Securonix – Cyber Security Company Review

Securonix, the industry-leading security analytics platform for advanced threat detection, ahas been selected by Computer Technology Review as winner of an MVP Award recognizing leaders within the IT security space.

Key Features:

  • Insider Threat Management – Detect, prevent, and manage insider threats from employees, contractors, and partners
    • Data theft detection and prevention
    • Fraud detection and prevention
    • VIP snooping detection and prevention
  • Identity & Access Analytics – Focus your identity and access management efforts where it counts.
    • Cleanup rogue access privileges
    • Risk-based access reviews
    • Risk-based access certifications
    • Risk-based access requests
  • Data Exfiltration Intelligence – Detect high-risk data access and usage at the source while transforming an existing DLP program with identity context, advanced analytics, and visualization
    • Data theft detection and prevention
    • VIP Snooping
    • IP Protection
    • Securonix for SharePoint
    • Securonix for Vontu
    • Securonix for WebSense
    • Securonix for McAfee DLP
  • Network Security Analytics – Get advanced threat detection and response with identity context, advanced analytics, and visualization for your existing SIEM program.
    • Insider threat Management
    • Application risk Analytics
    • Fraud monitoring
    • Securonix for ArcSight
    • Securonix for McAfee ESM
    • Securonix for Splunk
  • Application Security Analytics – Threat and risk monitoring for your critical business applications and the data they hold.
    • Custom applications
    • ERP applications
    • Document management systems
    • Clinical systems
    • Cloud applications
    • Securonix for SAP
    • Securonix for EPIC
  • Privileged Account Analytics – Real-time threat monitoring of service, shared, and high privileged user accounts.
    • Continuous real-time privileged account Analytics
    • Service account abuse monitoring
    • Securonix for Lieberman
  • Big Data Security Intelligence – Plug and play security analytics for big data solutions.
    • Securonix for Hadoop
    • Securonix for Splunk
  • Cyber Threat Analytics – Identity and behavior risk intelligence for rapid advanced threat detection.
    • Targeted attack detection
    • Advanced persistent threat detection
    • Advanced malware detection
  • MSSPs – Advanced security analytics for next generation managed security services.
    • Application risk monitoring
    • Insider threat management
    • Continuous risk monitoring
    • Forensics and Investigations
  • Continuous Risk Monitoring – Automated data driven IT risk monitoring delivered in business context.
    • IT risk monitoring and reporting
    • Securonix for iPost
  • Compliance – Risk-based compliance solutions for streamlined detection, monitoring, and auditing controls.
    • SOX
    • PCI
    • FISMA
    • ITAR
    • HIPAA/HITECH

Detailed View:

  • The Securonix technology utilizes intelligent behavior-based analytics and peer group analysis techniques to detect unseen attacks launched from within or outside the perimeter of an organization.”
  • Adopters of Securonix have been praising its sophistication and accuracy, particularly its insider threat detection capabilities.
  • The Securonix platform has proven successful at finding insider attacks; unknown attacks, and effectively defending enterprises from new and emerging attackers as it identifies behaviors that indicate threat, rather than just known threats.
  • Securonix is now enjoying widespread adoption at some of the world’s largest global enterprises.
  • Performs continuous threat monitoring of activities, transactions and access
  • Detects unseen threats that never trigger known signatures
  • Acts on threats with the highest risk score for maximum impact
  • Detects threats posed by insiders and external hackers misusing legible accounts
  • Eliminates rubber stamping and reduces access certification workload by 90%
  • Reduces the number of false alerts generated by DLP products by over 60%
  • Cleans rogue access privileges and implements continuous outlier detection
  • Detects misuse of high privileged, service and elevated privilege accounts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.