blog-why-sign-based

Why are IAMs struggling today?

Author: Nilesh Dherange, CTO, Gurucul      At Gurucul, we see customers facing a host of challenges, some more profound than others. One stands out ...

cso_online

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats. Leslie K. Lambert www.csoonline.com | July 6, 2017 Machine learning has emerged as the ideal ...

cioapplications

The Role Of Machine Learning In Predictive Security

Leslie K. Lambert cioapplications.com | June 30, 2017 “Machine learning is playing a transformative role in predictive security, enabling organizations to develop complex risk detection and ...

infosecurity

Insider Threat Detection in a Borderless World

Saryu Nayyar www.infosecurity-magazine.com | June 14, 2017 The wide scale adoption of hybrid data center and cloud IT infrastructures is creating new security gaps, risks and ...

AAP-Datasheet_thumb

Access Analytics Platform – Datasheet

Behavior-based machine learning for identity and access often results in radical reductions for accounts and access entitlements. Identity is a threat plane requiring identity and ...