Resources

Read More

Threat Research

Securing Your Remote Workforce – Detecting Teleconferencing Tools Attacks in the Work-From- Home (WFH) World – Part 2

The Securonix Threat Research team has recently been observing a number of new attacks/ security issues reported involving different remote workforce teleconferencing applications (TA), including Zoom, Cisco Webex, and Microsoft Teams. Some examples of the attacks/exploits reported include Zoom UNC...
Read More

Securing Your Remote Workforce – Detecting the Latest Cyberattacks in the Work-From-Home (WFH) World: Part 1

In recent weeks, as many businesses have been rushing to institute a shift to remote work due to the COVID-19/coronavirus situation, we have been observing malicious threat actors attempting to exploit an increasing number of the associated cyberattack vectors. Download...
Read More

Detecting High-Impact Targeted Cloud/MSP $14M+ Ryuk and REvil Ransomware Attacks

The Securonix Threat Research Team has been actively investigating the details of recent, critical targeted ransomware attacks against healthcare and data center cloud and managed service providers (MSP) that have been reported over the past couple of weeks. These attacks...
Read More

Webinars

Detecting the Unknown Threats: An Identity-Driven Approach

With our perimeters expanding beyond the confines of the typical workspace, it has become increasingly evident and critical to monitor the threats posed using insider credentials. Regardless of whether the threats are accidental or intentional, they both ultimately lead to...
Read More

Protecting Against Insider Threat in 2020

In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made...
Read More

Defending the New Normal with Advanced Detection Logic

Organizations are experiencing a changing cyber threat landscape. Phishing and malware attacks are on a rise and more effective than ever before because of the fear factor and lack of in-person communication. Having a large workforce working remotely presents more...
Read More

Datasheets

Security Operations and Analytics Platform Data Sheet

The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network traffic analysis (NTA); and security orchestration, automation and response (SOAR) into a complete, end-to-end security operations...
Read More

Securonix Security Orchestration Automation and Response Data Sheet

The approach of sending alerts directly from legacy security information and event management (SIEM) to security orchestration, automation, and response (SOAR) creates an overload in the SOAR solution with too many false positives that are not actionable. By adding a...
Read More

Securonix Network Traffic Analysis Data Sheet

Customers today struggle to detect the sophisticated slow and low attacks which require monitoring a blend of network traffic activity, user actions, and system behavior patterns. Stand-alone network traffic analysis tools can monitor traffic and detect network traffic anomalies, however,...
Read More

Analyst Reports

Gartner: Critical Capabilities for Security Information and Event Management 2020

We believe that the Gartner Critical Capabilities for Security Information and Event Management is the leading guide to understanding your options in the SIEM market. In the 2020 edition of the report, Securonix has received the highest score in three...
Read More

2020 Gartner Magic Quadrant For SIEM

Organizations have embraced cloud, multi-cloud and cloud-based applications for their IT and business processes. It offers businesses the best value in terms of cost,  availability, and flexibility - however, it also introduces additional risk, while not addressing the critical shortage...
Read More

ESG Technical and Economic Validation

More than three-quarters (77%) of organizations use ten or more security analytics and operations tools, with SIEM, threat intelligence, and EDR being the most commonly deployed. Download this report and discover how the Securonix Security Operations and Analytics Platform provides...
Read More

White Papers

Securing SWIFT with Securonix

The Securonix platform provides a broad range of security capabilities that can help organizations not only achieve compliance with the SWIFT Customer Security Programme (CSP) requirements, but also detect fraudulent activity and the real-world SWIFT cyberattacks using a single platform....
Read More

SIEM Migration Planning

This document provides guidelines for migrating traditional (legacy) security information and event management (SIEM) deployments to the Securonix Next-Gen SIEM platform. The Securonix Next-Gen SIEM platform has several advantages over a traditional SIEM, and migrating to the platform is a...
Read More

2020 Insider Threat Report

The Securonix Threat Research Team has analyzed hundreds of incidents across several industry verticals in order to understand the various behavior patterns that impose risk to organizations. In this report we take a closer look at such behaviors by examining...
Read More

Case Studies

Insurance Provider Uses Open Platform and Behavioral Analytics to Drive Improved Security

This organization originally had LogRhythm SIEM, but experienced several challenges: Hundreds of new security events per day (with an environment of around 5,000 servers), but only a small team to handle them. Limited time to run investigations and ratify normal...
Read More

Iconic Engine Monitors Security Events with Securonix Next-Gen SIEM on AWS

Iconic Engine, powered by Digital Domain, is a leading provider of an end-to-end extended reality (XR) solution, providing a complete workflow to power and serve the global XR industry. Learn why Iconic Engine chose Securonix Next-Gen SIEM, deployed on the AWS...
Read More

Simeio Uses Securonix Next-Gen SIEM on AWS for Advanced Threat Detection

Simeio is an identity and access management (IAM) solution provider that leverages AWS cloud infrastructure to deliver integrated IAM solutions such as access governance, privileged identity management, and identity administration. Simeio, with its end-to-end identity management solution offering, protects over...
Read More

Solution Briefs

Securonix Phishing Analyzer

Email phishing attacks continue to rise in volume and sophistication. Attacks impersonating legit company domains (typosquatting) and company executives (business email compromise) have been highly successful at encouraging employees to click and respond. Securonix Phishing Analyzer is designed to enhance...
Read More

Securonix Identity and Access Analytics

Securonix integrates with every major IAM and IGA solution to deliver a continuous stream of identity analytics and intelligence allowing for: Improved access management compliance through user- and resource-centric views of access risk. Automated access cleanup and risk-based certification. Streamlined,...
Read More

Integrated Security Visibility with Securonix and Cisco pxGrid

Integrating the Securonix platform and Cisco ISE pxGrid forms a powerful, centralized security solution. Securonix leverages Cisco pxGrid’s cross-platform network security events for identity, threat, and access behavior analytics. Securonix further enriches network security events with machine learning analytics, identifies...
Read More

Infographics