In addition to BYOD, the other, less-mentioned destroyer of the network perimeter is the increasing integration of third party business partners with the enterprise IT ecosystem. Not because access is poorly controlled, but because once access is achieved, there is no way to know that the person..
I attended the annual Gartner Security and Risk Management Summit recently at National Harbor, Maryland. A slide from Gartner analysts Avivah Litan and Tony Bussa's presentation struck me as so relevant to how security ought to evolve. In her presentation on analytics, she highlighted a..
Ever since Peter Norton and John McAfee discovered they could charge for a small utility that helped find and quarantine gremlins that hid on floppy disks, budget-conscious buyers and flinty-eyed CFO’s have been challenging security vendors with a simple question:
The Internet of Things (IoT) is a hot topic, with Cisco spending $1.4B on an IoT acquisition earlier this year. The buzz around IoT is understandable because it will be game changing. Consider the collapse of the I-35 W Mississippi River Bridge in Minnesota where 13 people died and 145 were..
Tomorrow, Niara is hosting a webinar titled “Using UBA to Detect Whaling, Ransomware and Other Crime Campaigns.” In the webinar, Vinay Pidathala, chief security researcher at Niara, will present the results of Niara’s research on how attackers are using emails to successfully perpetrate advanced..
In my last blog, I made the process for selecting a user and entity behavior analytics (UEBA) solution easy. Simply evaluate solutions along three axes - scalability, multi-dimensional analytics, and the integration between human and machine intelligence.
Last month, Gartner announced its list of Cool Vendors in UEBA, Fraud Detection and User Authentication, 2016. In addition to naming Niara as one of the cool vendors, the report highlights how Identity and Access Management (IAM) combined with UEBA (User and Entity Behavioral Analytics) increases..
Earlier this month, Niara was named a 2016 cool vendor by Gartner. Getting recognition from the “gold standard” of technology analysts allows you to cut through the marketing hype. But that’s just the first step in choosing a User Behavior Analytics (UBA) solution that’s right for you. You could..
Based on the recent announcement frenzy of “awards” it seems like the security business awards more prizes than show business. Reader’s choice, pay-for-play, Shark Tank Fresno—you get the idea.
Through regular conversations with our customers, we have learned about new ways they are using Niara to detect attacks. One such way is by using third party alerts to detect attacks that have been missed by other solutions.