In the NEWS
SC Mag. Award
Gurucul has demonstrated that they are among the best in the industry at user behavior analyticsFULL ARTICLE
Some of the best INFOSEC defenses come from innovative vendors like Gurucul who think...FULL ARTICLE
Gartner 2014 IAM Cool Vendor – Gurucul Recognized as 2014 IAM Cool Vendor, U.S. and APACFULL ARTICLE
Huge Federal Data Breach a Prelude to Even More Dangerous Exploits
- Now that they have ...
Trusted insiders, especially those with elevated privileges, are often given access to ...Read More
IT Best Practices - Gurucul goes to great lengths to look at the identity of the person behind the ...Read More
Gurucul uses big data analytics to create a context around everything connected to the network ...Read More
A host of emerging vendors, such as Bay Dynamics, ClickSecurity, Gurucul, are deploying ...Read More
Gurucul Risk Analytics
“the most sophisticated example of behavioral analytics we have ...”
Why we need behavior-centric detection and response "Breach discovery can take days using ..."Read More
Anthem attack targeted internal users with privileged access to their systems, the network administrators.Read More
WikiLeaks Posts CIA Director’s Personal Info
“It is one of the most critical threats right now,”
Peer group analytics can zero in on suspicious or outlier patterns that don't just rely on huge shifts in behavior.Read More
Gurucul Risk Analytics(GRA) helps organizations quickly zero in on anomalous behavior ...Read More
Gartner Market Guide for User and Entity Behavior Analytics
For complementary copy.
User Behaviour Analytics (UBA) continuously monitors hundreds of attributes to detect ...Read More
"Second Year In A Row"
– Gurucul Selected as 2015 SINET 16 Member
The self-audit portal shows activity on internal and cloud accounts, devices, geo-location and more...Read More
The stakes have never been higher when it comes to protecting an organization's sensitive data from criminals and breaches. Our annual CSO50 awards recognize security projects that enhance defense and also deliver a return on investment.
Sallie Mae works continually to evaluate and improve systems and processes to protect customer information.
We congratulate our team for this well-deserved award [CSO50].
The reality is the industry is getting more and more account takeover attempts.
We start to reduce your access to your functionality in the app until you convince us this is actually you.
Ultimately, we want to protect consumers’ health information better than their credit card information.
- Proactive and Actionable Risk IntelligenceTM on anomalous behaviors to predict, detect, and deter insider threats & fraud
- Drastically reduce the investigation time by using contextual identity and drill down visualizations
- Proactively find data exfiltration to protect against IP theft and brand sabotage
- Soundproof cyber security infrastructure using machine learning, big data security analytics
- Enable smart and automated access and data governance by leveraging risk-based access controls, Intelligent RolesTM, dynamic access provisioning, and high privilege account monitoring
- Reduce excess access by scanning and automatically deprovisioning access that has not been used
- 6 steps for GDPR compliance December 5, 2017
- Women in Cybersecurity: Things are changing… slowly November 9, 2017
- Advanced Analytics + Frictionless Security: What CISOs Need to Know October 26, 2017
- BT Bilgi Teknolojileri – Gurucul Announce Partnership for a New Approach to Data Security October 12, 2017
- Using Identity to Protect the Mobile Perimeter September 12, 2017
- Two Gurucul Customers Win 2018 CSO50 Awards for User Behavior Analytics Projects March 20, 2018
- Gurucul CSSO Named IT Security and Strategy Officer of the Year December 6, 2017
- Gurucul Selected by United States Federal Government for Predictive Security Analytics utilizing User Behavior and Identity Analytics November 20, 2017
- Gurucul CEO Named 2017 EY Entrepreneurial Winning Woman October 30, 2017
- Do you have enough Security Analysts? The Rising Need for Automated Risk Response February 9, 2018
- When Rules Don’t Apply January 17, 2018
- Meltdown & Spectre – Nearly Every Computer and Device at Risk January 8, 2018
- Passwords Becoming a Thing of the Past December 20, 2017
- Preparing for EU GDPR: The Steps to Readiness December 6, 2017