SHARE
Facebook X Pinterest WhatsApp

ThinAir Applies Conversational Interface to IT Security Investigations

Thanks to widespread usage of Apple Siri and Cortana on Windows, end users are starting to regularly employ conversation interfaces to query applications. Now ThinAir is bringing support for a similar conversation interface capability to IT security software. Announced today at the Gartner Symposium/ITxpo 2017 conference, the latest 2.0 version of the company’s namesake platform […]

Written By
MV
Mike Vizard
Oct 3, 2017

Thanks to widespread usage of Apple Siri and Cortana on Windows, end users are starting to regularly employ conversation interfaces to query applications. Now ThinAir is bringing support for a similar conversation interface capability to IT security software.

Announced today at the Gartner Symposium/ITxpo 2017 conference, the latest 2.0 version of the company’s namesake platform for investigating insider threats can now be invoked using a conversational interface that allows IT security personnel to employ spoken words to determine, for example, who accessed which file, and when.

ThinAir CEO Tony Gauda says it gathers metadata from all the content strewn across the enterprise that enables IT organizations to determine not only what types of content have been generated, but also who in the organization accessed it using a built-in search interface. The goal, says Gauda, is to reduce the amount of time it takes to investigate a breach. Today, Gauda says, it takes on average 191 days for an organization to discover the source of a breach, which is way too long to have any effect on implementing a meaningful response.

“Most of what they have is access to tangential indicators of compromise,” says Gauda.

The addition of a conversation interface, says Gauda, should reduce the amount of time required to investigate who accessed applications down to a few minutes.

Other new capabilities in ThinAir 2.0 include an impact analysis tab for determining the potential scope of a breach and the ability to onboard new users in under a minute.

Thinair

Most of what passes for IT security today is focused on preventing breaches. But in an age when breaches are a regular occurrence, the ability to determine when and where a breach might have occurred is often the difference between losing days if not weeks of IT productivity versus getting on with real business.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.