Whitepapers & Analyst Research

Analyst Research Report: Data-Driven Security Reloaded

The latest security research from EMA studied 18 security technologies year over year to determine that 95% of security analytics users are confident they can detect a data breach, security analytics tied for first place in value vs. TCO, and other insights.

Infographic: Value of Security Analytics and Anomaly Detection

This infographic displays at a glance what keeps organizations from being confident on breach detection, the 6 value drivers of advanced analytics, and the top 5 uses of security analytics. All statistics based on the EMA analyst report, Data-Driven Security Reloaded.

3 Ways Anomaly Detection Improves IT Operations and Applications Performance Management

Learn how IT Ops and APM professionals use anomaly detection software every day to help them cut through overwhelming false alerts, reduce troubleshooting time, and automatically detect potential problems before they spiral into major user issues.

Why Every IT Security Team Needs Anomaly Detection Software

By leveraging machine learning and behavioral analytics, anomaly detection can quickly determine a "normal" baseline from months of past data, and immediately and automatically identify any abnormalities - more accurately and efficiently than writing alert rules ever could.

14 Use Cases and Technical Examples

These articles provide instruction, and can be used as a guide to test drive use cases for machine learning anomaly detection.

Prelert Anomaly Detective: Finding Black Swans in Big Data

Anomalies are easy to find when they're big and frequent but what do you do when they're small and rare?

The Many Faces of Advanced Operations Analytics

Advanced operations analytics is a term for big data as used by IT for a variety of use cases including security, IT Ops, and APM. This free report shows that effective advanced analytics investments blend those use cases and promote more beneficial ways to work across IT.

ITOA Landscape: Game Changing Use Cases

Get this great eBook from ITOA Landscape on a collection of game-changing insights from 7 of the brightest thought leaders in IT Operations Analytics and how impacts common use cases facing IT management today.

Anomaly Detection in Application Performance Monitoring Data

This 7 page academic paper shows how the analytics and statistical methods behind anomaly detection solve the problems behind accurate application performance monitoring by enabling faster and more accurate results than traditional monitoring methods.

EMA Market Radar Report on Performance Analytics

This 2013 Market Radar report is Enterprise Management Associates' comparison of 22 advanced analytics vendors' product strengths. Get your free copy courtesy of Prelert!

Kusnetzky Group : Machine Learning Predictive Analytics Brief

This whitepaper by analyst and frequent contributor to ZDnet covers the benefit and need for automated anomaly detection analytics in Splunk environments.

Whitepaper : How Prelert Improves APM Data Usability

Learn how advances in machine learning software improve APM data usability and IT expert productivity while eliminating the need for KPI, thresholds or alert rules, and providing real-time root cause analysis.


Data Sheets

Prelert Anomaly Detective

Anomaly Detective can help IT professionals say goodbye to writing rules and thresholds and still be more efficient and effective at finding problems and threats before they impact the business.

IT Operations Case Study: Equens

With a winning business formula driving rapid growth of their IT infrastructure, Equens was inundated with monitoring alerts. They turned to Prelert to prioritize the alerts and slash troubleshooting times, enabling more business and data growth.

IT Security Case Study: Responsys

This digital marketer teamed with Prelert to detect rogue users using netstat data, find data exfiltrations, and make sense of IDS noise. Results include a shorter mean time to detection and greater visibility into advanced threats.

New Call-to-action

New Call-to-action

Anomaly Detection: A Look Under the Hood - Watch the technical video now

New Call-to-action

New Call-to-action