Blog

Why Platforms Win

Published on February 20, 2020

By Jon Garside, Director of Product Marketing, Securonix We are formally announcing something we have been selling and communicating to partners and prospective clients for months – the Securonix Security Operations and Analytics Platform. The eagle eyed amongst you will have heard Jack Poller of ESG, and myself discussing it...

120,000 Ways to Become a Better Leader

Published on February 20, 2020

by Jon Garside, Director Product Marketing, Securonix Gartner recently published the 2020 Magic Quadrant for Security Information and Event Management (SIEM), and Securonix was named a leader, again. We were humbled and honored to receive the recognition. It reflects both our customers’ successes, and our investments in technology and people....

Securonix Threat Research: Detecting High-Impact Targeted Cloud/MSP $14M+ Ryuk and REvil Ransomware Attacks

Published on December 19, 2019

By Oleg Kolesnikov, Securonix Threat Research Team Updated January 3, 2020   Figure 1: Example of Recent REvil Targeted Ransomware Attack Payload Targeting Major Cloud Data Center Provider (December 2019)   The Securonix Threat Research Team has been actively investigating the details of recent, critical targeted ransomware attacks against healthcare...

Behavioral Analytics: Telltale signs of attack deciphered

Published on December 3, 2019

By Abhishek RVRK Sharma, Senior Technical Marketing Engineer at Securonix   In security, behavioral analytics allow you to find anomalous behavior which could point to an attack. For example, look at the school of fish in the picture above. Can you find the fish behaving oddly? Take a second or...

How MITRE ATT&CK Alignment Supercharges Your SIEM

Published on October 24, 2019

Alignment, not mapping, is the only way to truly adopt the MITRE ATT&CK Framework. Here’s how. By Abhishek RVRK Sharma, Senior Technical Marketing Engineer at Securonix   One Minute Takeaway Do you only have a minute to spare? Here’s what you need to know: MITRE methodology alignment vs. MITRE alert...

Data Enrichment: The Key Ingredient for SIEM Success

Published on October 21, 2019

By Abhishek RVRK Sharma, Senior Technical Marketing Engineer at Securonix   Data enrichment is the key ingredient required for effective threat detection, investigation, and response. Using enriched data makes dealing with security threats easier and more efficient. Security has evolved tremendously over the years. Today there are so many security...

Threat Chains: Combating Today’s Multi-Tier Threat Landscape

Published on October 7, 2019

By Abhishek RVRK Sharma, Senior Technical Marketing Engineer at Securonix   From a security standpoint, today’s enterprise IT environment has changed significantly over the past few years. A few years ago, a security analyst would have had to deal with separate dashboards for their antivirus, email gateway, firewall, switches and...

Python Script or Monty Python – Competency is Important

Published on September 30, 2019

AWS and Enterprise SIEM - Why the Cloud Should Host Your SIEM By Jon Garside, Director of Product Marketing at Securonix (still just a geek in a suit) Hybrid is the new standard in defined enterprise environment. A mixture of on-premises, VM, cloud infrastructure, and cloud applications is now a...

Counter Identity-Driven Threats With Identity Analytics and Intelligence

Published on July 24, 2019

By Abhishek RVRK Sharma, Senior Technical Marketing Engineer at Securonix   Mitigate a Major Cause of Data Breaches Identities have traditionally been managed with dedicated identity management software. That made sense when enterprise applications were on-premise, in secure data centers whose keys were only handed over to trusted agencies. Enterprise...

The Anatomy of a Modern SIEM

Published on July 15, 2019

By Abhishek Sharma, Senior Technical Marketing Engineer at Securonix The 8 Critical Features of a Modern SIEM The cybersecurity landscape is getting more complex. Hackers continue to innovate, and business technologies generate increasing amounts of data. This is making legacy security information and event management (SIEM) solutions obsolete as they...

Security as a Service? Making managing a complex threat environment look easy.

Published on June 26, 2019

Intellyx BrainBlog for Securonix by Jason English Comprehensive, proactive, responsive security practices were once the exclusive realm of larger companies and government institutions, with the capital and personnel to invest in running SecOps control rooms staffed with security experts. Fortunately, those centralized control days are long gone. We are erasing...