Articles

December 18, 2014

Securonix selected as one of CRN’s The 10 Coolest Security Startups Of 2014

Los Angeles-based security analytics and intelligence platform maker Securonix added real-time detection and response to the platform in August. The platform is deployed in-line for threat detection. In addition to providing threat intelligence to bolster security information event management systems, the company provides privilege account monitoring to remove rogue access privileges and monitor user activities to detect insider threats. At the core of the company’s platform is a behavioral snapshot it takes to get a baseline of the users, infrastructure and applications at an organization.

Continue reading
December 10, 2014

Sony hack: Disinformation, extortion or other?

“I’m still surprised how much talk is around the attribution of cyberattack and shock-and-awe nature of it, and how little is said about apparent security lapses at Sony that led to it,” said Igor Baikalov, chief scientist at Securonix, a Los Angeles-based security firm.

Continue reading
December 3, 2014

Hacked vs. Hackers: Game On

“We don’t need ‘big data.’ We need big information,” said Igor Baikalov, a former senior vice president for global information security at Bank of America, now chief scientist at Securonix, a private company that sells threat intelligence to businesses.

Continue reading
November 3, 2014

A balancing act: Apple technology

Such flux and uncertainty created by BYOD has led one company, Securonix, to conclude that centralized ownership and control of enterprise iOS devices is essential. “For now, the key strategy to support iOS devices is to ensure that organizations own the devices and all content of these devices including all the apps installed on the devices,” says Tanuj Gulati, chief technology officer for the Los Angeles-based provider of security intelligence solutions

Continue reading
September 25, 2014

Experts Say ‘Bash’ Bug Is a Major Vulnerability But Not a Major Threat

Companies who have web servers that aren’t updated internally on a frequent basis may be most at risk because they continue to use old technology, according to Kindlund. Some companies who still store private data on Internet-facing servers—an outdated practice, as it makes sensitive information more vulnerable—or do not have strong security may vulnerable as well, but they can take precautions by inspecting each and every of their Linux-based server,s said Tanuj Gulati, CTO of Securonix, a security intelligence firm.

Continue reading
September 18, 2014

How to detect an insider threat

“With external threats, you set up a firewall and it’s easy to block a user’s IP,” said Tanuj Gulati, CTO at Securonix. With an internal threat, “The confidence level has to be extremely high. You can’t just knock on someone’s door and accuse them.”

Continue reading
September 2, 2014

Attacks Mostly Undetected Until Too Late

The attackers have the advantage in that they get to choose who to attack, what resources to go after, how and when. Companies are using static defenses against these attacks and can’t predict where the next attack will come from and what the attackers will try to go after.

Continue reading