FCW

The Identity Threat

Teri Takai www.fcw.com| Mar 21, 2017 Identity has always played in a central role in IT. Yet it is not often associated with security. That's probably ...

Blog_(Security-Gaps-in-Access-Management)

Security Gaps in Access Management

Author: Craig Kensek Sr. Product Marketing Manager, Gurucul March 15, 2017 One critical question security leaders are contending with in today’s emerging environments is, “how do ...

press_icon

Gurucul STUDIO™ Enables IT Security Teams to Build Custom Machine Learning Models that Detect User & Entity based Threats and Risks

Allows Enterprises and Government to Create Behavioral Models without Vendor Input; Graphical Interface Requires No Coding, Supports Any Data LOS ANGELES, Calif. – Oct. 25, 2016 ...

Advice to a new CISO

EAB video series # 6 (out of 6) Hear cyber security leaders talk about challenges and opportunities for a new CISO. It is very important ...

Gurucul – Predictive Security Analytics

Gurucul is transforming the enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk ...