It seems like everyone is cooking during this global pandemic. Many of us are trying new recipes. Others are finding interesting ways to serve up classic dishes. And then there are the minimalists, sticking with comfort food like grilled cheese sandwiches and mac and cheese. Whatever your pleasure, cooking provides a fulfilling outlet for us to occupy our time while staying safely at home.
These days, you can pretty much Google any food dish to get a large number of recipes to choose from. There are recipe sites, recipes by famous chefs, video tutorials, cooking apps and food magazines. Recipes are rated and you can easily see how many people contributed their opinion to that rating. Often the cooking time is indicated. There is usually a “The Best You’ll Ever Eat” option as well as “Ultimate,” “Classic,” “Easy” and “Quick” options. All recipes provide ingredients, some list and even supply photos of the equipment you’ll need. All provide directions or steps for making the recipe.
So, how do you choose the recipe you will use? Does Martha Stewart’s “Basic Chicken Soup” beat out Bon Appetit’s “Classic Chicken Noodle Soup?” Do you go with the first recipe on the Google results page? What about the highest ranked recipes – will you choose one of those? Do you select the one with the most inviting photo? Or the one that takes the least amount of time to prepare? What goes into your decision to try a new recipe? Everyone has a process. Or, do they?
Yes, that’s a thing: grating frozen butter. If you’re making scones, keeping the dough as cold as possible is critical. However, mixing cold butter with flour is no easy task. That is, until you realize that using frozen grated butter is the real key to success. Who knew? Well, somebody did – thank you Sally’s Baking Addiction. It’s these sorts of interesting techniques that make a recipe great.
What does all this have to do with cybersecurity? Just like with recipes, when you Google a cybersecurity technology or solution, you’re going to get many results. You will find similar recipes from multiple vendors for the same cybersecurity solution. (Very few will have appetizing photos.) How do you decide which vendor(s) you will consider? Do you select the first vendor on the Google results page? Do you pick the vendor with the most descriptive text? Or, do you take the time to look at their individual recipes?
In contrast with food recipes, cybersecurity solution recipes vary significantly. You need to understand what the ingredients are and how the solutions are cooked. It’s as important to understand what’s missing from the recipe as what’s included. We recommend you come to the table with a check list: what’s in the solution and how does it work exactly? Have the vendor walk you through the recipe from start to finish. Get a list of all the ingredients as well as the directions for use – and don’t let them leave out their special sauce or custom techniques that make their dish exceptional. If there’s no special sauce, then move on. You don’t want ruined scones.
We have something special for you to enjoy: the Gurucul Security Analytics Cookbook. We have pulled together some of our most popular recipes for detecting unknown threats and preventing data breaches – Insider Threat, Privileged Access Abuse, Account Compromise, and more. It’s not often we can come together over a hot meal, but when we do, it should leave us feeling satisfied. We hope you get satisfaction from our recipes. And, we can’t wait for you to invite us into your businesses for a taste of our value-added services.
If there’s one thing we do well, it’s security analytics. Our ingredients include over 1500 predictive anomaly detection machine learning models, pre-packaged by solution and vertical industry. Our special sauce is aggregating all your data feeds into one unified risk score using behavior analytics. We serve up real-time risk prioritized intelligence you can act on. Dig in!