About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Cyware Rolls Out CTIX 3.0 with Improved User Experience, Advanced Threat Analysis and Sharing, and Pivoting Capabilities to Improve Risk Planning & Defensive Posture

The CTIX v3.0 comes loaded with a plethora of new capabilities that help SOC teams & threat intel analysts with improved threat analysis and visualization, faster threat investigations, and enhanced sharing possibilities.

Cyware, the industry’s leading provider of the technology platform to build Cyber Fusion Centers and automate Collective Defense, has rolled out its enhanced Cyware Threat Intelligence Exchange (CTIX) platform version 3.0 that aids ease of threat navigation, advanced threat contextualization, single-window threat view, improved dashboard visualizations, and end-to-end threat lifecycle management.

The CTIX v3.0 enables security teams to gain better contextual insights and unearth hidden threat actor behavior patterns - that legacy threat intelligence platforms (TIPs) have failed to deliver. The CTIX v3.0 interacts with large volumes of multi-source and multi-format ingested threat intel in an improvised and fully automated manner to deliver the exact context security teams need to perform advanced threat analysis and investigations, and prioritize threat response. Furthermore, the platform has been engineered with the API-First approach enabling users to interact with the platform using both API and the User Interface (UI) seamlessly.

Speaking on the launch, Amit Patel, Senior Vice President of Global Sales at Cyware, said, “With the release of CTIX 3.0, we are moving one step closer to realizing our vision of providing security teams with advanced capabilities to gain the relevant context out of their IntelOps to make better decisions for tackling critical threats at scale. The revamped user experience of the platform will reduce friction in threat investigations performed by security teams, while also helping break down individual intrusions to connect the insights from disparate pieces of intel to build a coherent picture of the threat environment.”

“Security teams globally are struggling to perform advanced threat investigations through data correlations, visualize and map threats to infrastructure, threat actors, and attack vectors. We have taken a major leap in terms of platform usability, pivoting capabilities, investigation enhancements, improvised visualization, and enhanced intel sharing options. There is a dire need for security teams to move away from just indicator blocking to identify, predict, and preempt threats through advanced data correlation and map threats to the entire threat intel lifecycle,” said Avkash Kathiriya, Vice President of Research and Innovation, Cyware.

Cyware’s continual efforts to simplify and accelerate threat intelligence analysis, investigation and sharing have culminated in the development of several game-changing threat visualizations, search, and sharing capabilities that are being introduced with the release of CTIX v3.0. Adding another feather to Cyware’s cap, the CTIX v3.0 is a major milestone in its journey to enabling any-to-any threat intelligence analysis and sharing for enterprises and information sharing communities (ISACs and ISAOs) worldwide.

Key Highlights of CTIX 3.0 Release:

Revamped Threat Data Feature

To ensure that security teams gain more context from their threat intelligence and can successfully predict and preempt threats, the Threat Data feature in CTIX now comes armed with a suite of new features. For any isolated piece of intelligence like indicator, malware, hash, and others that CTIX ingests, the feature builds a threat lifecycle with complete visualization and context.

The revamped feature now provides all the Threat object details, Enrichments, Relations, Actions taken, and Tasks in a single interface, thereby empowering analysts with the complete context around any piece of threat intelligence. As part of their investigation, security teams may take any further intel actions through this feature, such as publishing to a collection, blocking specific indicators, deprecating outdated intelligence, performing manual review, and more.

Cyware Query Language

Cyware Query Language (CQL) is a powerful and flexible query language that allows analysts to perform complex searches across their entire trove of threat intelligence in CTIX without clicking & scrolling through multiple filters. This saves analysts’ time by eliminating the need to peruse through voluminous threat data. It also adds convenience by allowing analysts to create Saved Searches that can be reused in the future to fetch the same threat data based on their specific criteria.

The introduction of CQL in CTIX 3.0 makes the lives of threat intel analysts much simpler as it gives them access to the relevant threat data they need to perform their tasks in the least amount of time possible.

Threat Bulletin

The enhanced Threat Bulletin feature includes an improvised editor which is analyst-friendly and helps them craft well-designed threat bulletins by including tables, graphics, and pictures, and add objects from the Threat Data feature using CQL search. Analysts can also add tags and TLP, view and add MITRE ATT&CK navigator images, and add Investigations from the Threat Investigations feature.

The updated Threat Bulletin feature in CTIX provides security teams with the ability to deliver context-rich and elaborate threat bulletins to communicate threat information in an accessible manner for all recipients.

Enhanced Reporting

The Reporting feature in CTIX has now been upgraded to give analysts the ability to create customized reports using search filters, CQL, or saved searches. Security teams can further use the search filters if their analysts want to look for specifically tailored threat data and include it in their report. Analysts can both schedule reports or download them manually as and when required.

It allows collaboration with co-analysts & heads of SOC/IR Teams, CISOs, Threat Intel teams, and other stakeholders by sharing fully enriched and personalized reports. Using these new customized reporting capabilities, security teams can share tailor-made reports with their stakeholders to facilitate strategic and tactical decision making to shape their defensive posture as per the evolving threat environment.

About Cyware

Cyware helps enterprise cybersecurity teams build platform-agnostic cyber fusion centers. Cyware is transforming security operations by delivering the Cyber Fusion Center Platform, the next-generation SOC (NG-SOC), for its customers orchestrating the entire post-detection SecOps with automated SOC (ASOC) capabilities. As a result, organizations can increase speed and accuracy while reducing costs and analyst burnout. Cyware's Cyber Fusion solutions make secure collaboration, information sharing, and enhanced threat visibility a reality for enterprises, sharing communities (ISAC/ISAO), MSSPs, and government agencies of all sizes and needs.

We have taken a major leap in terms of platform usability, pivoting capabilities, investigation enhancements, improvised visualization, and enhanced intel sharing options.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.