Securonix Announces the Release of Data Exfiltration Intelligence; Application Delivers the Industry’s First Proactive Detection and Prevention Against Insider and External Data Exfiltration Attacks – March 7, 2014 @ 3:51 pm

LOS ANGELES, CA and SAN FRANCISCO, CA–(Marketwired – Feb 25, 2014) – Securonix today announced release 4.6 of its Data Exfiltration Intelligence application. The release introduces the industry’s first true data exfiltration detection and prevention solution with a “user-centric” threat …

» Continue reading

Securonix Announces Interoperability With HP ArcSight for Next Generation Security Operations and Insider Threat Management; Interoperable Solution Delivers Industry’s First Security Intelligence Center – February 25, 2014 @ 2:30 am

Certified Bi-Directional Solution Leverages Behavior and Identity Analytics to Promote Detection of Insider Threats and Other Sophisticated Attacks LOS ANGELES, CA — (Marketwired) 02/24/14 — Securonix announced today that it has received certification for an extended bi-directional interoperability between the …

» Continue reading

From the Desk of the CEO – 2014 Predictions – January 22, 2014 @ 1:32 am

January 2014 Issue The Year of Security Analytics               From the Desk of the CEO   2013 Reflections and 2014 Predictions on the field of Security Analytics and Intelligence   Dear Colleagues,   2013 was …

» Continue reading

Authentication Against Active Directory – September 16, 2013 @ 7:58 pm

Securonix has the ability to authenticate against a single domain. The authentication configuration are to be made to the ldap-config.properties file available in the securonix_home/conf directory.

» Continue reading

What you don’t know can most definitely hurt you – September 13, 2013 @ 5:53 pm

It’s always something. You might run a careful, security conscious shop. Your IT group might be completely onboard, keeping their patches current and using best practices for provisioning accounts and supporting mobile devices.

» Continue reading

Using Securonix for Directory-Based Service Account Monitoring – August 23, 2013 @ 8:00 pm

I was recently working with one of our customers, a very large health care services and administration company, to implement the Securonix solution to solve a different kind of enterprise network security problem. Both the information security team and the network administration people were struggling with managing and monitoring accounts with High Privilege Access, particularly Service Accounts.

» Continue reading

Security Intelligence – But What Does It DO? – August 22, 2013 @ 10:20 pm

It seems like everybody’s talking about security intelligence these days. Of course, what people mean when they use the term can vary widely depending upon what they’re selling, but the primary purpose remains the same. Some kind of machine intelligence that can detect successful cyber attacks, information theft, fraud and breaches as they happen.

» Continue reading

Applying Advanced Fraud Detection Technology to “Old School” Fraud attempts? – July 19, 2013 @ 5:57 pm

As consumers adopt new technologies to do “routine” tasks, and as companies roll out new ways to interact with business services centered on the web and mobile devices, provisions have to be made to support those customers who for whatever reason do not have access to the necessary tools and gadgets.

» Continue reading

“The Snowden Case”, Lies and Marketing Communications on Insiders – July 12, 2013 @ 4:46 pm

One of the more interesting outgrowths of the recent revelations around NSA cyber-surveillance practices is the sudden declaration from all manner of information security vendors that their product or service could have “prevented Snowden”.

» Continue reading

Voluntary Self-Hackery — The Blunt Truth about BYOD – July 1, 2013 @ 2:41 pm

In a sense, the entire discussion around BYOD processes in the enterprise is moot. Everyone has a smart phone. Many have found they prefer a tablet to a PC, and will bring their tablet to work.

» Continue reading