In the NEWS

Plus
Tech Digest – Dark Reading: "Threat Intelligence Goes to Work” – Gurucul Feature
Plus
SINET 16 – Gurucul Selected as 2014 SINET 16 Member
Plus
Gurucul Advisory Board - Gurucul’s Advisory Board Stacked with Industry Leaders
Plus
Security Risk Intelligence: A Revolution in Protecting Against Insider Threats
box logo Plus
RSA 2014 – Gurucul CSSO & Qualcomm Sr. Director of IT Speak – “Security by and for the people
Plus
Accuvant - “The two biggest domains around this are behavioral analysis and data analytics. GRA is a platform that offers both. It's not about big data; it's about rich data.”
- Jason Clark, CSSO, Accuvant
Plus
Gurucul Risk Analytics
“the most sophisticated example of behavioral analytics we have seen to date”

Full Article
Plus
Huge Federal Data Breach a Prelude to Even More Dangerous Exploits - Now that they have access, they're going to try phishing and social engineering," said Saryu Nayyar, CEO of Gurucul, a security identity analytics company
Full Article
Plus
IT Best Practices - Gurucul goes to great lengths to look at the identity of the person behind the suspicious activity in multiple dimensions ..
- Linda Musthaler
Full Article
Plus
A host of emerging vendors, such as Bay Dynamics, ClickSecurity, GuruCul, Fortscale and Securonix, are deploying big data techniques to quickly baseline the performance of an environment and detect anomalies that indicate attacks.
Full Article
Plus
Trusted insiders, especially those with elevated privileges, are often given access to tremendous amounts of sensitive information, regardless of whether they actually need that information to perform their jobs. - Leslie Lambert, CISO, Gurucul
Full Article
Plus
Gurucul uses big data analytics to create a context around everything connected to the network -- users, accounts and devices.
Full Article
itworldcanada itworldcanada Plus
The self-audit portal shows activity on internal and cloud accounts, devices, geo-location and more. It can also map activity against peer groups and by resource type.
Full Article
Plus
CNBC - Gurucul Adds Renee Guttmann to Executive Advisory Board
Plus
McAfee – Gurucul Solutions joins McAfee Security Innovation Alliance™
Plus
"It is far more likely that hackers used a compromised identity to gain access to Anthem's network"
-Saryu Nayyar, CEO, Gurucul
Plus
Gartner 2014 IAM Cool Vendor – Gurucul Recognized as 2014 IAM Cool Vendor, U.S. and APAC
Plus
Gartner Market Guide for User Behavior Analytics - 2014 Market Guide for User Behavior Analytics, U.S
Plus
UBA is transforming security and fraud management practices because it makes it much easier for enterprises to gain visibility into user behavior patterns to find offending actors and intruders.” - Gartner
Plus
User Behaviour Analytics (UBA) continuously monitors hundreds of (employee behavior) attributes to detect and rank the risk associated with anomalous behaviors by keeping privacy of employees.
Plus
Instead of targeting hardened networks and application infrastructures, more and more bad actors..
Plus
User Behavior Analytics (UBA), can eliminate guesswork using big data and machine learning algorithms to assess the risk, in near-real time, of user activity.
Plus
In security you have to have a pretty high level of resilience, and you certainly have to have a good sense of humour.
Plus
Gurucul Risk Analytics(GRA) helps organizations quickly zero in on anomalous behavior that can point to identity issues.
creative artist agency logo white Plus
NetApp – Gurucul Risk Analytics
Plus
Yahoo Finance – Teri Takai, CIO of Meridian Health and Former CIO of the DOD, Joins Gurucul’s Impressive Advisory Board
Plus
Peer group analytics can zero in on suspicious or outlier patterns that don't just rely on huge shifts in behavior.
Plus
Anthem attack targeted internal users with privileged access to their systems, the network administrators.
Close
Previous Next

Customers Comments

Customer Benefits

  • Proactive and Actionable Risk IntelligenceTM on anomalous behaviors to predict, detect, and deter insider threats & fraud
  • Drastically reduce the investigation time by using contextual identity and drill down visualizations
  • Proactively find data exfiltration to protect against IP theft and brand sabotage
  • Soundproof cyber security infrastructure using machine learning, big data security analytics
  • Enable smart and automated access and data governance by leveraging risk-based access controls, Intelligent RolesTM, dynamic access provisioning, and high privilege account monitoring
  • Reduce excess access by scanning and automatically deprovisioning access that has not been used
Request a Meeting

Request a Meeting

captcha

Ask for a Demo

Ask for a Demo

captcha