The Three Pillars of Behavior: Identity, Access and Activity

Logo
Presented by

Craig Cooper, COO & SVP of Customer Success, Gurucul

About this talk

Behavior is the leading threat indicator. Detecting and stopping insider threats and cybercriminals involves monitoring and linking three pillars of behavior: - Identity: Who are you? What accounts are associated with your identity? Being able to link numerous accounts with a single identity is key to building a 360 degree view of a user. - Access: What are you accessing and with what entitlements? A core component of behavior is the ability to understand access rights at the entitlement level. How clean is the access plane? Understanding what users are doing with their access rights is critical. - Activity: What are you doing, when and where? Analyzing the access and activity of a user for their accounts and entitlements is ground zero for predictive risk scoring. Activity alone fails to provide enough context and visibility. The gap with access must be closed to evaluate risk. Attend this webinar to learn more.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (85)
Subscribers (6689)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.