Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Identify and flag any files or user behaviors that present a significant risk warranting attention from business management. This user and entity behavior analytics (UEBA) system employs advanced, rule-driven modeling to analyze various data sources, helping to identify established behavioral norms and detect potentially harmful activities. By conducting thorough analysis, it can significantly lower the risk of insider threats, which are notoriously hard to identify due to the insider's familiarity with security protocols and their ability to circumvent them. Monitor for abnormal events, such as logins from user accounts belonging to former employees, users logging in from multiple locations at once, or unauthorized individuals accessing an excessive number of sensitive documents. Additionally, keep an eye on file-related risks, including unauthorized attempts to decrypt confidential information. User-specific risks should also be observed, such as an increase in the frequency of file decryption, an uptick in printing after business hours, or a rise in the number of files sent to external parties. Overall, this comprehensive approach aims to enhance organizational security by proactively identifying potential threats.
Description
Our security controls, driven by data science, facilitate the automation of advanced threat detection, remediation, and response. Gurucul’s Unified Security and Risk Analytics platform addresses the crucial question: Is anomalous behavior truly a risk? This unique capability sets us apart in the industry. We prioritize your time by avoiding alerts related to non-risky anomalous activities. By leveraging context, we can accurately assess whether certain behaviors pose a risk, as understanding the context is essential. Merely reporting what is occurring lacks value; instead, we emphasize notifying you when a genuine threat arises, which exemplifies the Gurucul advantage. This actionable information empowers your decision-making. Our platform effectively harnesses your data, positioning us as the only security analytics provider capable of seamlessly integrating all your data from the outset. Our enterprise risk engine can absorb data from various sources, including SIEMs, CRMs, electronic medical records, identity and access management systems, and endpoints, ensuring comprehensive threat analysis. We’re committed to maximizing the potential of your data to enhance security.
API Access
Has API
API Access
Has API
Integrations
Amazon GuardDuty
Azure Service Fabric
Bitbucket
Cisco Duo
Cloudera
Docker
Dropbox
Google Authenticator
Hadoop
Kubernetes
Integrations
Amazon GuardDuty
Azure Service Fabric
Bitbucket
Cisco Duo
Cloudera
Docker
Dropbox
Google Authenticator
Hadoop
Kubernetes
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Fasoo
Country
United States
Website
en.fasoo.com/products/fasoo-riskview/
Vendor Details
Company Name
Gurucul
Founded
2010
Country
United States
Website
gurucul.com
Product Features
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring