Blog_(Security-Gaps-in-Access-Management)

Security Gaps in Access Management

Author: Craig Kensek Sr. Product Marketing Manager, Gurucul March 15, 2017 One critical question security leaders are contending with in today’s emerging environments is, “how do ...

Predictive-Security-Analytics-Use-Cases

Predictive Security Analytics Use Cases

Author: Nilesh Dherange, CTO, Gurucul      The range of predictive security analytics use cases a UEBA-IdA (user and entity behavior analytics - identity analytics) ...

darkreading

Why Identity Has Become A Top Concern For CSOs

Saryu Nayyar www.darkreading.com| Feb 21, 2017 Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the ...

BBA-Blog1-Image-(800x400)

The Vanishing Security Perimeter

Ankur Chadda Product Marketing @Ankur_Chadda Feb 9, 2017 The security perimeter has faded. Old defenses for environments can no longer be relied upon to ensure ...

Book-Image-Cover

Borderless Behavior Analytics (Book)

In "Borderless Behavior Analytics - Who's Inside? What're They Doing?"  seven CISO and CIO leaders share their insights on this next generation of technology evolution ...