| |
Intellyx BrainCandy -- May 7, 2025 | |
Oh boy are we in a bind. We need new AI cybersecurity and development tools to save us from new AI attackers and global technology failures. But there are some possible reprieves in these little brieves, er, briefs. Want to appear in an upcoming #BrainCandy brief with Intellyx B.V., or invite us to your upcoming (virtual) event? Email us at pr@intellyx.com. | |
Bonus Brain Candy: Upcoming Events: | | | |
| |
| |
Andromeda Security provides AI-assisted inferencing to manage access for human and non-human identities, atop a data lake that ingests identity data, logs and events from multiple systems of record and management.
As software access control progressed from the analog world of each compute process or data access being governed solely by human identity services such as RBAC, newer digital actors have ... [Read more] | |
| |
| |
Breeze Security offers predictive security that prioritizes the highest risk threat vectors and active adversaries, automating or instructing SOC teams to remediate the highest risk scenarios through integrations atop a host of other security vendors such as SIEM, SOAR, WAF, UEBA, EDR, IAM.
Since every enterprise is constantly under thousands of possible attacks, their ‘defensive coordinator’ theme basically surveys the company’s attack surface for vulnerabilities and misconfigurations … [Read more] | |
| |
| |
Adopting generative AI for enterprise use often includes training LLMs on private data, which increases demand for data.
It also drives adoption of the Model Context Protocol (MCP) standard for connecting data sources and tools to LLMs.
CData offers more than 270 data connectors that use JDBC and ODBC protocols ... [Read more] | |
| |
| |
Checkly offers a developer-oriented application reliability platform that stretches monitoring across the software delivery lifecycle, enhancing relevant alert signals from within code and cloud architectures to assist observability, testing, and incident management workflows.
Developers can build, run, and share software monitoring-as-code assets in their language of choice within the context of their IDE, or reuse ... [Read more] | |
| |
| |
c/side was at RSAC demonstrating a lean web proxy layer that prevents unauthorized adware and malicious browser-based scripts from slowing down site performance, manipulating user sessions and intercepting user sessions and data.
“A lot of security people don’t necessarily know of this issue, but just in Q1 of 2025, we reported nearly 300,000 websites with client-side attacks on them,” … [Read More] | |
| |
| |
Command Zero gives security operations teams an AI investigation partner that learns how to navigate the company’s own data sources and expert learnings to conduct Tier 2+ incident resolutions and deep threat hunts in an assistant or autonomous mode.
There are already plenty of security automation solutions on the market that can triage and remediate Tier 1 cases from well-known threat patterns ... [Read more] | |
| |
| |
ControlMonkey provides a full-lifecycle Terraform and OpenTofu automation platform that provides visibility, policy enforcement, and drift detection and remediation for Infrastructure-as-Code (IaC) deployments.
ControlMonkey can inventory and analyze configurations for unmanaged cloud-based infrastructure (i.e., cloud assets not controlled by IaC) and generate the Terraform code necessary ... [Read more] | |
| |
| |
It’s typically expensive and difficult to set up test environments that duplicate production system configurations, especially for applications with large data sets.
Not to mention how hard it is to protect against the risk of a breach that exposes sensitive data such as personally identifiable information (PII) or violates a privacy regulation such as GDPR ... [Read more] | |
| |
| |
Dynatrace continues to push the envelope of observability with new AI agents, AI application performance and security analytics, AIOps data transformations, and integration layers that give engineers and stakeholders health awareness of an enterprise’s complete data and application estate, as well as fine-grained details of root causes and user journeys ... [Read more] | |
| |
| |
Elisity provides a secure network microsegmentation layer that provides agentless connectivity and policy-based control to just about any managed or unmanaged IT, OT, or IoT device while hardening endpoints against external discovery and local exploits.
The operational complexity of implementing a least-privilege access network using additional firewalls, WAFs and vLANs across an expanding array ... [Read more] | |
| |
| |
To understand EmachineLabs, you must first understand Google Blockly.
According to Wikipedia, Blockly is a client-side library for the programming language JavaScript for creating block-based visual programming languages and editors. The default GUI of the Blockly editor consists of a toolbox, which holds available blocks, and where a user can select blocks, and a workspace, where a user can drag and drop and rearrange blocks ... [Read more] | |
| |
| |
Gomboc.ai offers an AI-powered cloud infrastructure vulnerability discovery and remediation solution which lifts security toil from developers so they only get the filtered signals they need to fix their own code, while allowing SecOps teams to set and monitor security policies without needing to dive into repos and individual Terraform providers.
For any complex cloud application, the devil is in the configuration details ... [Read more] | |
| |
| |
Last9 provides a customizable control plane for correlating and interpreting multiple distributed sources of system and application observability data in order to meet reliability, visibility, and cost objectives.
Floods of high-cardinality telemetry data coming in from distributed cloud systems and clusters, services, and even devices such as cameras, microphones, and other sensors ... [Read more] | |
| |
| |
When we last wrote about Nacelle in November 2022, the company offered a headless (API-based) eCommerce platform that supported composable back-end elements and front-end channels.
The company has since pivoted. Nacelle now offers an AI-driven personalization engine that improves conversion via the acquisition phase of the customer journey where most personalization solutions fall over ... [Read more] | |
| |
| |
Radware has been a stalwart vendor in the threat detection and remediation space for years, with a platform for protecting the ‘crown jewels’ of IP within the CI/CD lifecycle, and thwarting web, network, and API-oriented bots and DDoS exploits. With more than 40 percent of all web traffic already consisting of bots doing everything from simple web content scraping to more malicious forms of employee spoofing ... [Read more] | |
| |
| |
As the volume of risk alerts and security incidents continues to grow, the workload on security analysts and remediation teams continues to grow as well. Seemplicity Security helps reduce this workload with AI-powered automation workflows that analyze and remediate risk alerts and security incidents across multiple domains, tools, and teams ... [Read more] | |
| |
| |
ThreatConnect offers a threat intelligence hub that aggregates and classifies data from more than 200 sources of information including public and proprietary research, the company’s own data sources, and security platforms such as SIEM and EDR to allow cybersecurity experts to prioritize threat responses based on business risk.
The vendor also gives analysts a unique Polarity desktop client that suggests risk context ... [Read more] | |
| |
| |
When we last covered Zesty in December 2022, the company’s offering focused on purchasing storage and compute cloud resources on behalf of its customers and then reselling them on an optimized basis.
The company now offers vertical and autoscaling specifically for Kubernetes on AWS ... [Read more] | |
| |
Upcoming Events & Webinars | |
| |
May 28 9:00 PDT/12:00 EDT/5:00 BST/6:00 CEDTThe attention economy is unforgiving. Every second counts.We tapped into insights from 37 million consumers and learned that 91% of consumers reported a digital issue last year—and the impact is severe:- 55% abandon purchases
- 50% switch to competitors
- 39% cancel subscriptions
One glitch, one delay, one missed signal—and the opportunity is gone.Join Conviva VP of Solutions Engineering, Will Penson, and Intellyx analyst Jason Bloomberg for a first look at the 2025 State of Digital Experience Report. We’ll break down the thousands of micro-frictions quietly killing engagement—and how high-performing teams are uncovering hidden opportunities for growth. You’ll learn:- Why the disconnect between product analytics and observability drives churn and missed revenue
- What high-performing companies do differently to capture attention and drive conversion
- How real-time performance analytics helps teams detect issues faster and prioritize by business impact
... [Register for the webinar here] | |
| |
| |
To stay competitive, FinServ leaders need to drive innovation in core mainframe applications—but they also face rising compliance demands and cybersecurity risk. In this live webinar you’ll learn how generative AI and cloud-based security strategies can help you modernize-in-place while defending against security threats. Register and join at 11 am EDT on May 29., 2025. Featured speakers: - Eric Newcomer, CTO and Principal Analyst, Intellyx — moderator
- Priya Doty, Vice President of BMC AMI Solutions Marketing, BMC Software
- Peter Plevka, Technical Sales Zsystems, BMC Software
- Duncan Ash, Banking & Financial Services Strategist, BMC Software
- Ted Bakon, Director of North American Sales, BMC Software
...[Register for the webinar here] | |
| |
| |
Our industry is on a mission for growth, and DTW Ignite is where you’ll find your path. Whether it is agility through Composable IT & Ecosystems, efficiency through Autonomous Networks, or innovation with AI and Data, you’ll be inspired, learn from others, and get hands-on at DTW Ignite with these proven pathways to growth, beyond profit.
Join the industry’s biggest alliance as we face challenges, delve into solutions, and deliver real change together.
The Pathways to Growth are Here: Find Yours at DTW Ignite Jason Bloomberg will be attending DTW Ignite and is available to meet in person. Please email him to set up a meeting ... [Register for the event here] | |
| |
| |
Intellyx is the first analyst and advisory firm focused on digital transformation for the enterprise. We help business executives and IT professionals connect the dots between disruptive new technologies and the challenges of implementing them with agility at scale to meet rapidly changing customer demands. | |
| |
| |
| |
©2025 Intellyx B.V. At the time of writing, Dynatrace and Nacelle are former Intellyx customers. None of the other Brain Candy vendors mentioned here are Intellyx customers.
You are receiving this email because you have previously signed up for an Intellyx Brain Candy or Cortex newsletter. You can unsubscribe from this email or change your email notifications.
| |
| |
Intellyx BV de Horsterkamp 10 7251AZ Vorden Netherlands | |