, CA – Nov. 13, 2017 – Security On-Demand Inc., (“SOD”) the leading provider of advanced threat detection and Analytics-as-a-Service, announced today the availability of its new Version 5.0 ThreatWatch Platform, which will […]

Read more

Latest Blog Post

Florida officials disclosed a possible breach of medical files that contained personal identifiable information (PII). The state’s Agency for Health Care Administration stated in a press release that an employee “was the victim to a malicious phishing email” on November 15, 2017. This breach has the potential of exposing up to 30,000 records. Initial findings […]

Read more


CRN Next Gen
San Diego Business Journal Fastest 100
ThinkStrategies Cloud Computing Business Awards
Contact Us

We're threat hunting! Send us a quick email here and we will get back to you asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search