Gurucul Predictive Risk Analytics
1 Introduction
Detecting and managing attacks on IT systems is a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organ ...
Login Free 30-day Select Access Get full Access2 Product Description
Gurucul solutions was founded in 2010 in Los Angeles CA where it is a privately held company.
Gurucul predictive risk analytics uses advanced machin ...
Login Free 30-day Select Access Get full Access2.1 Predictive Identity Based Behaviour Anomaly Engine™
Gurucul’s products are built on an analytical framework called Predictive Identity Based Behaviour Anomaly EngineTM (PIBAE). PIBAE uses identity as ...
Login Free 30-day Select Access Get full Access2.1.1 Access Analytics Platform™ (AAP)
This enables risk based compliance and access provisioning including:
- A real time contextual view of identities, access and activities.
- Identity ...
2.1.2 Cloud Analytics Platform™ (CAP)
This provides visibility of cloud access and related anomalies including:
- Visibility of activities and access to cloud apps related to identities. ...
2.1.3 Threat Analytics Platform™ (TAP)
This provides behaviour based predictive risk scoring:
- A risk scored time line to detect and predict insider and advanced persistent threats.
- Id ...
2.1.4 Multiple Dashboards
The above three platforms, when integrated together, provide multiple dashboards to identify and manage threats as well as to remediate abnormalities. ...
Login Free 30-day Select Access Get full Access2.1.5 Deployment Options
The products can be deployed in a number of ways, an interruption of service is not required and they work with existing infrastructure:
- GRA appli ...
2.2 Essential Characteristics
Gurucul Predictive Risk Analytics provides functionality that spans Access Governance and Security Intelligence. This section compares the functionali ...
Login Free 30-day Select Access Get full Access2.2.1 Access Governance
Access Governance is concerned with providing the answers to three key questions:
- Who has access to what?
- Who has accessed what?
- Who has gr ...
2.2.2 Multiple sources of data
Gurucul Risk Analytics consumes data from multiple technologies such as HR Systems, Identity & Access Management solutions, log aggregators, applicati ...
Login Free 30-day Select Access Get full Access2.2.3 Access Analytics
The analytics platforms are built upon Gurucul’s patented machine learning models (150+) that run against hundreds of attributes to build a behaviou ...
Login Free 30-day Select Access Get full Access2.2.4 Security Intelligence
Access governance provides an important foundation for security intelligence. Cyber-criminals now exploit human and technical weaknesses to infiltrate ...
Login Free 30-day Select Access Get full Access2.2.5 Automated response, remediation and recovery
Gurucul Predictive Risk Analytics includes a workflow capability to manage the remediation of detected anomalies and risks. This covers both the adjus ...
Login Free 30-day Select Access Get full Access2.2.6 Scalability
The potential volume and rate of data that a security analytics tool has to deal with is enormous – scalability is therefore very important. Gurucul ...
Login Free 30-day Select Access Get full Access2.2.7 Integration
Gurucul Risk Analytics consists of a set of integrated platforms that work together “out of the box”. It provides connectors to ingest data from a ...
Login Free 30-day Select Access Get full Access3 Strengths and Challenges
Gurucul Predictive Risk Analytics provides an interesting approach that combines access governance, risk management as well as the prediction and dete ...
Login Free 30-day Select Access Get full Access4 Related Research
Advisory Note: Real Time Security Intelligence - 71033
Blog: Real-time Security Intelligence – more than just “next generation SIEM”
Leadership Compass: Access Governance - 70948
Advisory Note: Identity & Access Management/Governance Blueprint - 70839
Advisory Note: Access Governance Architectures - 71039