Video

Insider Threat Demo Overview

Get the perspective of an analyst using the Gurucul platform to detect true insider threats, collaborate with cross-functional stakeholders and expedite purposeful action for quick insider threat response.

Read More

Citrine Informatics Next-Gen SIEM Customer Testimonial Video

Bob Vail, Chief Information Security Officer at Citrine Informatics led the search for a next-generation SIEM solution that ...

Read More

CIO TV Interviews Gurucul’s CTO, Nilesh Dherange

Nilesh Dherange talks about the cybersecurity landscape and how it is evolving at the GISEC 2023 Global Cyber Security Conference in Dubai.

Read More

Allina Health Customer Story: Monitoring Medical Devices

Allina Health needed to maintain the security of the medical devices throughout its hospital network.

Read More

Automating Real-time Threat Detection with Behavior Analytics

Infosys is a large IT consulting services company with 200,000 employees in 100 locations across 50 countries.

Read More

Customers Discuss Gurucul’s Security Analytics Technology

Hear from Gurucul customers directly as they share their experiences working with Gurucul’s real-time behavior based security analytics and intelligence technology.

Read More

How Do We Detect Insider Threats?

Insider threats are the biggest cyber security issue for companies and big organizations because they can cause the most damage.

Read More

Behavior Analytics and Model Driven Security

Our customers are changing their provisioning workflows. They're using automation instead of manually provisioning access.

Read More

Aetna Gurucul Customer Story: Model Driven Security

As a Fortune 100 Health Insurance Provider, Aetna is using Gurucul Risk Analytics to automate front line security controls.

Read More

Allina Health Customer Story: Protecting Patient Privacy

Watch this video to understand how Allina Health used Gurucul’s Risk Analytics (GRA) to protect Players' and VIP medical records at the Super Bowl in Minneapolis.

Read More

Infrastructure and Bringing in New Technology: Advice to a New CISO

It is very important for a new CISO to know the business. For that the CISO might want to talk to partners and users to understand what is working and what is not

Read More

How Directories and Identity Management are Changing

Hear cyber security leaders talk about evolution of identity management and use (or misuse) of typical directory solutions.

Read More