www.enterpriseitworld.com | Dec 21, 2018
Historic static security controls are not enough, and organizations need to change the way they assess risk. Automation of front end security controls is the key and future of security is in big data and data analytics. This is exactly the area where Gurucul is focused on and along with its channel partners, is gaining popularity among the customers.
As the threat is becoming more complex, the emergence of behaviour analytics as one of new powerful security control is attracting the limelight.
Security threat landscape is changing. The advent of IOT, mobile apps and growing connectivity has resulted in exponential data growth which is difficult to manage and beyond human analysis. It is becoming borderless, and hackers are becoming sophisticated. Organisations have to move at machine speeds to tackle the security threats. Here comes Gurucul as a panacea. Headquartered in the US, Gurucul delivers behaviour based security intelligence and analytics technology. “We work with enterprises and government in protecting their most important asset that is data. We provide AI & ML Based security analytics and fraud analytics platform. Our focus is on behaviour based security intelligence,” says Sandeep Puri, Country Manager – India and SAARC, Gurucul.
“In India we have one of the largest IT ITES company & large telco provider embracing Gurucul solutions. Enterprises are really looking at it.”
Country Manager – India and SAARC
Adoption rate of behaviour analytics in India is showing an increasing trend. The reason is not far to seek. Demand for machine learning is exploding.
The adoption rate in India is increasing in the last 18 months. Sandeep Puri, Country Manager – India and SAARC, Gurucul said, “Apart from doing lots of proof of concepts and closing lots of deal what we are experiencing is that Indian customers are knowledgeable. Added to this, India is a growing market.”
The gaining popularity of behaviour analytics in India has resulted in the creation of business opportunities. Machine learning is become a big thing. There has been a lot of awareness among CISOs. “We are a leader in behaviour analytics space. We are uniquely positioned as we give open choice of big data and our 1000 plus machine learning models help detect unkown unknowns. We give the customers flexibility to build their own models. Needless to say we have big customer references. Gurucul is very focused on customers’ success and customer satisfaction,” maintains Sandeep.
Behaviour analytics is now becoming an integral piece of the security. Several enterprise customers have made it mandatory as part of the security architecture.
“It has been a phenomenal journey till date both in India and globally. I have seen so many companies adopting Gurucul Solutions across the globe. In India we have seen one of the largest IT ITES companies and a large Telco provider embracing Gurucul solutions. People are really looking at it.”
Go to market strategy in India
Gurucul has presence all across the the country. “we believe in the power of channels and have a great relationship with channel. They see value in pitching Gurucul solutions.”
With R&D Center in Pune & Sales HQ in Delhi the company is on its way to expand its presence in the region infrastructure, sales and services staff.
“Our GTM is channel. We ensure the success of true channel development.” he maintained. “Gurucul ensures the customers and partners have immediate access to critical resources when they need them. Our channel ecosystem is very strong. We have a great relationship with the channel partners who find value in pitching Gurucul solutions.”
Gurucul is all set to revolutionise the way enterprises protect themselves against malicious IT-savvy insiders, account compromise and data exfiltration in both on-premises and cloud environments. The company’s user and entity behaviour analytics (UEBA) and identity analytics (IdA) technology uses machine learning and predictive anomaly detection algorithms to reduce the attack surface for accounts, eliminate unnecessary access rights and privileges, and identify, predict and prevent breaches.