Analytics & Intelligence Survey

Published on February 23, 2015

SANS recently released a sponsored report, “Analytics and Intelligence Survey 2014” by David Shackleford. I found the data interesting when read in detail, but would like to see more analysis and recommendations rather than graphs of data. I’ve followed Shackleford’s publications in the past, and this report may be more...

Anthem, it’s all about Access!

Published on February 23, 2015

As we look for details about the recent Anthem breach, one question arises: are we spending our time and efforts on the right problem? If we analyze the few details coming out of the Anthem breach, one becomes VERY obvious to me – risky access. I’m not talking about the...


Published on August 5, 2014

Come meet with Securonix Experts at booth #919 and explore the latest in security analytics technology. Over 30 people including senior management from Securonix will be available to demonstrate Security Analytics use cases and discuss customer case studies around Cyber Intelligence, Data Exfiltration, High Privileged Accounts, Cloud Security Analytics, Fraud Intelligence, Identity &...

Snowden Leaks Cost Nation’s Cyber Security Efforts, Former NSA Official Says

Published on June 19, 2014

The Snowden leaks “unfairly, inappropriately, unfortunately” damaged the private sector, said Chris Inglis, the former NSA deputy. Mr. Inglis made his comments Tuesday at The Wall Street Journal’s CFO Network annual meeting in Washington, D.C. Mr. Inglis retired from the NSA in January and will join Securonix’s advisory board, the...

Is Your Antivirus Software Really Protecting Your Business?

Published on June 18, 2014

"Antivirus is a good and necessary protection, but is only part of a security solution," said David Swift, principal architect at security intelligence platform Securonix. "The facts show that a determined attacker will get in, and that a vast majority of the losses are going to come from external attackers...

What is the cost of a breach and how can we prevent it?

Published on April 25, 2014

What is the cost of a breach and how can we prevent it? The recent breach at Experian prompted a lot of press, but most of the questions being asked are all wrong. There is no magic product that can prevent all attacks. Target, Snowden, TJX, Sony…pick your favorite example,...

From the Desk of the CEO – 2014 Predictions

Published on January 22, 2014

    January 2014 Issue The Year of Security Analytics From the Desk of the CEO 2013 Reflections and 2014 Predictions on the field of Security Analytics and Intelligence Dear Colleagues, 2013 was a watershed year for Securonix and the field of security analytics. Since getting started in this emerging...

Authentication Against Active Directory

Published on September 16, 2013

Securonix has the ability to authenticate against a single domain. The authentication configuration are to be made to the file available in the securonix_home/conf directory. The securonix system currently authenticates against a single domain and does not support authentication against multiple domains. Make the following changes to the

What you don’t know can most definitely hurt you

Published on September 13, 2013

It’s always something. You might run a careful, security conscious shop. Your IT group might be completely onboard, keeping their patches current and using best practices for provisioning accounts and supporting mobile devices.  And you pay attention - you think about lost or stolen laptops, vulnerable IP Cameras and SSH key...

Using Securonix for Directory-Based Service Account Monitoring

Published on August 23, 2013

I was recently working with one of our customers, a very large health care services and administration company, to implement the Securonix solution to solve a different kind of enterprise network security problem.  Both the information security team and the network administration people were struggling with managing and monitoring accounts...

Security Intelligence – But What Does It DO?

Published on August 22, 2013

It seems like everybody’s talking about security intelligence these days.  Of course, what people mean when they use the term can vary widely depending upon what they’re selling, but the primary purpose remains the same.  Some kind of machine intelligence that can detect successful cyber attacks, information theft, fraud and...