November 22, 2022
Saryu Nayyar Wins 2022 Cyber Security Entrepreneur Award
Read More
How Access Analytics Solves Critical Security Controls
Access analytics provides visibility into access risks across company employee, contractor and vendor communities.
Read More
June 2, 2022
Gurucul Launches Cloud-native SOC Platform with Threat Detection
Read More
3 Spring Cleaning Tips for Improving Cybersecurity Hygiene
It’s officially spring. That means it’s time for spring cleaning. A long-honored tradition, spring cleaning is an opportunity to do some serious cleaning. It’s not only time to cleanup your house or office, but also time to cleanup your enterprise.
Read More
Solving Unsecured Privileged Accounts with Identity Analytics
Unsecured privileged accounts are a serious cyber security threat that can be abused by a malicious insider or an external cyberattack.
Read More
February 8, 2022
Gurucul Sees Record Growth in Revenue, Customers, and Partners in 2021
Read More
Stop Misuse of Privileged Accounts: Identity Analytics with UEBA
Gurucul stops the misuse of privileged accounts with our Identity Analytics and User & Entity Behavior Analytics (UEBA) security products.
Read More
Monitoring User Behavior is The Solution to Combat System Breaches
Monitoring user behavior is one important component to predicting and stopping cyberattacks and malicious insiders.
Read More
New Year, Same Breaches, Worse Outcomes
2021 has been a boon for cybercrime. In January, T-Mobile reported a breach that compromised customer data – the company’s fourth in three years.
Read More
Predictive Security Analytics Use Cases
The range of predictive security analytics use cases a UEBA vendor offers fundamentally defines the maturity of their solution offerings.
Read More
Security Gaps in Access Management
How do you manage threats if you don’t know where the risk is? The solution begins with closing the key security gaps in access.
Read More
Insider Threats Are on the Rise and Growing More Costly. You Need the Right Tools to Detect Them
Traditional detection systems are ineffective in detecting and surfacing insider threats. You need the right tools to detect insider threats.
Read More