Insider Threat Demo Overview
Get the perspective of an analyst using the Gurucul platform to detect true insider threats, collaborate with cross-functional stakeholders and expedite purposeful action for quick insider threat response.
Read More
Citrine Informatics Next-Gen SIEM Customer Testimonial Video
Bob Vail, Chief Information Security Officer at Citrine Informatics led the search for a next-generation SIEM solution that ...
Read More
CIO TV Interviews Gurucul’s CTO, Nilesh Dherange
Nilesh Dherange talks about the cybersecurity landscape and how it is evolving at the GISEC 2023 Global Cyber Security Conference in Dubai.
Read More
Allina Health Customer Story: Monitoring Medical Devices
Allina Health needed to maintain the security of the medical devices throughout its hospital network.
Read More
Automating Real-time Threat Detection with Behavior Analytics
Infosys is a large IT consulting services company with 200,000 employees in 100 locations across 50 countries.
Read More
Customers Discuss Gurucul’s Security Analytics Technology
Hear from Gurucul customers directly as they share their experiences working with Gurucul’s real-time behavior based security analytics and intelligence technology.
Read More
How Do We Detect Insider Threats?
Insider threats are the biggest cyber security issue for companies and big organizations because they can cause the most damage.
Read More
Behavior Analytics and Model Driven Security
Our customers are changing their provisioning workflows. They're using automation instead of manually provisioning access.
Read More
Aetna Gurucul Customer Story: Model Driven Security
As a Fortune 100 Health Insurance Provider, Aetna is using Gurucul Risk Analytics to automate front line security controls.
Read More
Allina Health Customer Story: Protecting Patient Privacy
Watch this video to understand how Allina Health used Gurucul’s Risk Analytics (GRA) to protect Players' and VIP medical records at the Super Bowl in Minneapolis.
Read More
Infrastructure and Bringing in New Technology: Advice to a New CISO
It is very important for a new CISO to know the business. For that the CISO might want to talk to partners and users to understand what is working and what is not
Read More
How Directories and Identity Management are Changing
Hear cyber security leaders talk about evolution of identity management and use (or misuse) of typical directory solutions.
Read More