25 Aug

Niara PartnerWatch™: Seeing Behind the Curtain

in Blog, Perspectives

In addition to BYOD, the other, less-mentioned destroyer of the network perimeter is the increasing integration of third party business partners with the enterprise IT ecosystem.  Not because access is poorly controlled, but because once access is achieved, there is no way to know that the person..

Read More
28 Jul

Predictive Analytics And Why It Is The Way Forward

in Blog, Perspectives

I attended the annual Gartner Security and Risk Management Summit recently at National Harbor, Maryland. A slide from Gartner analysts Avivah Litan and Tony Bussa's presentation struck me as so relevant to how security ought to evolve. In her presentation on analytics, she highlighted a..

Read More
20 Jul

Yes Virginia, There is Security Return on Investment

in Blog

Ever since Peter Norton and John McAfee discovered they could charge for a small utility that helped find and quarantine gremlins that hid on floppy disks, budget-conscious buyers and flinty-eyed CFO’s have been challenging security vendors with a simple question:

Read More
28 Jun

IoT Makes Entity-Centric Behavioral Analytics a Must-Have for Cybersecurity

in Blog, Perspectives

The Internet of Things (IoT) is a hot topic, with Cisco spending $1.4B on an IoT acquisition earlier this year. The buzz around IoT is understandable because it will be game changing. Consider the collapse of the I-35 W Mississippi River Bridge in Minnesota where 13 people died and 145 were..

Read More
21 Jun

Webinar on Using UEBA to Mitigate Email-Based Attacks

in Blog, Corporate, Lessons Learned

Tomorrow, Niara is hosting a webinar titled “Using UBA to Detect Whaling, Ransomware and Other Crime Campaigns.” In the webinar, Vinay Pidathala, chief security researcher at Niara, will present the results of Niara’s research on how attackers are using emails to successfully perpetrate advanced..

Read More
14 Jun

A Modular, Data-Agnostic, Scalable UEBA Architecture

in Blog, Perspectives, Technology

In my last blog, I made the process for selecting a user and entity behavior analytics (UEBA) solution easy. Simply evaluate solutions along three axes - scalability, multi-dimensional analytics, and the integration between human and machine intelligence.

Read More
02 Jun

Gartner Cool Vendor Report Highlights Importance of Machine Learning and User Behavioral Analytics

in Blog, Industry News, Perspectives, Product

Last month, Gartner announced its list of Cool Vendors in UEBA, Fraud Detection and User Authentication, 2016. In addition to naming Niara as one of the cool vendors, the report highlights how Identity and Access Management (IAM) combined with UEBA (User and Entity Behavioral Analytics) increases..

Read More
24 May

Three Considerations When Selecting a UBA Solution

in Blog, Perspectives, Technology

Earlier this month, Niara was named a 2016 cool vendor by Gartner. Getting recognition from the “gold standard” of technology analysts allows you to cut through the marketing hype. But that’s just the first step in choosing a User Behavior Analytics (UBA) solution that’s right for you. You could..

Read More
12 May

Chilled UEBA

in Blog, Industry News, Perspectives, Product

Based on the recent announcement frenzy of “awards” it seems like the security business awards more prizes than show business. Reader’s choice, pay-for-play, Shark Tank Fresno—you get the idea.

Read More
11 May

Detecting Attacks That Other Solutions Miss

in Blog, Lessons Learned

Through regular conversations with our customers, we have learned about new ways they are using Niara to detect attacks. One such way is by using third party alerts to detect attacks that have been missed by other solutions.

Read More
1 2 3 4 5
... 7