View

Sorting

Products found: 2

logo
Offer a reference bonus
1.00

Securonix Enterprise

 Using patent pending signature-less anomaly detection techniques that track user, account, and system behavior, Securonix Enterprise automatically and accurately detects the most advanced and sophisticated insider threats and cyber attacks. Detect insider threats and cyber attacks that go unnoticed by signature-based technologies Focus on protecting the data that is the most valuable to the organization Reduce the number of alerts and incidents that warrant investigations Entity Profiling Securonix aggregates everything of importance to a user, account, application, device, to create a unified view for every entity. Securonix automatically learns each entity’s normal behavior patterns and track its risk posture over time. Threat detection Securonix uses patent pending signature-less anomaly detection algorithms paired with known threat indicators and third party intelligence to continuously monitor data to identify high risk, abnormal, and fraudulent activities from within or outside the organization. Investigation Securonix provides everything that an investigator needs on one screen to investigate and track an incident, and take actions. Investigate any identified threat, security event, user, account, or system using a drag and drop visualization palette to explore linkages in data. Product Highlights High-Risk Entity Dashboard Securonix’s High-Risk Entity Dashboard provides a unified and prioritized view of all the high-risk insider and cyber threats across all users, accounts, hosts, endpoints in the enterprise. Multi-Entity Investigation Workbench Securonix’s Investigation Workbench is a powerful tool for the analyst to visually investigate the most sophisticated threats and attacks using simple drag-and-drops, and identify similarities and anomalies between all entities in the organization. Advanced Correlation of 3rd Party Intelligence Securonix combines event analytics with over 15 3rd party intelligence providers to correlate events in the network with known bad threat actors and suspicious network events such as remote access to sensitive data from abnormal geographical locations. Data Encryption and Masking Securonix’s data encryption and masking capabilities provides the complete capability to secure, encrypt, and mask PII (Personally Identifiable Information) data, which is in alignment with the most stringent data security and privacy requirements in the industry. Product Key Features Real-Time Behavior Analytics Real-Time creation and continuous update of behavior profiles for every entity and peer group at the time of data and event ingestion. Threat Dashboards Personalized and fully-customizable threat dashboards presenting prioritized and aggregated risk scores by organization and department. Threat Management Threat management capability for the analysts to review, investigate and escalate incidents, including embedded incident management system with customizable workflows. Threat Library The industry’s largest and most mature library of threat models and indicators to detect the most advanced insider and cyber attacks. Scalability Horizontally scalable architecture able to monitor organizations with close to 1 million users and billions of transactions per day. Third-Party Integrations Data collection and analysis from over 200 supported data sources directly, or from any major log aggregation and SIEM technologies.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
3
2
logo
Offer a reference bonus
1.00

Securonix User and Entity Behavior Analytics (UEBA)

Securonix UEBA threat detection is built on the latest advanced data sciences concepts, and leverages a big data Hadoop technology stack to enable the required supervised and unsupervised machine learning algorithms for highly accurate attack detection and prioritization. Securonix’s team of scientists and analysts, led by Chief Scientist Igor Baikalov (former head of security intelligence at Bank of America), continuously builds and updates threat models specific to data sources and industries. With our list of marquee customers, Securonix has the most comprehensive and mature set of behavior-based threat models in the industry. Our research efforts are further bolstered by our Threat Research Labs, focused on threat research, response and behavior analysis based detection of critical attacks and data breaches (like WannaCry, NotPetya and the recent Equifax breach). Reduce Your Risk of Insider Threats
  • Build a comprehensive risk profile of every user in your environment, based on identity, employment, security violations, IT activity and access, physical access, and even phone records.
  • Identify true areas of risk by comparing user activity to their individual baseline, their peer group baseline, and known threat indicators.
  • Results are scored and presented in interactive scorecards.

Clear Visibility into Your Cloud
  • Provide cloud-to-cloud monitoring capabilities with built-in APIs for all major cloud infrastructure and application technologies.
  • Detect malicious activity by analyzing user entitlements and events.
  • Correlate cloud data and on-premises data to add entity context information.
  • Analyze end-to-end activities to detect actionable threat patterns.

Proactive Enterprise Fraud Detection
  • Identify complex fraud attacks that typically escape signature-based detection methods using advanced signatureless behavior and peer-based outlier analysis techniques.
  • Detect account takeover, anomalous user behavior, transaction fraud, and anti-money laundering violations.

Revolutionize Your Cloud Security With Securonix Cloud you can enjoy all the capabilities of Securonix Security Analytics Platform, with the convenience of a software-as-a-service (SaaS) solution. It provides security that spans across your cloud infrastructure, data, applications, and access control solutions. Benefit from the quick deployment, easy scalability, and shorter time to value of Securonix Cloud.  
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
3
7

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.