Version 5 is Here! – ThreatWatch Cyber-Threat Detection Platform Now Powered by SuperScale Analytics

ThreatWatch Version 5 Significantly Reduces Threat Detection Time, Offering 10-100 Times Improved Log Query Performance

Version 5 Portal & ThreatWatch Analytics Platform Enhancements

  • Unbelievable speed & performance with a brand new customer portal featuring a simplified user interface & easier navigation
  • Simplified query capability for non-technical casual users while providing advanced query capabilities for power users
  • New “Threat Concierge” offering fully interactive charts, graphs, and alert drill-downs
  • New “Log Concierge” page that allows interactive log analysis & on-the-fly report generation
  • Streamlined new reports manager with new report templates, easier scheduling, and improved performance
  • New Resources page that will provide quick access to training videos, product bulletins and user training guides
  • Support for New Advanced Correlation Use Cases including
    • Office 365 & Azure Cloud
    • Forescout Network Access Control (NAC)
    • WAF Integrations – Akamai, Incapsula
    • Proofpoint E-Mail
    • Zscaler
    • Cisco Umbrella
  • New Advanced Threat Hunting Platform & Service Add-On

The Changing Threat Landscape

It’s no longer about alerts, logs & flows…

Hackers are quickly evolving. Defending your data and your brand the old ways, like using a SIEM (Security Incident Event Management) system simply isn’t working. Threat is the main issue – Is your company about to or being breached?  Is your company’s brand & image going to suffer a loss?

We. Can. Help.
Take control of your environment with the Version 5 ThreatWatch Log Analysis Service.  Based on based on Artificial Intelligence (AI), human-bio immune modeled attack response and supervised & unsupervised machine learning approaches, we can find anomalies and threats that others can’t see, much less detect.

170 Days to Detect?*  How About A Few Hours?
We find breaches with patented SuperScale Analytics: At speeds that are hard to be believed. ThreatWatch Log Analysis offers robust and highly scalable event collection architecture that collects and analyzes over 100 billion customer log events every week, while reducing detection time from months, to hours, or even minutes.

Hackers are Human. So Is Our Solution:  24x7x365 Security Operations Center
But we don’t let machines and AI get in the way of the human touch. Our analysts build and model highly detailed threat cases that help us quickly detect and respond fast to threats.

When you don’t hear from us, it’s a good thing!
So much time is wasted chasing down “false positive” alerts, spending valuable IT resources on investigations that don’t pan out into anything real. We prove our value every day by not spamming you with excessive amounts of low quality false alerts.

We’ve thought through all the parts.
Our solution provides customers with all the necessary components to utilize the solution including collectors, hardware, licenses, software, labor, engineering, security analysts/experts, and a robust, but easy to use, customer portal.

  • Real-time Log collection, storage, and custom query ability in real-time
  • Automated Asset discovery of your devices – both monitored & non-monitored
  • Customer Portal for personalized threat landscape visibility
  • Scans Surveillance – to see how and where you are being scanned and attacked
  • ThreatWatch Advanced Analytics Platform
  • 24×7 Expert threat analysis
  • Remediation recommendations for critical events
  • Comprehensive reports with compliance templates
  • Threat Hunting
  • Automated Remediation/Orchestration Option

SOD Threat Flash Alert

HIPPA SSAE16 certification
data security compliance

Compliance Made Easy

Performs the logging of devices required by PCI, HIPAA and other regulatory acts and provides a single pane of glass where you can generate the necessary compliance reporting.

Data visibility and control

Reduce Time to Detection

Customized portal views allow staff to look at trends across the business, enabling rapid identification of emerging threats; while individual departments see only what is relevant to their group.

brand trust

Defending Your Brand

We cut through the noise and bring forward YOUR critical threats. By detecting threats faster and providing actionable notifications, we help you minimize the impact of attacks.

Latest News

Next Generation, Patented SuperScale Analytics™ Technology Now Fuels Platform, Sifting through Petabytes of Customer Log Data In Minutes FOR IMMEDIATE RELEASE: SAN DIEGO, CA – Nov. 13, 2017 – Security On-Demand Inc., (“SOD”) the leading provider of advanced threat detection and Analytics-as-a-Service, announced today the availability of its new Version 5.0 ThreatWatch Platform, which will […]

Read more

Latest Blog Post

**To our Customers – If you have not received a critical notification from us, then we have not detected any Bad Rabbit activity in your monitored computing environment.**   Likelihood (SOD Customers): LOW It looks as though Bad Rabbit (an almost NotPetya clone) is another targeted attack against Russian and Ukrainian entities with broader, unintended infection vectors outside their […]

Read more


CRN Next Gen
San Diego Business Journal Fastest 100
ThinkStrategies Cloud Computing Business Awards
Contact Us

We're threat hunting! Send us a quick email here and we will get back to you asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search