Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 NetApp Digital Newsroom HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

25 Hot Risk, Operations And Threat Intelligence Platforms At RSA 2020

Here's a look at 25 risk, operations and threat intelligence platforms released at RSA 2020 that help customers simulate realistic attacks and exploits, detect unknown threats and policy violations, and triage security incidents faster.

Back 1 ... 17   18   19   20   21   ... 26 Next

Gurucul Automated Intelligent Threat Hunting

Gurucul Automated Intelligent Threat Hunting uses artificial intelligence (AI) and machine learning to detect behaviors associated with cyber attacks and data breaches, while providing the most advanced capabilities for manual investigations. The company said it provides agentless, out-of-the-box integrations that collect, ingest and enrich data from disparate sources as massive scale.

Gurucul AI-enabled threat hunting capabilities apply advanced machine learning algorithms to assess a wide range of behavioral attributes to identify anomalies, outliers and indicators of compromise. It uses more than 1,600 pre-built cybersecurity and threat hunting models that cover the most commonly used cloud, IoT, business, infrastructure, database and network applications in the enterprise, Gurucul said.

The prebuilt threat libraries from Gurucul support a wide range of threat hunting use cases like insider threat detection, data exfiltration, phishing, endpoint forensics, malicious processes, ransomware detection, and network threat analytics. These prepacked libraries help analysts prioritize base activities and focus on the proactive investigation of new and unknown threat patterns using contextual data.

Back 1 ... 17   18   19   20   21   ... 26 Next

sponsored resources