451 Research on Striim’s Streaming Data Integration, Analytics and Alerting

Striim platform credited by 451 Research for real-time data integration and streaming analytics“…Canny with its design criteria. [Striim’s] technology platform doesn’t only offer streaming data integration, analytics or alerting: it offers all three.” That’s what Jason Stamper concludes about the Striim platform in his recent 451 Research Impact Report. In his 451 Take, he states:

“Since we expect streaming technologies to get a shot in the arm from the emergence of Internet of Things (IoT) use cases, we think Striim has been canny –­­­­­–­integration, analytics or alerting: it offers all three. Equally wisely, the company is incorporating open source tools such as Apache Kafka, Hive and ElasticSearch to save on development costs, and also allow companies to take advantage of existing infrastructure.”

Mr. Stamper points out how the company has rebranded from WebAction to Striim (pronounced “stream”) because the new name better reflects what the company is trying to do: ‘streaming integration and intelligence.’ (The two ‘i’s in Striim stand for integration and intelligence.)

The report proceeds to detail the unique features of Striim’s end-to-end, real-time data integration and intelligence platform. Everything from real-time, high velocity data collection the instant data is born, to real-time enrichment, correlation and analysis on streaming data, to real-time visualizations and alerts.

There are other vendors in the streaming analytics space trying to assemble an end-to-end platform with open source technologies. However, 451 Research agrees that this approach is ultimately time-consuming and costly. It simply takes too many high-priced developers to wire all of the various technologies together, and in the end, there’s no guarantee it will work at an enterprise scale.

Download the complete 451 Research Impact Report.

The Economist on the Cyber-security Dangers from the Internet of Things

Economist_Internet-of-Things_IoT-July-2014-300x222The Internet of Things Means You Now Have Less Time to ID Threats

In a July 12 Cyber-security brief “The internet of things (to be hacked)” The Economist discussed the coming explosion of connected devices sharing data in what has commonly become called the Internet of Things (IoT), or as some are now calling the Internet of Everything (IoE). Either term gets you to a place where 18 months from now you have way too much data coming at you to store it all now to process “later”. “Later” will never come and every one of those devices introduces a new potential security threat to your enterprise. The Economist notes:

“There have already been instances of nefarious types taking control of webcams, televisions and even a fridge, which was roped into a network of computers pumping out e-mail spam.”

In this hyper-connected world you need to be continuously monitoring all of devices and traffic on your networks to note interesting correlated events across your infrastructure. WebAction Security Event Processing Data Driven Apps give you a unique insight across your data streams.

Wireless Networks Will Become Saturated

By the nature of IoT devices, wireless is the preferred method of communication. As the number of devices grows, so does the wireless chatter and noise. The chatter is building over all wireless communication channels: WiFi, cellular, Bluetooth, near field communications (NFC), and others. There is no end in sight to the expected growth of wireless connected devices. Networks will need to be fortified and new methods of managing wireless traffic are being considered. Enriching wireless network traffic with rich context and history allows for dynamic network traffic prioritization based on the profiles of your customers. Always make sure that your most important customers always get the best Quality of Service, and know immediately when quality degrades.

Insights Available in Your IoT Streams

The Economist fears that with the loose regulation of connected devices we will see more incidents of hackers working their way into your refrigerator and thermostat. The brief concludes with: “Who needs a smart fridge anyway?” I suppose that is an interesting question, but rather than resisting progress and change (which we know doesn’t work in the long-run), we suggest finding novel ways to immediately identify and neutralize security threats arising from the Internet of Things.

All of those connect devices are reporting their streams back to home base, and home base needs to make some snappy decisions about what to do with the data streams flowing in. At the same time every  stream rides on your wireless networks and contains potential threats and useful data signatures. That’s where the WebAction Real-time App Platform shines, monitoring streams to identify patterns in-memory enabling immediate (and informed) action downstream. On the fly your real-time data is correlated across streams, filtered, and enriched with history and context to create highly actionable Big Data Records.

The Internet of Things comes with some very significant blue sky ahead of it and the WebAction Real-time App Platform enables you to take advantage of this new frontier. Request a demo of the WebAction Platform.

Back to top