Technology Magazine October 2019 | Page 247

vectors specific to the Canadian environment . The process , as explained by Gagnon , doesn ’ t collect data but instead recognizes and assesses network trends . “ We look at network traffic metadata and apply it to a set of threat feeds and internal Bell data models to identify potential threat traffic targeting particular verticals or customers in Canada ,” he says . “ What ’ s happening in the network gives us an awful lot of insight into where issues are popping up . We collaborate with our customers to get further into their dataset for added insights , but in a general sense , we aren ’ t gathering transmitted data , just the directional metadata , traffic patterns and so on .”
These operations exist outside of the customers ’ network environment , but Bell is hard at work to bring these advanced detection capabilities to its customers . “ We ’ re investing in bringing Big Data to the customer ’ s environment so that they can leverage the technology and threat intelligence to better detect what ’ s happening within their own network ,” says Gagnon . “ We ’ re working with analytics partners to add such capabilities to the platform and provide
247 www . gigabitmagazine . com