Overview

The Securonix Platform is a purpose-built advanced security analytics technology that mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks.

  • Signature-less behavior based analytics for detecting insider and targeted cyber attacks
  • User centric monitoring across hosts, network and applications
  • Privileged account monitoring and misuse detection
  • Over 90% reduction in security events warranting investigations

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2017

Maryland Master Contract

Maryland COTS Project No.: 060B249002

Ohio State Contract- 534354

Contract # 534354 Term: June 17, 2017


Events

Archived Events

News

Latest News

Securonix sat down with Chris Inglis - who was deputy director of the NSA at the time of the Snowden attack and is currently Securonix advisory board chairman - to ask him what he thought of Oliver ...
READ MORE >
Black Hat 2016 was a great opportunity to celebrate Securonix's groundbreaking partnership with Cloudera. Together, the two companies are delivering the most powerful big data security analytics ever ...
READ MORE >
Securonix will be at Black Hat 2016 to showcase the most advanced information security analytics available. Stop by booth 1254 on August 3rd and 4th to meet our team and schedule a one-on-one demo.
READ MORE >
Our ongoing series, Cyber Security Visionaries, continues with this interview of Greg Stewart, director of information security at a Fortune 50 pharmaceutical company. Stewart shares how he leverages ...
READ MORE >
The annual CEO World Awards recognize the world’s best in leadership, innovation, organizational performance and corporate social responsibility.
READ MORE >
An independent panel of judges from the security industry named Securonix’s UEBA-based security analytics platform – Securonix Enterprise – the industry leading threat intelligence solution and ...
READ MORE >
Watch this video recap of team Securonix at RSA 2016! Securonix unveiled two game-changing products, brought home 12 awards and emerged as the industry-leading security analytics provider.
READ MORE >
Securonix Delivers Record Growth and Expansion in 2015
READ MORE >
Join our team of security experts at RSA from April 20th-23rd at the Moscone Center in San Francisco. Securonix will be exhibiting at booth #1839 in the main expo hall and our team will be on hand to ...
READ MORE >
Securonix named top "20 Fastest Growing Security Company" by Silicon ReviewMonthly Perspective: Insider attacks were the most costly breaches of 2015Other Securonix News: Securonix joins the ...
READ MORE >

Resources

Augmenting UAM with behavior analytics will significantly enhanced the security posture of the organization. This paper will specifically describe the related benefits in the following core areas:Machine time, risk rankings generated for fast remediation and lower signal to noise ratios as derived f...

For most of us, our business depends on computers and networks working, staying connected and not leaking our data like a sieve to our competitors, or worse, thieves. But when we look around organizations are being compromised in nearly every industry regardless of budget and size.A new generation o...

High privileged users, service, and shared accounts are the primary target’s and tools for insider and external attackers. Their elevated permissions allow them access to the most sensitive transactions, data, and the ability to create new privileged accounts or elevate privileges for misuse. Orga...

Lackland AFB, San Antonio, TX, April 8, 2016Sargent Steven Bellino shot and killed AF Lt. Col. William Schroeder, before killing himself. Bellino was being escorted to a disciplinary proceeding for being absent without leave. He had left the base after failing a critical swim test, becoming angry an...

Ransomware is a skyrocketing threat that the FBI estimates is on pace to be a $1 Billion crime in 2016. Read this resource to learn more about how to prepare for these threats and how Securonix can help.

Organizations have made significant investments in SIEM solutions for large-scale event collection, correlation, and monitoring. These investments have helped to address key compliance requirements, identify known threats, and provide a rich repository of data for investigations, reporting, and comp...

This resource will address what NISPOM CC 2 is, why NISPOM CC 2 is needed, contractor requirements, and how Securonix can help.

Securonix is the industry-leading platform for security analytics and intelligence. Security analytics is one of the fastest growing, and most important areas of information security today, and is a must have in the fight against insider and external cyber security threats.

Today’s targeted attacks, whether launched by insiders or by external hackers, are primarily focused on stealing an organizations most sensitive data. The primary defense for organizations is application access controls and in some cases DLP (Data Loss Prevention) monitoring tools. But to combat c...

Employees and contractors have significant advantage over the organization’s primary security mechanisms that are built for the untrusted external attacker and not for the trusted insider. People working for or within the organization are aware of the mechanisms in place and can use this knowledge...