Platform

Data Sheets

REVEAL: Dynamic Security Analytics Platform Overview

Learn how to uncover true threats and quantify cyber risk. Get real-time prioritized and actionable insights, so you spend more time on what’s most important, eradicating threats.

Download

Platform Pillar: Intelligent Data Fabric

Learn how Gurucul’s dynamic ML-powered data fabric automates data ingestion and interprets, monitors, enriches, reduces and routes data from any source, format or IT estate.

Download

Platform Pillar: Open and Flexible

Learn how Gurucul’s cloud-native, unified security analytics platform gives you nearly unlimited choice with deployment, integration and its ability to scale.

Download

Platform Pillar: Powered by AI

Learn how our AI is constantly improving the efficacy of our detections and…

Download

Platform Pillar: Dynamic Risk Engine

Learn how a customizable, dynamic risk engine that adjusts in…

Download

Platform Pillar: Advanced Analytics

Learn how Gurucul’s ML-driven Analytics automatically applies a wide breadth of mature analytics to telemetry from any source to improve detection coverage.

Download

Platform Pillar: Purpose-Built Content

Learn how to jumpstart your time-to-value with high-fidelity detections on Day One day with over 10,000 pieces of built-in content that start detecting and reporting threats out of the box.

Download

Gurucul Next-Gen SIEM

By leveraging Artificial Intelligence and Machine Learning on massive volumes of data in a vendor agnostic data lake, Gurucul Next-Gen SIEM delivers all the features expected from a SIEM platform and adds capabilities that no conventional SIEM platform can match.

Download

User and Entity Behavior Analytics (UEBA)

Gurucul UEBA uses a combination of machine learning algorithms, link analysis and policy to identify…

Download

On-Premises Vs. SaaS SIEM Deployment: A Comparative Analysis

When deploying a Security Information and Event Management (SIEM) solution, organizations face a crucial decision: choosing between an on-premises setup or a Software as a Service (SaaS) model. Each option presents unique pros and cons.

Download

Identity & Access Analytics

Behavior-based machine learning for identity and access often results in radical reductions for accounts and access entitlements. Identity is a threat plane requiring identity and access data science that predicts and prevents security risks, assists with high privilege access monitoring,…

Download

Gurucul Data Optimizer

Learn how Gurucul Data Optimizer alleviates the data processing bottleneck for IT and security teams so they can get the right data to the right place while reducing noise and costs.

Download

Gurucul Federated Search

Learn how Gurucul Federated Search provides universal searchability on decentralized data with dramatic cost reduction for security and observability data.

Download

Gurucul Open XDR

Gurucul Open Extended Detection and Response (XDR) is a cloud-native analytics driven XDR platform that improves threat detection and incident response with no vendor lock-in, allowing you to use best-of-breed security solutions. It provides a single interface for analytics, detection,…

Download

Gurucul SIEM Migration Workshop

Gurucul offers a streamlined approach to SIEM Migration, significantly reducing the time and effort required. Our proven methodology delivers successful projects completed in as little as four weeks.  Our migration expert specialists have decades of experience to help you have…

Download

Gurucul STUDIO

Create custom machine learning models without coding and minimal knowledge of data science. Gurucul STUDIOTM provides a step-by-step graphical interface to select attributes, train models, create baselines, set prediction thresholds and define feedback loops.

Download

Gurucul Miner

Investigate incidents quickly with Gurucul MinerTM. Only Gurucul offers contextual search using big data to mine linked users, accounts, entitlements, structured and unstructured data, along with risk score and peer group analytics.

Download

Gurucul Risk-Driven SOAR

Gurucul’s Risk-Driven Security Orchestration, Automation, and Response (SOAR) delivers effective automated responses right out-of-the-box to mitigate identified threats.

Download

Network Traffic Analysis

Gurucul Network Traffic Analysis (NTA) uses entity models to create behavior baselines for every device and machine on the network based on network flow data such as: source and destination IPs/machines, protocol, bytes in/out, etc.

Download

Technical Training

The Gurucul Security Analytics Platform technical training prepares users, managers, SOC analysts and data scientists to leverage the highest value after implementation.

Download

Mission Critical MSSP/MDR Support and Maintenance

Mission Critical Support provides the highest level of personalized, proactive customer support available from Gurucul. Access technical support when you need it.

Download

Gurucul SaaS

Gurucul Software as a Service (SaaS) is a cloud-based SaaS offering that provides organizations the ability to detect and act on compromised accounts and insider threats.

Download

Gurucul Labs

Gurucul Labs provides Gurucul customers a turn-key managed service offering to detect unknown unknowns using the Gurucul Analytics platform.

Download

Cloud Security Analytics

Identity as a threat plane is further amplified by cloud apps to detect insider threats, account compromise and fraudulent activity. Cloud apps require both identity access intelligence and user behavior analytics to reduce the attack surface for accounts, unnecessary access…

Download

Partner Program Overview

The Gurucul Partner Program is a global network of world-class solution providers, including Global Solution Providers, Global System Integrators, Value-added Resellers, Managed Service Providers and Distributors.

Download

Gurucul SmartStartTM Service

Gurucul SmartStartTM is an easy and hassle-free installation service for the implementation of Gurucul’s Unified Security and Risk Analytics platform and products. This service deploys out-of-the-box anomaly detection with minimal customization that delivers consistent, predictable outcomes.

Download

Zscaler

Gurucul can ingest ZScaler Private Access events and feed these into the UEBA to detect abnormal password guessing, brute force, and account validation through location abnormalities.

Download

Vmware Carbon Black

Gurucul uses a combination of Carbon Black Endpoint, VMware NSX Sandbox, and VMware Cloud, together using its own UEBA, IDA, NTA, and malware risk determination to discover attacks.

Download

Tenable

Adding Tenable.io Vulnerability scan data to Gurucul’s alerts can help organizations get visibility into which threats need to be prioritized and which threats can be ignored.

Download

Tanium

The Gurucul Platform ingests alert data from Tanium to identify and correlate malicious activity, including but not limited to, malware and ransomware events such as remote access trojan, screen scrapes, key loggers, fileless malware, hijackware, etc.

Download

Snowflake

Gurucul detects and performs threat-hunting use cases with its machine learning and data science techniques, the platform also introduces much more relevant context, data enrichment, federated searches and incorporates risk scoring as it integrates with Snowflake.

Download

ServiceNow

Gurucul integrates with ServiceNow to provide analysts the ability to detect, enrich, investigate threats, and define playbook driven responses.

Download

SentinelOne

Gurucul detects and performs threat-hunting use cases with its machine learning and data science techniques, the platform also introduces much more relevant context and incorporates risk scoring as it integrates with SentinelOne.

Download

SailPoint

The collaboration between SailPoint’s robust identity governance framework and Gurucul’s security analytics platform’s dynamic risk identification offers organizations a layered and effective approach to security.

Download

Qualys

Gurucul assigns a risk score for every user and entity for which anomalies are triggered with risk scores being affected by vulnerability results from Qualys.

Download

Proofpoint

The Gurucul Security Analytics Platform drives high-efficacy threat detection and automated response with machine learning-based behavior analytics. There are several integrations with Proofpoint solutions, all focused on detecting risky anomalous behavior before a malicious actor can do harm.

Download

Palo Alto Networks Cortex XSOAR

Analysts can gather more data from out-of-the-box Gurucul commands to complete and close investigations in Palo Alto Cortex SOAR.

Download

Microsoft 365

Gurucul Platform collects, enriches, and auto-correlates Microsoft 365 events with other 3rd party data sources to validate and prioritize events that reflect real risk.

Download

Microsoft Azure Log Analytics and Azure Monitor

Gurucul integrates with Azure Monitor to protect your Azure environment and resources by identifying, correlating, and prioritizing threats within Azure. Gurucul also integrates with Log Analytics to help ingest and analyze various Azure Monitor resources and your application logs.

Download

Microsoft Azure Active Directory

Gurucul offers machine learning behavior analytics and context to facilitate risk-based authentication enforcement. There are several capabilities with Microsoft Azure AD, all focused on detecting risky anomalous behavior before a malicious actor can do harm.

Download

HashiCorp

Gurucul integrates with HashiCorp Vault to securely access and connect to a wide variety of 3rd-party data sources. The integration streamlines access to data and eliminates the need for managing passwords and/or hardcoding credentials.

Download

Google Workspace

Gurucul integrates with Google Workspace to ingest and analyze admin activity, Google Drive, Workspace, and Calendar usage. Gurucul then correlates this data with other logs ingested in Gurucul to detect potential security risks, account compromise, security misconfigurations, and admin activity.

Download

GitHub

The Gurucul Security Operations and Analytics Platform drives high-efficacy threat detection with machine learning based behavior analytics. Gurucul integrates with GitHub to provide GitHub admins and platform owners better visibility into your GitHub repositories.

Download

CrowdStrike

The Gurucul Security Analytics and Operations Platform drives high-efficacy threat detection and automated response with machine learning-based behavior analytic.s. Integrations with CrowdStrike are focused on detecting risky anomalous behavior before a malicious actor can do harm.

Download

Box

All Box events are normalized and enriched so they can be quickly searched and filtered in the Gurucul Platform to enhance analysts’ forensics and attack monitoring capabilities. Gurucul’s risk scoring provides a valuable advantage for forensic investigations, giving analysts a…

Download

AWS Cloud Trail

Gurucul enriches ingested AWS CloudTrail data with user and asset information to attribute all admin and access activities in AWS accounts. Gurucul collects user, identity, and asset information from various sources for enriching the AWS CloudTrail logs.

Download

The Gurucul Palo Alto Networks Cortex XSOAR Content Pack

Gurucul supports API based integration with Cortex XSOAR that allows the system to perform an on-demand retrieval of Gurucul’s data and create incidents.

Download

Symantec Endpoint

Symantec Endpoint (SEP) data combines with Gurucul’s SIEM and UEBA systems to provide a holistic view of security, covering both endpoint and network activities. Detailed endpoint data from SEP accelerates the investigation and remediation processes during security incidents.

Download

Netskope

Integration of Netskope with Gurucul’s Next Gen SIEM enhances cloud visibility, threat detection, incident response, proactive security, and compliance readiness, providing a robust and comprehensive security solution for organizations.

Download

AWS GuardDuty

While Gurucul detects and performs threat-hunting use cases with its machine learning and data science techniques, the platform also introduces much more relevant context and incorporates risk scoring as it integrates with AWS GuardDuty.

Download

Okta

By forwarding Okta logs to Gurucul, organizations gain comprehensive visibility into user access across on-premises and cloud-based applications. Bidirectional threat intelligence sharing between Okta and Gurucul enhances organizational threat detection and response.

Download