Skip to main content

Lakehouse for Cybersecurity Applications

Lower costs, reduce complexity and mitigate threats

hero image
hsbc
Blackberry
sequencebio logo
Akamai logo
hsbc
Blackberry
sequencebio logo
Akamai logo
hsbc
Blackberry

The lakehouse unifies your data stack, securely

ecosystem

Learn more

resource thumbnail

eBook

Cybersecurity in Financial Services

Protect your institution with advanced analytics and AI

Read now
resource thumbnail

eBook

Cybersecurity in the Public Sector

How the lakehouse can help your agency address gaps in cyber readiness

Read now
resource thumbnail

Blog

Cybersecurity in Manufacturing

Rethinking cybersecurity for the manufacturing industry

Read now

The Lakehouse Effect

85%

10GB

Ingestion

Delivering real-time analytics at scale with Delta Lake

Akamai runs a pervasive, highly distributed content delivery network (CDN). Its CDN uses approximately 345,000 servers in more than 135 countries and over 1,300 networks worldwide to route internet traffic for some of the largest enterprises in media, commerce, finance, retail and many other industries. About 30% of the internet’s traffic flows through Akamai servers. Akamai also provides cloud security solutions. In 2018, the company launched a web security analytics tool that offers customers a single, unified interface for assessing a wide range of streaming security events and performing analysis of those events. The web analytics tool helps Akamai customers make informed actions in relation to security events in real time. 

resource thumbnail

Solution Accelerators

Databricks-developed solutions to deliver the data and AI-driven outcomes that matter most — faster

Databricks Solution Accelerators are purpose-built guides — fully functional notebooks and best practices — that speed up retail results. Save time on discovery, design, development and testing in use cases like IOC matching, context graph analytics and incident investigation.

graphic

DNS Analytics

Accelerate time to detection and response across petabytes of data 

Tap into DNS traffic logs, enrich streaming threat intelligence, and apply advanced analytics to detect DNS abnormalities and prevent malicious attacks.

Get started
Icon Graphic 4

Indicator-of-Compromise (IOC) Matching

Multicloud query foundation for IOC matching built for incident responders, threat hunters, detection engineers and security engineers

Perform an ad hoc scan of all the data (logs, telemetry, etc.) during an incident response by leveraging a security lakehouse for a given list of atomic Indicators-of-Compromise (IOCs) without the need to have a deep understanding of the table schema.

Get started
Graphic

Context Graph Analytics

Build time series knowledge graphs for cybersecurity

Perform an impact analysis (blast radius) on affected areas across the enterprise when given a compromised user account/apps/IP address.

Get started
graphic

Incident Investigation Using Graphistry

Investigate and analyze threat activities using your own language

Sifting through vast amounts of log and telemetry data is key to investigating cybersecurity incidents. The ability to understand the patterns and relationships in the data is critical to uncovering the tactics, techniques and procedures used by the threat actor.

Get started

Partner Solutions

Easily discover and integrate data, analytics and AI solutions with your lakehouse

Partner Connect makes it easy for you to discover data, analytics and AI tools directly within the Databricks platform — and quickly integrate the tools you already use today. With Partner Connect, you can simplify tool integration to just a few clicks and rapidly expand the capabilities of your lakehouse.