Version 5 is Here! – ThreatWatch Cyber-Threat Detection Platform Now Powered by SuperScale Analytics

ThreatWatch Version 5 Significantly Reduces Threat Detection Time, Offering 10-100 Times Improved Log Query Performance

Version 5 Portal & ThreatWatch Analytics Platform Enhancements

  • Unbelievable speed & performance with a brand new customer portal featuring a simplified user interface & easier navigation
  • Simplified query capability for non-technical casual users while providing advanced query capabilities for power users
  • New Portal Design offering fully interactive charts, graphs, and alert drill-downs
  • New Log & Reporting Center page that allows interactive log analysis & on-the-fly report generation
  • Streamlined new Reports Manager with new report templates, easier scheduling, and improved performance
  • Support for New Advanced Correlation Sources that expands the specialized ability to secure DNS threats & Analysis of Flow data
  • Expanded Device & Use Case Support including Office 365, Cisco Umbrella, NAC, WAF, and many other products
  • Enhanced Artificial Intelligence/Machine Learning capabilities that drive threat detection of advanced threats and speed time to detection
  • New Threat Intelligence gathering resources from our Threat Recon Unit (TRU), providing advanced threat intelligence capabilities such as “pre-threat”

The Changing Threat Landscape

It’s no longer about alerts, logs & flows…

Hackers are quickly evolving. Defending your data and your brand the old ways, like using a SIEM (Security Incident Event Management) system simply isn’t working. Threat is the main issue – Is your company about to or being breached?  Is your company’s brand & image going to suffer a loss?

We. Can. Help.
Take control of your environment with the Version 5 ThreatWatch Log Analysis Service.  Based on Artificial Intelligence (AI), human-bio immune modeled attack response and supervised & unsupervised machine learning approaches, we can find anomalies and threats that others can’t see, much less detect.

170 Days to Detect?*  How About A Few Hours?
We find breaches with patented SuperScale Analytics: At speeds that are hard to be believed. ThreatWatch Log Analysis offers robust and highly scalable event collection architecture that collects and analyzes over 100 billion customer log events every week, while reducing detection time from months, to hours, or even minutes.

Hackers are Human. So Is Our Solution:  24x7x365 Security Operations Center
But we don’t let machines and AI get in the way of the human touch. Our analysts build and model highly detailed threat cases that help us quickly detect and respond fast to threats.

When you don’t hear from us, it’s a good thing!
So much time is wasted chasing down “false positive” alerts, spending valuable IT resources on investigations that don’t pan out into anything real. We prove our value every day by not spamming you with excessive amounts of low quality false alerts.

We’ve thought through all the parts.
Our solution provides customers with all the necessary components to utilize the solution including collectors, hardware, licenses, software, labor, engineering, security analysts/experts, and a robust, but easy to use, customer portal.

  • Real-time Log collection, storage, and custom query ability in real-time
  • Automated Asset discovery of your devices – both monitored & non-monitored
  • Customer Portal for personalized threat landscape visibility
  • Scans Surveillance – to see how and where you are being scanned and attacked
  • ThreatWatch Advanced Analytics Platform
  • 24×7 Expert threat analysis
  • Remediation recommendations for critical events
  • Comprehensive reports with compliance templates
  • Threat Hunting
  • Automated Remediation/Orchestration Option
HIPPA SSAE16 certification
data security compliance

Compliance Made Easy

Performs the logging of devices required by PCI, HIPAA and other regulatory acts and provides a single pane of glass where you can generate the necessary compliance reporting.

Data visibility and control

Reduce Time to Detection

Customized portal views allow staff to look at trends across the business, enabling rapid identification of emerging threats; while individual departments see only what is relevant to their group.

brand trust

Defending Your Brand

We cut through the noise and bring forward YOUR critical threats. By detecting threats faster and providing actionable notifications, we help you minimize the impact of attacks.

Latest News

SAN DIEGO, CA, August 8, 2018 – Security On-Demand announced that CRN®, a brand of The Channel Company, has named the company to its 2018 Fast Growth 150 list. The list is CRN’s annual ranking of North America-based technology integrators, solution providers and IT consultants with gross sales of at least $1 million that have […]

Read more

Latest Blog Post

  Last week we had a number of Security On-Demand teammates attend “Hacker Summer Camp”, otherwise known as DEFCON. In an effort to help share what they learned, we are going to post a series of short articles highlighting their interests.  These topics do not always necessarily align with Security On-Demand’s primary business offerings, however […]

Read more


CRN Next Gen
San Diego Business Journal Fastest 100
Contact Us

We're threat hunting! Send us a quick email here and we will get back to you asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search