Jason Clark CHIEF SECURITY AND STRATEGY OFFICER, OPTIV. Renee Guttmann CHIEF INFORMATION SECURITY OFFICER, ROYAL CARIBBEAN CRUISE LINES

Similar documents
RSA NetWitness Suite Respond in Minutes, Not Months

<Partner Name> <Partner Product> RSA NETWITNESS Security Operations Implementation Guide. Gurucul Risk Analytics

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Integrated, Intelligence driven Cyber Threat Hunting

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

CyberArk Privileged Threat Analytics

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

May the (IBM) X-Force Be With You

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

INTELLIGENCE DRIVEN GRC FOR SECURITY

SIEM Solutions from McAfee

Run the business. Not the risks.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

FOR FINANCIAL SERVICES ORGANIZATIONS

Think Like an Attacker

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

THE IDENTITY DEFINED SECURITY ALLIANCE

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Altitude Software. Data Protection Heading 2018

in collaboration with

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

GDPR COMPLIANCE REPORT

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Security

Building Resilience in a Digital Enterprise

The threat landscape is constantly

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

PALANTIR CYBERMESH INTRODUCTION

The Future of Threat Prevention

with Advanced Protection

MITIGATE CYBER ATTACK RISK

Background FAST FACTS

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

GDPR: An Opportunity to Transform Your Security Operations

MANAGED DETECTION AND RESPONSE

Power of the Threat Detection Trinity

THALES DATA THREAT REPORT

TRUE SECURITY-AS-A-SERVICE

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

the SWIFT Customer Security

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Combating Cyber Risk in the Supply Chain

Reinvent Your 2013 Security Management Strategy

Sustainable Security Operations

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

What matters in Cyber Security

locuz.com SOC Services

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Address C-level Cybersecurity issues to enable and secure Digital transformation

Introducing Cyber Observer

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

CISO MASTERCLASS FOR SENIOR EXECUTIVES 2 DAYS

RiskSense Attack Surface Validation for IoT Systems

RSA INCIDENT RESPONSE SERVICES

CloudSOC and Security.cloud for Microsoft Office 365

Security by Default: Enabling Transformation Through Cyber Resilience

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Vendor Overview This is is the go to value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and inf

PORTFOLIO OVERVIEW. Security. A Comprehensive Set of Security Services for Today s Complex Cyber Security Needs. Portfolio Overview.

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

Securing Your Most Sensitive Data

McAfee MVISION Cloud. Data Security for the Cloud Era

RULES VERSUS MODELS IN YOUR SIEM

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Symantec Security Monitoring Services

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

Privileged Account Security: A Balanced Approach to Securing Unix Environments

RSA INCIDENT RESPONSE SERVICES

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Office 365 Buyers Guide: Best Practices for Securing Office 365

Keys to a more secure data environment

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Securing Office 365 with SecureCloud

2015 VORMETRIC INSIDER THREAT REPORT

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Transcription:

corporate overview

the challenge Organizations are spending billions of dollars a year on security products, however recent security breaches have proven that the traditional security solutions are not providing the cyber security protection they are looking for. With data moving to cloud, the problem is growing exponentially. These security products generate petabytes of data and organizations spend countless man hours to prioritize and identify known risk patterns. But organization still remain vulnerable. our mission Identity based threat detection and deterrence for enterprise and the cloud, to protect against insider threats, prevent data exfiltration, and privilege access misuse. our advisors Gary Eppinger CHIEF INFORMATION SECURITY AND PRIVACY OFFICER, CARNIVAL CORPORATION Gary B. Harbison CHIEF INFORMATION SECURITY OFFICER, MONSANTO Jason Clark CHIEF SECURITY AND STRATEGY OFFICER, OPTIV Jerry Archer CHIEF SECURITY OFFICER, MAJOR FINANCIAL SERVICES COMPANY Joe Sullivan CHIEF SECURITY OFFICER, UBER Malcolm Harkins GLOBAL CHIEF INFORMATION SECURITY OFFICER, CYLANCE Leslie K. Lambert CHIEF SECURITY AND STRATEGY OFFICER (EAB CHAIR), GURUCUL Renee Guttmann CHIEF INFORMATION SECURITY OFFICER, ROYAL CARIBBEAN CRUISE LINES Robert D. Rodriguez CHAIRMAN AND FOUNDER, SECURITY INNOVATION NETWORK (SINET) Teri Takai SENIOR ADVISOR, CENTER FOR DIGITAL GOVERNMENT 1

predictive identity based behavior anomaly engine Gurucul s products are built on an innovative next generation analytical framework called Predictive Identity Based Behavior Anomaly Engine (PIBAE). PIBAE uses identity as the core and overlays activity, alerts, intelligence, and access to provide customers with predictive security analytics and day zero anomaly detection. PIBAE is first of its kind framework that combines user behavior intelligence, big data analytics, and leverages identity as a threat surface to provide Actionable Risk Intelligence. PIBAE is powered by our patented machine learning algorithms that run against hundreds of attributes to build a behavior baseline for an entity and compare it against dynamically created peer groups to detect anomalous patterns. 6. Built for Scale Using Big Data Foundation Intelligence Access 1. Largest Library of Machine Learning Algorithms 5. Signature-Less Technology Identity Activity Alerts (PIBAE) 2. Flexible Meta Data Framework 4. Most Granular & Self Tuning Risk Modeling Capabilities 3. Fuzzy Logic Based Identity Correlation These patterns are evaluated using internal risk modeling algorithms to assert a risk score for an entity. By leveraging this framework, our products & solutions provide organizations with a proactive approach to detect and respond to cybercriminal activity, under-the-radar cyber campaigns and Insider Threats 2

how it works Gurucul Risk Analytics consumes data from multiple technologies such as HR Systems, Identity & Access Management Solutions, Log Aggregators, Applications, Network devices and other endpoints. It normalizes the data into a consistent format, executes advanced correlation algorithms, builds behavior baselines for each identity and its respective peer groups, and then engages predictive modeling libraries to identify insider threats, fraud, and access misuse. Platform Fraud Detection Endpoint Access Analytics Network PREDICTIVE MODELING Insider Threat Deterrence Storage NORMALIZATION BEHAVIOR ANALYTICS User Behavior Analytics Apps ADVANCED CORRELATION HPA Intelligence IDM IP Protection 010101010 101010101 010101010 3 HRMS Cloud Access Security Intelligence

products gurucul risk analytics tm (GRA) Gurucul Risk Analytics is built upon our core PIBAE architecture (Predictive Identity Based Behavior Anomaly Engine TM ). PIBAE identifies anomalous behaviors across users, accounts, applications, and devices by leveraging behavior analytics, machine learning and peer group analysis-vs-modeling. Our big data enabled approach provides organizations with risk based compliance, continuous access governance and protection from under-the-radar cyber campaigns and sophisticated insider activity like IP theft, sabotage, and fraud. AAP TAP CAP access analytics platform tm (AAP) Intelligent access technology that can predict and prevent security risks, assist with high privilege access monitoring, compliance, and intelligent provisioning. threat analytics platform tm (TAP) Intelligent user behavior analytics to deter, detect, and block insider threats, compromised accounts and fraud. cloud analytics platform tm (CAP) Gain full visibility and control over cloud applications to ensure compliance, access governance, monitor insider activity, anomalous behavior alerts. 4

solutions Gurucul is an emerging player in the predictive risk analytics space. Our proven proactive solutions secure data from insider threats, under- the-radar attacks, and other cyber criminal activities. The solutions are designed on the PIBAE architecture and helps businesses with today s cyber security concerns and challenges - detecting behavior anomalies, and data exfiltration, managing access and compliance requirements in the cloud. Cloud Security Analytics Access Intelligence and Analytics Fraud Detection & Prevention User Behavior Analytics SIEM Intelligence Solutions Insider Threat Deterrence IP Protection Self Audit Privileged Access Intelligence 5 Risk Based Access Compliance

awards Gurucul continuously strives towards excellence and innovation. A top technology research leader has recognized us as a cool vendor. Our industrial dominance in the predictive security analytics has been further validated by the fact that we have won a series of awards from various independent analysts. Recognition that validates Gurucul is a leader in the predictive security analytics space. 2017 2016 2015 2014 2013 6

about gurucul Gurucul is transforming the enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor threats, Gurucul provides Actionable Risk Intelligence to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world-renowned experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions. GURUCUL 222 N. SEPULVEDA BLVD., SUITE 1322, EL SEGUNDO, CA 90245 213.259.8472 INFO@GURUCUL.COM WWW.GURUCUL.COM 170602-20