SHARE
Facebook X Pinterest WhatsApp

NetCitadel Pushes Security Intelligence into the Cloud

Gathering intelligence is one thing, finding a place to store and distribute it is another. NetCitadel, a startup that came out of stealth mode this week, unfurled a OneControl Security Orchestration Platform that provides a central repository for collecting data about security events across the enterprise. According to NetCitadel CEO Mike Horn, most IT organizations […]

Written By
MV
Mike Vizard
Jan 31, 2013

Gathering intelligence is one thing, finding a place to store and distribute it is another.

NetCitadel, a startup that came out of stealth mode this week, unfurled a OneControl Security Orchestration Platform that provides a central repository for collecting data about security events across the enterprise.

According to NetCitadel CEO Mike Horn, most IT organizations can’t afford to set and deploy complex security information event management (SIEM) systems on their own. And even if they do, there are no processes in place for delivering actionable intelligence.

Horn says the OncControl Security Orchestration Platform is a virtual appliance that creates an event bus over which a common security event framework can be extended across both physical and virtual IT systems. That includes the deployment of any new systems on the corporate network that don’t comply with established security policies.

viz20130131-01

Most importantly, Horn says that because that security intelligence is delivered as a service, the OneControl Security Orchestration Platform can be deployed on top of existing systems. In contrast, rival providers of security intelligence applications require IT organizations to either deploy expensive systems on premise, or upgrade their existing network infrastructure to access new analytics capabilities. The OneControl Security Orchestration Platform conversely makes uses of RESTful APIs to collect data from both existing and new systems across the enterprise, says Horn. Any solution that requires an organization to rip and replace existing systems simply won’t be accepted by IT organizations.

That information, adds Horn, is then used to not only identify potential threats, but also identify where the most risk is based on where business logic has been deployed.

Recognizing the importance of preventing all security threats from getting past the network perimeter, vendors are now rushing to provide security intelligence systems that automate the process of identifying potential threats. The assumption is that once those threats are identified, remediating those issues is a comparatively simple process.

It’s hard to imagine how IT organizations have coped this far without a comprehensive approach to security intelligence. As is often the case with all-things IT, an ounce of prevention is always worth several pounds of cure, so maybe the time has finally come to file security intelligence under the heading of better late than never.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.