Detecting and managing attacks on IT systems is a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organ ...Login Get full Access
2 Product Description
Gurucul solutions was founded in 2010 in Los Angeles CA where it is a privately held company.
Gurucul predictive risk analytics uses advanced machin ...Login Get full Access
2.1 Predictive Identity Based Behaviour Anomaly Engine™
Gurucul’s products are built on an analytical framework called Predictive Identity Based Behaviour Anomaly EngineTM (PIBAE). PIBAE uses identity as ...Login Get full Access
2.1.1 Access Analytics Platform™ (AAP)
This enables risk based compliance and access provisioning including:
- A real time contextual view of identities, access and activities.
- Identity ...
2.1.2 Cloud Analytics Platform™ (CAP)
This provides visibility of cloud access and related anomalies including:
- Visibility of activities and access to cloud apps related to identities. ...
2.1.3 Threat Analytics Platform™ (TAP)
This provides behaviour based predictive risk scoring:
- A risk scored time line to detect and predict insider and advanced persistent threats.
- Id ...
2.1.4 Multiple Dashboards
The above three platforms, when integrated together, provide multiple dashboards to identify and manage threats as well as to remediate abnormalities. ...Login Get full Access
2.1.5 Deployment Options
The products can be deployed in a number of ways, an interruption of service is not required and they work with existing infrastructure:
- GRA appli ...
2.2 Essential Characteristics
Gurucul Predictive Risk Analytics provides functionality that spans Access Governance and Security Intelligence. This section compares the functionali ...Login Get full Access
2.2.1 Access Governance
Access Governance is concerned with providing the answers to three key questions:
- Who has access to what?
- Who has accessed what?
- Who has gr ...
2.2.2 Multiple sources of data
Gurucul Risk Analytics consumes data from multiple technologies such as HR Systems, Identity & Access Management solutions, log aggregators, applicati ...Login Get full Access
2.2.3 Access Analytics
The analytics platforms are built upon Gurucul’s patented machine learning models (150+) that run against hundreds of attributes to build a behaviou ...Login Get full Access
2.2.4 Security Intelligence
Access governance provides an important foundation for security intelligence. Cyber-criminals now exploit human and technical weaknesses to infiltrate ...Login Get full Access
2.2.5 Automated response, remediation and recovery
Gurucul Predictive Risk Analytics includes a workflow capability to manage the remediation of detected anomalies and risks. This covers both the adjus ...Login Get full Access
The potential volume and rate of data that a security analytics tool has to deal with is enormous – scalability is therefore very important. Gurucul ...Login Get full Access
Gurucul Risk Analytics consists of a set of integrated platforms that work together “out of the box”. It provides connectors to ingest data from a ...Login Get full Access
3 Strengths and Challenges
Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management as well as the prediction and dete ...Login Get full Access
4 Related Research
Advisory Note: Real Time Security Intelligence - 71033
Blog: Real-time Security Intelligence – more than just “next generation SIEM”
Leadership Compass: Access Governance - 70948
Advisory Note: Identity & Access Management/Governance Blueprint - 70839
Advisory Note: Access Governance Architectures - 71039