Overview

The Securonix Platform is a purpose-built advanced security analytics technology that mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks.

  • Signature-less behavior based analytics for detecting insider and targeted cyber attacks
  • User centric monitoring across hosts, network and applications
  • Privileged account monitoring and misuse detection
  • Over 90% reduction in security events warranting investigations

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027


Events

Archived Events

News

Latest News

Securonix sat down with Chris Inglis - who was deputy director of the NSA at the time of the Snowden attack and is currently Securonix advisory board chairman - to ask him what he thought of Oliver ...
READ MORE >
Black Hat 2016 was a great opportunity to celebrate Securonix's groundbreaking partnership with Cloudera. Together, the two companies are delivering the most powerful big data security analytics ever ...
READ MORE >
Securonix will be at Black Hat 2016 to showcase the most advanced information security analytics available. Stop by booth 1254 on August 3rd and 4th to meet our team and schedule a one-on-one demo.
READ MORE >
Our ongoing series, Cyber Security Visionaries, continues with this interview of Greg Stewart, director of information security at a Fortune 50 pharmaceutical company. Stewart shares how he leverages ...
READ MORE >
The annual CEO World Awards recognize the world’s best in leadership, innovation, organizational performance and corporate social responsibility.
READ MORE >
An independent panel of judges from the security industry named Securonix’s UEBA-based security analytics platform – Securonix Enterprise – the industry leading threat intelligence solution and ...
READ MORE >
Watch this video recap of team Securonix at RSA 2016! Securonix unveiled two game-changing products, brought home 12 awards and emerged as the industry-leading security analytics provider.
READ MORE >
Securonix Delivers Record Growth and Expansion in 2015
READ MORE >
Join our team of security experts at RSA from April 20th-23rd at the Moscone Center in San Francisco. Securonix will be exhibiting at booth #1839 in the main expo hall and our team will be on hand to ...
READ MORE >
Securonix named top "20 Fastest Growing Security Company" by Silicon ReviewMonthly Perspective: Insider attacks were the most costly breaches of 2015Other Securonix News: Securonix joins the ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Resource

Lackland AFB, San Antonio, TX, April 8, 2016Sargent Steven Bellino shot and killed AF Lt. Col. William Schroeder, before killing himself. Bellino was being escorted to a disciplinary proceeding for being absent without leave. He had left the base after failing a critical swim test, becoming angry an...

Whitepaper

Today’s targeted attacks, whether launched by insiders or by external hackers, are primarily focused on stealing an organizations most sensitive data. The primary defense for organizations is application access controls and in some cases DLP (Data Loss Prevention) monitoring tools. But to combat c...

Employees and contractors have significant advantage over the organization’s primary security mechanisms that are built for the untrusted external attacker and not for the trusted insider. People working for or within the organization are aware of the mechanisms in place and can use this knowledge...