Free Services to help you during COVID-19 Learn More

Support Request a Demo Contact Us Blog



5 Indisputable Gaps in your Security Environment

Thursday, June 4, 2020 | 1:00pm PDT
Even the most advanced security solutions have gaps. DLP, Firewalls, network monitoring – no solution is complete on its own. By leveraging the data and information you already have and analyzing it to build behavior profiles and look for anomalies, Gurucul is able to detect and stop cyber threats like never before.

Aligning Security Analytics with MITRE ATT&CK for Threat Detection

Thursday, June 11, 2020 | 11:00am PDT
Attend this webinar to learn how aligning Security Analytics with the MITRE ATT&CK greatly enhances the effectiveness of known rules with behavior analytics to detect unknown threat patterns beyond MITRE tactics and techniques.


Discover & Manage Access Risks in This Global Pandemic

Dealing with remote workers, a surge in temporary workers, headcount reductions, and a staggering demand for staff in some industries has radically impacted access controls across the board. The fastest and most efficient way to get actionable insights into your access risks with highest efficacy is by using machine learning and artificial intelligence to perform identity analytics on employee and contractor access.

5 Star Ingredients for a Successful Unified Security & Risk Analytics Program

Join Gurucul for Taco Tuesday! It’s Cinco de Mayo and we’re serving up Margaritas and ingredients for successful Unified Security and Risk Analytics programs. Join this webinar to learn our secret recipe when it comes to detecting, predicting and preventing data breaches.

Third Party Risk: Secure Remote Contractors with Complimentary Monitoring Service

Gurucul has recently made a free 30-day Remote Workforce Monitoring Service that helps customers manage the remote employees and contractors of Third Party Service Providers. Attend this webinar to find out how leveraging our unique offerings can radically change the way you secure third party contractors working remotely.

Detecting Malicious Traffic on Your Network

Stay ahead of attackers with Network Traffic Analysis. Identify unknown network threats on network flows and packet data. Detect endpoint malware missed by software dependent on signatures and known patterns. Discover and report any unknown or unseen devices on the network.

Combat Phishing Attacks Using Modern Machine Learning Algorithms

Phishing attacks are still one of the most common techniques used to compromise account credentials. Learn how modern machine learning algorithms can detect the change in a user’s behavior from the moment the credentials are compromised – to prevent data exfiltration.

Security Analytics Makes Zero Trust Possible

Speaker: Craig Cooper, COO, Gurucul. Guest Speaker: Chase Cunningham, Principal Analyst, Forrester.

Get an expert analysis on the unique role that security analytics and security automation play in achieving a genuine Zero Trust environment.

Super Bowl LII: Protecting Players’ and VIP Data

Speaker: William Scandrett, CISO, Allina Health.

Super Bowl LII was held in Minneapolis, MN – the home of Allina Health. Allina needed to monitor Healthcare providers activities to detect unauthorized or rogue access to patient’s data, and to prevent PHI data exfiltration.

Model Driven Security Orchestration

Speaker: Kurt Lieber, CISO, Aetna.

Organizations need to be looking at Model-Driven Security Orchestration, where the security responses to emerging threats and attacks are automated and driven at machine speed. In this presentation, Kurt Lieber provides an overview of Aetna’s security orchestration program.

Share this page: