Blog-Gartner SRM 2017 Opening Keynote Highlights

Gartner SRM 2017 Opening Keynote Highlights

Author: Tom Clare VP Marketing, Gurucul June 16, 2017 Hot and sunny 90 degree temperatures in D.C. this week, attending the Gartner Security & Risk Management ...

What is big data ?

What is big data?

Author: Craig Kensek Sr. Product Marketing Manager April 27, 2017 Big data is a term for data sets that are so large or complex that ...

Machine-Learning

What is Machine Learning?

Author: Craig Kensek Sr. Product Marketing Manager April 5, 2017 Techopedia defines machine learning as “an artificial intelligence (AI) discipline geared toward the technological development of ...

BlogImg-Old-Versus-the-New-Strategies-in-Security-Solution-Adoption

Old Versus the New Strategies in Security Solution Adoption

Ankur Chadda Product Marketing @Ankur_Chadda Mar 24, 2017 In “Borderless Behavior Analytics – Who’s Inside? What’re They Doing?”, Uber’s CSO Joe Sullivan observes: “Most of the ...

Blog_(Security-Gaps-in-Access-Management)

Security Gaps in Access Management

Author: Craig Kensek Sr. Product Marketing Manager, Gurucul March 15, 2017 One critical question security leaders are contending with in today’s emerging environments is, “how do ...

Predictive-Security-Analytics-Use-Cases

Predictive Security Analytics Use Cases

Author: Nilesh Dherange, CTO, Gurucul      The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics - identity analytics) ...

BBA-Blog2-Image-800x400

What is the Threat Surface Equation?

Author: Tom Clare VP Marketing, Gurucul Feb 24, 2017 We all grew up with Einstein’s E = mc 2. The equation is a staple for scientific ...