Sign in to see all reviews and comparisons. It's Free!
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.
Gurucul Risk Analytics is built upon our core PIBAE architecture (Predictive Identity Based Behavior Anomaly Engine). PIBAE identifies anomalous behaviors across users, accounts, applications, and devices by leveraging behavior analytics, machine learning, and peer group modeling.
Category
User and Entity Behavior Analytics
Features
Can work on big data sets Make use of hybrid behavior analytics Built upon be predictive analysis behavior based analytics engine Incorporate machine learning Has signature less technology Provide risk scoring Provide risk medaling Perform self-audits Perform account and identity management
License
Proprietary Software
Price
Contact for Pricing
Pricing
Subscription
Free Trial
Available
Users Size
Small (<50 employees), Medium (50 to 1000 Enterprise (>1001 employees)
Company
Gurucul Risk Analytics
PAT Rating™
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
7.8
4.5
Features & Functionality
7.8
8.4
Advanced Features
7.7
9.0
Integration
7.9
9.1
Performance
7.9
9.1
Training
7.5
Customer Support
7.7
2.8
Implementation
0.0
Renew & Recommend
—
Bottom Line
Gurucul big data enabled approach provides organizations’ with risk based compliance, continuous access governance and protection from under-the-radar cyber campaigns and sophisticated insider activity like IP Theft, Sabotage, and Fraud. Gurucul provides a Hybrid Behavior Analytics (HBA) architecture with the breadth of Identity Access Intelligence to User Behavior Analytics, and the depth from cloud apps to on-premises behavior.
7.8
Editor Rating
6.3
Aggregated User Rating
2 ratings
You have rated this
Gurucul Risk Analytics is built upon our core PIBAE architecture (Predictive Identity Based Behavior Anomaly Engine). PIBAE identifies anomalous behaviors across users, accounts, applications, and devices by leveraging behavior analytics, machine learning, and peer group modeling.Gurucul big data enabled approach provides organizations’ with risk based compliance, continuous access governance and protection from under-the-radar cyber campaigns and sophisticated insider activity like IP Theft, Sabotage, and Fraud.
Gurucul provides a Hybrid Behavior Analytics (HBA) architecture with the breadth of Identity Access Intelligence to User Behavior Analytics, and the depth from cloud apps to on-premises behavior. GRA enables companies to identify threats by using modern techniques and procedures. The software provides an “identity as threat vector” which is incorporated in cyber-defense equation and after being analyzed through latest techniques, threats and risks are detected.
The software is equipped with techniques that quickly and easily identifies threats without requiring much effort on the part of security analysts. The software is built upon predictive analysis behavior based analytics engine, making it easy to detect anomalies across everywhere. Machine learning technique helps in identifying those hidden threats that cannot be detected by humans. The software comes with a signature less technology. The software can analyze huge volumes of data at single time. The software is equipped with risk modeling techniques.
The software comes with a very flexible data Meta framework. The software comes with a huge library of machine learning algorithms. The software has all the latest feature to identify risk and threats. The software is well appreciated by its clients. With its powerful features and techniques, risk detection is a straight forward job. The software performs risk scoring and prioritization. The software perform self-audits too. The software has out-of-box algorithms to detect anomalies. The software provides identify management and account management features. The software is capable of working on big data sets. Hybrid behavior analytics speed up detection of threats.
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.