Threat Research
Detecting SolarWinds/SUNBURST/ECLIPSER Supply Chain Attacks
The Securonix Threat Research (STR) team has been actively investigating the critical ongoing SolarWinds Orion/SUNBURST supply chain attacks (monitored by STR as ECLIPSER) with some of the recent victims being one of the leading security vendors as well as a...
Read More
Detecting WastedLocker Ransomware Using Security Analytics
The Securonix Threat Research Team (STR) is actively investigating the details of the critical targeted Wastedlocker ransomware attacks that reportedly already exploited more than 31 companies, with 8 of the victims being Fortune 500 companies, to help our customers detect,...
Read More
Securing Your Remote Workforce - Detecting Teleconferencing Tools Attacks in the Work-From- Home (WFH) World - Part 2
The Securonix Threat Research team has recently been observing a number of new attacks/ security issues reported involving different remote workforce teleconferencing applications (TA), including Zoom, Cisco Webex, and Microsoft Teams. Some examples of the attacks/exploits reported include Zoom UNC...
Read More
Webinars
Prioritizing Risk to Reduce Supply Chain Vulnerabilities
The recent SolarWinds attack was an unpleasant reminder of our interconnected enterprises. Businesses across every economic sector can encounter vulnerabilities not only from within their own environment but also from critical supply chain partners and other third-party dependencies. Prioritizing risk...
Read More
Cloud SIEM and a Multi-Cloud Security Monitoring Strategy
The scenario where services from multiple public cloud providers - such as AWS, Azure, and GCP - are used by an organization is a reality that increases the security challenges associated with cloud environments. Organizations using the cloud are not...
Read More
Beyond the Hype: Use Cases that Work with Applied Behavioral Analytics
Phishing and other human-facing social engineering tactics remain the primary vectors of successful attacks. The transition to remote work greatly expanded the attack surface and opened new vectors for campaigns. Organized cybercrime groups commonly use zero-day attacks to avoid detection....
Read More
Datasheets
Long-Term Search
With Long-Term Search, organizations can reduce the time needed to investigate and find threats that are already in their environment. Download this data sheet to find out how.
Read More
Security Operations and Analytics Platform Data Sheet
The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network detection and response (NDR); and security orchestration, automation and response (SOAR) into a complete, end-to-end security...
Read More
Securonix Security Orchestration Automation and Response Data Sheet
The approach of sending alerts directly from legacy security information and event management (SIEM) to security orchestration, automation, and response (SOAR) creates an overload in the SOAR solution with too many false positives that are not actionable. By adding a...
Read More
Analyst Reports
The Forrester Wave™: Security Analytics Platforms, Q4 2020
Forrester Research Inc. researched, analyzed, and scored eleven Security Analytics vendors and named Securonix a Leader in The Forrester Wave™: Security Analytics Platforms, Q4 2020. In the 27-criterion vendor assessment, Securonix scored highest in the deployment and data architecture criterion....
Read More
Gartner: Critical Capabilities for Security Information and Event Management 2020
We believe that the Gartner Critical Capabilities for Security Information and Event Management is the leading guide to understanding your options in the SIEM market. In the 2020 edition of the report, Securonix has received the highest score in three...
Read More
2020 Gartner Magic Quadrant For SIEM
Organizations have embraced cloud, multi-cloud and cloud-based applications for their IT and business processes. It offers businesses the best value in terms of cost, availability, and flexibility - however, it also introduces additional risk, while not addressing the critical shortage...
Read More
White Papers
Unlock Exclusive Cloud Native Benefits with the Securonix Next-Gen SIEM and AWS EMR
When security leaders consider a next-generation security information and event management (SIEM) solution, many perform a cost-benefit analysis between threat detection capabilities, solution performance, and the scale of the solution. In this whitepaper, we discuss the cost-benefit analysis of next-generation...
Read More
Securing the Cloud: Protecting Your Enterprise From an Expanding Threat Surface
Security tools built for on-premises infrastructure does not work well against cloud threats. Rules-based threat detection was designed to protect against known threats. As threats become more sophisticated, solutions that are able to detect changes in behavior are required in...
Read More
Network Detection and Response Belongs in the Security Operations Center
Detecting cybersecurity threats has become a big data management challenge. Threat actors employ advanced strategies to hide in hard to find places on your network. In order to detect these threats, you must consolidate data from your entire IT environment...
Read More
Case Studies
Holding Company Stops Phishing and Data Exfiltration With a Single Platform
A large holding company needed to centralize their security efforts. Across the multiple business units the holding company managed there were a variety of different security tools, but no way to achieve centralized security visibility across all tools. Additionally, the...
Read More
Cloud SIEM Saves Regional Financial Institution 50% of an FTE Over On-Premises Solution
A regional bank knew it was time to upgrade their SIEM. Their on-premises LogRhythm SIEM solution was experiencing stability issues causing their security team to spend time maintaining the solution instead of investigating threats. Additionally, their SIEM solution had limited...
Read More
Leading Pharmaceutical Company Uses Securonix With Tanium To Identify Threats To Vulnerable Endpoints
The pharmaceutical industry is seeing a significant uptick in cyber-attacks targeting research patents and trade secrets. Targeted attacks are becoming more advanced and require an approach that can detect malicious zero-day type attacks. With siloed endpoint and security monitoring tools,...
Read More
Solution Briefs
Conquer Your Compliance Monitoring Challenge
Compliance frameworks require specific data security practices, policies, and procedures to be followed. These mandates continue to be refined and expanded, placing an increasingly larger burden on companies to adhere to these regulatory frameworks. Securonix can help alleviate the complexity...
Read More
Amazon Web Services (AWS) Security Monitoring
Organizations large and small use the AWS platform to enable their IT infrastructure, host sensitive applications and data, as well as enable critical enterprise functions. But as usage grows, so does the potential for attack. To help organizations gain visibility...
Read More
Detect and Respond to IoT Security Threats With Securonix and Armis
Integrating Securonix Next-Gen SIEM with the Armis® Agentless Device Security Platform provides you with end-to-end visibility into your enterprise network, across IT, IoT, and unmanaged devices. Armis provides an agentless approach to monitoring and provides baseline device profiles for over...
Read More