DELL TEAMS WITH SECURONIX TO PROVIDE ADVANCED SECURITY ANALYTICS FOR ACTIVE DIRECTORY AND ENTERPRISE APPLICATIONS

  • Technical integration between Dell Change Auditor and Securonix offers customers a deeper level of analysis into user and administrative changes to Microsoft Active Directory, Exchange, and file server activities
  • Collaboration uniquely positions Dell Systems and Information Management to address the growing market concern for securing data in Active Directory environments
  • Securonix analytical capabilities leverage the latest advances in user behaviour analytics and machine learning to automatically and accurately detects critical threats in real-time
  • Together Securonix and AD close potential security gaps by determining where, when, and from what device changes originate

Dellhas announced a technology partnership with Securonixto improve the security of data in Active Directory (AD) and other enterprise application environments. The partnership combines the unique insights delivered by the Dell Change Auditor product with actionable security intelligence. AD is an attractive target for cyber criminals because it is the most widely used enterprise repository of user account and password credentials. The AD-Securonix integration means organisations can rest assured that the keys to their critical data are protected by the most advanced security analytics solution on the market.

Dell is committed to delivering solutions to market that arm organisations with the identity analytics and intelligence capabilities needed to safeguard against today’s threat landscape. Dell’s partnership with Securonix gives customers the much needed insight into their Microsoft Infrastructure and Identity Management domains.

Securonix is the pioneer of user and entity behaviour analytics (UEBA) for cyber security. The company’s products combine the latest advances in machine learning and artificial intelligence with advanced anomaly detection techniques to accurately predict, prevent, detect and respond to threats in real time.

Data security breaches have become increasingly sophisticated and common, and hackers usually initiate them by compromising and exploiting AD user credentials to gain access to sensitive data. Combine this with the time-consuming, cumbersome processes for change reporting and access logging for AD and enterprise applications, and organisations struggle with:

 Stay Updated To Save Money & Time. Join Our Free Newsletter 
. Indepth Analysis & Opinion       . Interviews      . Exclusive Reports  
. Free Digital Magazines      News & updates      . Event Invitations 
                     
& Much More Delivered To Your Inbox For Free.
Submit
We Will Not Spam, Rent, or Sell Your Information.
All emails include an unsubscribe link. You may opt-out at any time. See our privacy policy.

 
  • Keeping on top of the massive amounts of audit data generated by users‒ from correlating it to establishing a baseline for ‘normal activity’ for all employees.
  • Finding and determining activity that is considered abnormal and may be indicative of an internal threat or external breach is difficult, and sometimes nearly impossible.
  • Lack of controls to secure the environment, leaving gaps for internal and external breaches that can mean significant financial losses, as well as damage to the company’s reputation.

Technology partnership improves security of data in AD environments
Dell Change Auditor delivers easy-to-digest logs for AD and Windows environments to help IT, security and compliance teams audit, alert, protect and report on user and administrator activity, configuration, and application changes. It helps enterprises prevent the risk of system downtime, misuse of sensitive data, failed audits and security breaches, while ensuring business management can prove to auditors and internal stakeholders that compliance and security policies are enforced throughout the organisation. Securonix is a security intelligence platform that relies on signature-less technology for the detection, monitoring, investigation and management of information security threats and risks. It uses a behaviour-based threat prediction, detection and prevention engine that mines, enriches, analyses, prioritises, and transforms machine data into actionable intelligence. Combining the strengths of Change Auditor and Securonixenables customers to:

  • Cut through all the noise and identify potential security threats and breaches much faster.
  • Close potential security gaps by providing critical information on where and when change activities occurred, as well as from whom and what device the change originated.
  • Speed resolution of security issues and identify misconfigurations, enabling a better understanding and forensic analysis of events and trends.

Supporting Quotes:

Tom Crane, director, product management, Dell Systems and Information Management
With Active Directory under constant assault, organisationsneed a layered approach to security, including automated tools for change auditing and anomalous pattern detection. Securonix uses the rich data gathered from the Change Auditor logs to provide out-of-the-box advanced security analytics, behaviour-based anomaly detection, and threat and risk dashboards that give organisations real-time insight into potential threats.”

Forrester Research
“Microsoft’s Active Directory (AD) has evolved into the most widely used enterprise repository for digital identities. AD’s growing importance also means it’s a tempting target for hackers who attack AD infrastructure to elevate privileges and pilfer data. Increasing AD security requirements have led to the creation of targeted solutions.”1

Sachin Nayyar, Co-Founder and CEO, Securonix
“We’re thrilled to partner with Dell. Our technical integration resolves critical security vulnerabilities for Active Directory users by combining best of breed event monitoring capabilities with security analytics. Together we’re saving IT organisations time and money while enhancing their ability to rapidly detect the stealthiest security threats in their environment.”

 Stay Updated To Save Money & Time. Join Our Free Newsletter 
. Indepth Analysis & Opinion       . Interviews      . Exclusive Reports  
. Free Digital Magazines      News & updates      . Event Invitations 
                     
& Much More Delivered To Your Inbox For Free.
Submit
We Will Not Spam, Rent, or Sell Your Information.
All emails include an unsubscribe link. You may opt-out at any time. See our privacy policy.

 
Close
Stay Updated To Save Money & Time. Join Our Free Newsletter. 
. Indepth Analysis & Opinion       Interviews          . Exclusive Reports 
. Free Digital Magazines        . News & updates        . Event Invitations
& Much More Delivered To Your Inbox For Free. 
Submit
We Will Not Spam, Rent, or Sell Your Information.
All emails include an unsubscribe link. You may opt-out at any time. See our privacy policy.
 
Close