Threat Intelligence, Cloud Security, Channel partners, Content, Security Program Controls/Technologies, Security Operations, Threat Management

SIEM Specialist Gurucul Delivers Data and Cloud Security Advancements

communication equipment room with lighting in data center

Gurucul has delivered advancements to its Security Analytics and Operations Platform that are designed to help organizations cost-effectively secure their cloud architectures, the company announced in a prepared statement.

500 Days of Searchable Data and More

The El Segundo, California-based cybersecurity company asserts that its “latest innovations provide industry firsts, including 500 days of searchable data, purpose-built security use cases, coverage for identity-based threat detection and response (ITDR) and unified observability for any cloud environment.”

Commenting on the company’s innovations, Gurucul CEO Saryu Nayyar said:

“Security teams are hampered in their ability to stop sophisticated attacks because of platform unreliability, long MTTD & MTTR times, and a lack of coverage across hybrid environments. Gurucul continues to innovate to remove these obstacles and help organizations succeed in their threat detection and response programs."

Nayyar said that the company’s latest enhancements “empower SOC analysts with full visibility and searchability into all data, including identity and access, which until now has been a blind spot.”

As Nayyar explained:

“Our extended platform capabilities also help CISOs align with business imperatives like controlling costs at scale and showing fast time to value on technology investments.”

Advancing Data, Identity Security

Gurucul, a specialist in next-generation security information and event management (SIEM), offers a variety of data security-related capabilities, including:

  • 500 days of searchable data on all supported data lakes
  • High-value use cases by industry, compliance and telemetry
  • Automated threat hunting with retrospective analysis on searchable historical data
  • Chained models to detect advanced attack patterns across multiple systems/platforms and/or executed over a longer period
  • Extended coverage and linking for MITRE ATT&CK framework
  • Enhanced analytics, such as machine learning behavior models and threat content to help organizations quickly and securely adapt to change

Gurucul notes that it accelerates incident response with identity-based detection and response capabilities, including:

  • Identifying credential-based attacks that evade other systems
  • Enabling 360-degree visibility into identity and access attack surfaces
  • Consolidating identity, access entitlements and privileges across various systems
  • Identifying threats through analysis of privileged access misuse, outlier access, access collectors, dormant access, over-provisioned accounts, dormant entitlements, dynamic peer grouping and rogue accounts
  • Building precise response workflows with bi-directional integration with various identity systems
Jim Masters

Jim Masters is Managing Editor of MSSP Alert, and holds a B.A. degree in Journalism from Northern Illinois University. His career has spanned governmental and investigative reporting for daily newspapers in the Northwest Indiana Region and 16 years in a global internal communications role for a Fortune 500 professional services company. Additionally, he is co-owner of the Lake County Corn Dogs minor league baseball franchise, located in Crown Point, Indiana. In his spare time, he enjoys writing and recording his own music, oil painting, biking, volleyball, golf and cheering on the Corn Dogs.