Scroll Top
Primary Menu
Platform
PRODUCTS
Platform:
Dynamic Security Analytics Platform
Uncover true threats and quantify cyber risk. Get real-time prioritized and actionable insights, so you spend more time on what’s most important, eradicating threats.
PRODUCTS:
Next-Gen SIEM
Hybrid and on-prem Analytics-Driven Next Gen SIEM
UEBA
Detection of unknown, new, and emerging threats and variants with most comprehensive behavior analytics
Open XDR
Cloud-native, open, vendor agnostic, pre-packaged analytics
Identity & Access Analytics
Real-time access control automation using risk and intelligence
Data Optimizer
The Gurucul Data Optimizer is a data streaming solution that simplifies the data lifecycle while radically reducing costs and complexity.
Add On Capabilities:
SOAR
Customizable playbooks, risk-driven response automation
Fraud Analytics
Monitor Cross-Channel Transactions and Identify Risky Events in Real-Time
Network Traffic Analysis
In-Depth Analysis of Network Traffic to Identify Malicious Payloads, Lateral Movement, and Anomalous Communications
SOLUTIONS
By Use Case:
Insider Threat
SOC Transformation
Cloud Security Monitoring
Fraud Detection and Prevention
Privileged Access Monitoring
Compliance
By Industry:
Financial Services
Healthcare
Retail
Federal
Energy & Utilities
Manufacturing
RESOURCES
Case Studies
Datasheets
Whitepapers, Reports and eBooks
Videos
Blog
Webinars
Technical Training
MITRE ATT&CK
PARTNERS
MSSPs and Resellers
Technology Alliances
Technology Integrations
Partner Portal
Partner Inquiry
COMPANY
About Gurucul
Why Gurucul
Board of Advisors
Leadership
Pressroom
Events
Awards
Careers
Contact Us
Get a Demo
Machine Learning
Clear Filters
A Nut Worth Cracking
March 11, 2019
A Nut Worth Cracking
A Security Evolution: Taking Security Beyond SIEM with UEBA
August 17, 2020
A Security Evolution: Taking Security Beyond SIEM with UEBA
ABCs of UEBA: A is for Analytics
January 23, 2019
ABCs of UEBA: A is for Analytics
ABCs of UEBA: B is for Behavior
February 4, 2019
ABCs of UEBA: B is for Behavior
ABCs of UEBA: C is for Context
February 14, 2019
ABCs of UEBA: C is for Context
ABCs of UEBA: F is for Fraud
May 6, 2019
ABCs of UEBA: F is for Fraud
ABCs of UEBA: G is for Gurucul
May 11, 2019
ABCs of UEBA: G is for Gurucul
ABCs of UEBA: I is for Insider Threat
July 2, 2019
ABCs of UEBA: I is for Insider Threat
ABCs of UEBA: K is for Known
September 3, 2019
ABCs of UEBA: K is for Known
ABCs of UEBA: L is for LOGS
October 7, 2019
ABCs of UEBA: L is for LOGS
ABCs of UEBA: M is for Machine Learning
November 12, 2019
ABCs of UEBA: M is for Machine Learning
ABCs of UEBA: O is for OUTLIER
May 13, 2020
ABCs of UEBA: O is for OUTLIER
ABCs of UEBA: Q is for Qualitative Analysis
June 18, 2020
ABCs of UEBA: Q is for Qualitative Analysis
ABCs of UEBA: S is for Sabotage
February 15, 2021
ABCs of UEBA: S is for Sabotage
ABCs of UEBA: X is for eXfiltration
August 2, 2021
ABCs of UEBA: X is for eXfiltration
ABCs of UEBA: Y is for Yield
August 10, 2021
ABCs of UEBA: Y is for Yield
Acknowledging 5 Common Gaps in Existing Security Infrastructure
June 2, 2020
Acknowledging 5 Common Gaps in Existing Security Infrastructure
Analytics-Based Controls without Causing Undue Business Impact
July 3, 2018
Analytics-Based Controls without Causing Undue Business Impact
Applying Behavior Analytics to the MITRE ATT&CK Framework
February 26, 2020
Applying Behavior Analytics to the MITRE ATT&CK Framework
Are You Struggling with Thousands of DLP Events Per Day?
July 16, 2018
Are You Struggling with Thousands of DLP Events Per Day?
Behavior Doesn’t Lie: NH-ISAC and Model Driven Security in Healthcare
May 31, 2018
Behavior Doesn’t Lie: NH-ISAC and Model Driven Security in Healthcare
Behavior is the Leading Threat Indicator
June 27, 2022
Behavior is the Leading Threat Indicator
Build vs Buy: How Should You Implement Security Analytics?
December 3, 2019
Build vs Buy: How Should You Implement Security Analytics?
Combat Phishing Attacks Using Modern Machine Learning Algorithms
July 23, 2020
Combat Phishing Attacks Using Modern Machine Learning Algorithms
May 6, 2019
Customers Discuss Gurucul’s Security Analytics Technology
Detect Host Compromise with “Domains Generated Algorithmically”
September 20, 2018
Detect Host Compromise with “Domains Generated Algorithmically”
Detect Insider Threats with “Email Fuzzy Logic”
August 22, 2018
Detect Insider Threats with “Email Fuzzy Logic”
Detect Merchant Fraud with “Outlier Categorical Model”
January 14, 2019
Detect Merchant Fraud with “Outlier Categorical Model”
Detect Privileged Access Abuse with “Linear Regression”
September 11, 2018
Detect Privileged Access Abuse with “Linear Regression”
Discover Privileged Accounts with “Entitlement Classification”
September 5, 2018
Discover Privileged Accounts with “Entitlement Classification”
Drive Security Automation at Machine Speed
September 4, 2020
Drive Security Automation at Machine Speed
ESG Review of the Gurucul Security Analytics and Operations Platform
July 28, 2022
ESG Review of the Gurucul Security Analytics and Operations Platform
Fight Phishing Attacks with Machine Learning and Security Analytics
October 12, 2021
Fight Phishing Attacks with Machine Learning and Security Analytics
Fraud and Phishing, Oh My!
August 13, 2020
Fraud and Phishing, Oh My!
Fraudsters are Banks Chief Competition
December 10, 2018
Fraudsters are Banks Chief Competition
Gurucul Automates Threat Detection & Response for MITRE ATT&CK
February 13, 2020
Gurucul Automates Threat Detection & Response for MITRE ATT&CK
Gurucul Experts Speak on Insider Threats at 2021 TechNet Cyber
October 15, 2021
Gurucul Experts Speak on Insider Threats at 2021 TechNet Cyber
Gurucul Extends Behavior-based Security Analytics to Entire IT Stack
February 27, 2019
Gurucul Extends Behavior-based Security Analytics to Entire IT Stack
Gurucul named 2022 SIIA CODiE Award Finalist in Big Data
May 24, 2022
Gurucul named 2022 SIIA CODiE Award Finalist in Big Data
Gurucul Offers COVID-19 Cyber Risk Models Tailored with ML
April 1, 2020
Gurucul Offers COVID-19 Cyber Risk Models Tailored with ML
Gurucul Positioned Furthest to the Right in 2022 Gartner SIEM Quadrant
October 20, 2022
Gurucul Positioned Furthest to the Right in 2022 Gartner SIEM Quadrant
Gurucul Recognized as Vendor for Fraud Analytics by Gartner
June 6, 2018
Gurucul Recognized as Vendor for Fraud Analytics by Gartner
Gurucul Sees Record Growth in Revenue, Customers, and Partners in 2021
February 8, 2022
Gurucul Sees Record Growth in Revenue, Customers, and Partners in 2021
Gurucul’s AI/ML Automates Threat Hunting for Faster Response Times
February 20, 2020
Gurucul’s AI/ML Automates Threat Hunting for Faster Response Times
Guruculs’ Integration with Palo Alto Networks Cortex XSOAR
December 14, 2022
Guruculs’ Integration with Palo Alto Networks Cortex XSOAR
How Access Analytics Solves Critical Security Controls
July 5, 2022
How Access Analytics Solves Critical Security Controls
How Federal Agencies Can Thwart Nation-State Attacks
December 6, 2021
How Federal Agencies Can Thwart Nation-State Attacks
How to Choose the Right SIEM Solution
October 11, 2023
How to Choose the Right SIEM Solution
How to Detect Zero Day Attacks with an Analytics-Driven SIEM
August 16, 2021
How to Detect Zero Day Attacks with an Analytics-Driven SIEM
Identify Good UEBA Data with “Feature Analysis”
November 15, 2018
Identify Good UEBA Data with “Feature Analysis”
Identify Outlier Access with “Clustering and K-Means”
October 4, 2018
Identify Outlier Access with “Clustering and K-Means”
Key Initiatives for Improving Threat Detection and Response
February 21, 2022
Key Initiatives for Improving Threat Detection and Response
Look Beyond External Threats to Insider Threats
February 28, 2022
Look Beyond External Threats to Insider Threats
Machine Learning 101
November 29, 2022
Machine Learning 101
Machine Learning Madness at Black Hat USA!
August 3, 2018
Machine Learning Madness at Black Hat USA!
May I Have The Envelope Please…
June 2, 2021
May I Have The Envelope Please…
More Cowbell Baby!
April 30, 2019
More Cowbell Baby!
Optimize the Entire Security Operations Lifecycle Experience Using AI
August 8, 2023
Optimize the Entire Security Operations Lifecycle Experience Using AI
Pinpoint Departing Users with “Predictive Flight Risk”
August 30, 2018
Pinpoint Departing Users with “Predictive Flight Risk”
Prevent Advanced Attacks with Gurucul’s Multi-channel Fraud Analytics
May 16, 2018
Prevent Advanced Attacks with Gurucul’s Multi-channel Fraud Analytics
Prevent Fraud with “Rare and Volume Based Analytics”
October 16, 2018
Prevent Fraud with “Rare and Volume Based Analytics”
Protect Classified Information with “Identity Classification”
January 8, 2019
Protect Classified Information with “Identity Classification”
Risk Analytics 7.0: Machine Learning for Real-Time Threat Detection
March 6, 2019
Risk Analytics 7.0: Machine Learning for Real-Time Threat Detection
RSA Conference Security Trends: IAM Analytics for Zero Trust and XDR
July 7, 2022
RSA Conference Security Trends: IAM Analytics for Zero Trust and XDR
SEC Breach and Warnings of Security Vulnerabilities
October 16, 2017
SEC Breach and Warnings of Security Vulnerabilities
Sophisticated Cyberattacks Pit Security Teams Against the Clock
April 5, 2022
Sophisticated Cyberattacks Pit Security Teams Against the Clock
Stop Fileless Malware with “Abnormal PowerShell Command Execution”
October 11, 2018
Stop Fileless Malware with “Abnormal PowerShell Command Execution”
Streamline Investigations with “Link Analysis”
December 1, 2018
Streamline Investigations with “Link Analysis”
The Challenges of Extracting Critical Security Data from SIEMs
June 5, 2018
The Challenges of Extracting Critical Security Data from SIEMs
The Number 1 Enemy of XDR and SIEM: Dwell Time
January 10, 2022
The Number 1 Enemy of XDR and SIEM: Dwell Time
The ROI of SIEM Machine Learning: Cost Savings and Risk Reduction
October 6, 2023
The ROI of SIEM Machine Learning: Cost Savings and Risk Reduction
The Vanishing Security Perimeter
February 9, 2017
The Vanishing Security Perimeter
Thwart Money Laundering with “Dimensionality Reduction”
October 31, 2018
Thwart Money Laundering with “Dimensionality Reduction”
Top 10 Blog Posts of 2018
January 2, 2019
Top 10 Blog Posts of 2018
Top 10 Gurucul Blog Posts of 2021
January 4, 2022
Top 10 Gurucul Blog Posts of 2021
Top UEBA Use Cases to Fuel Modern, Next-Gen Security Operations
August 11, 2022
Top UEBA Use Cases to Fuel Modern, Next-Gen Security Operations
Using Data to Fuel Transformation Across the Business
February 1, 2021
Using Data to Fuel Transformation Across the Business
What is Machine Learning?
April 18, 2022
What is Machine Learning?
When Rules Don’t Apply
January 17, 2018
When Rules Don’t Apply
Why did Machine Learning Arrive Late to Predictive Security Analytics?
April 4, 2017
Why did Machine Learning Arrive Late to Predictive Security Analytics?
XDR Unifies Security Telemetry to Contextualize Risk
February 9, 2021
XDR Unifies Security Telemetry to Contextualize Risk
.