GURUCUL in Anomaly Detection Software

Are you from this Company?
GURUCUL
Los Angeles, US
2010
$11MN to $50MN
Enterprise
42 Likes
74 Buyers Negotiating

Summary

GURUCUL provides GRA - Gurucul Ris Analytics platform for risk analytics and anomaly detection.
  • The first component is the Access Analytics Platform (AAP), which provides risk-based compliance to users and identifies analytics roles from behavior analytics machine learning. It provides access to outliers based on usage and dynamic peer group analytics.
  • The second component is the Cloud Analytics Platform (CAP), which provides visibility into cloud access and anomalies. It manages accounts using identity access intelligence and risk-based certifications, and leverages hybrid cloud analytics and cloud behavior analytics on premises.
  • The third component is the Threat Analytics Platform (TAP), which provides behavior-based predictive risk scorings. Its self-audit portal offers risk awareness to detect identity thefts and provide proactive alerts for anomalous behavior.

Discussions

Strengths
  • +12
    Network Behaviour Anomoly Detection
  • +11
    Big Data Analytics
  • +7
    Identity and access management (IAM)
  • +10
    SIEM(Log Management)
  • +8
    Threat Intelligence and Management
  • +11
    Other Features Offered
  • +6
    Risk Mitigation and Management (Network Dectection)
  • +5
    Customer support service
  • +7
    Support Program
  • +12
    BFSI
  • +5
    Healthcare and Life Sciences
  • +7
    Manufacturing
  • +8
    Other Industry Verticals
  • +13
    Retail and Consumer Goods
  • +5
    Any other Frequency of Support Services
  • +8
    Product Branding
  • +10
    Product Quality and Reliability
  • +12
    Data Mining & Business Intelligence
  • +10
    Large Enterprises
  • +9
    SME's
Cautions
  • -6
    Breadth and Depth of Product Offerings
  • -10
    Business Consulting Services
  • -8
    Integration & Deployment
  • -11
    Other Services
  • -9
    Support & Maintenance
  • -9
    On-Site Support
  • -10
    Remote Support
  • -13
    Machine Learning & AI
  • -6
    Documentation
  • -8
    Support Training
  • -14
    IT and Telecom
  • -6
    Media and Entertainment
  • -13
    Frequency of Support Services- Bi-Annually
  • -11
    Frequency of Support Services - Monthly
  • -12
    Frequency of Support Services- Quarterly
  • -13
    User Behaviour Anomoly Detection
  • -14
    Other technology offered
  • -5
    Network Intelligence and Security (DDOS and IDS/IPS)
  • -14
    Network Traffic Analytics (Traffic Monitoring)
  • -9
    Data Loss Prevention (DLP)
GURUCUL Presence in Anomaly Detection Software
The company is a provider of advanced security intelligence and analytics, UEBA, and IdA for on-premises and cloud deployments. Its products and solutions are used globally by enterprises to detect insider threats, IP and data thefts, and external attacks. Gurucul is continuously striving toward excellence and innovation. To ensure its dominance in the anomaly detection market, the company has been expanding its business across the globe to meet the needs of customers through its strong solutions and services portfolio. The company’s strategy is based on the vision of creating technological evolutions and enhancing its diverse product portfolio. Gurucul combines user behavior analytics with identity and access intelligence to pinpoint threats from genuine insiders and external intruders. The company is always on the lookout to provide extra advantages, such as self-audit, to its commercial customers. With the self-audit feature, users are provided a self-audit, much like a credit card statement, to view their risk-ranked anomalous activities, identities, access, devices, and other key data points in an easy-to-use web portal. Gurucul’s methodology includes 3 key parts, first is Identity Access Intelligence (IAI) to risk rank access to reduce excess access. Second is User Behavior Analytics (UBA) based on dynamic peer groups for improved clustering and outlier analysis (network generated anomaly) and better understanding of time-based norms. The third is to bring users into a collaborative relationship with IT security to protect their identities via self-audits to review risk-ranked anomalous behaviors and access analytics.
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup