09:34 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

Securonix And McAfee Expand Insider And Advanced Persistent Threat Detection Capabilities Through Security Innovation Alliance

Integrated offering provides a comprehensive security intelligence solution that can detect both known and unknown threats

LOS ANGELES, Sept. 26, 2012 /PRNewswire/ -- Securonix, The Security Intelligence Company, today announced that it has expanded its technical collaboration with McAfee through the McAfee® Security Innovation Alliance(TM) (SIA) partner program. Securonix has integrated its Security Intelligence Platform with McAfee Enterprise Security Platform (ESM), McAfee's security information and event monitoring (SIEM) solution, providing it rich identity, access, and behavior risk context and anomaly detection for identification and rapid response to insider and advanced threats.

The integrated offering provides a comprehensive security intelligence solution that can detect both known and unknown threats. The combined solution detects anomalies in activity logs and risk ranks these anomalies so organizations can focus their investigations on the highest risk activities and users. By using an innovative behavior-based anomaly detection technique in conjunction with peer group analysis technique, the solution detects abnormal usage patterns over billions of logged events.

"The growing demand and phenomenal market growth our company is experiencing is a continued validation of our solution," says Sachin Nayyar, CEO and Founder of Securonix. "The integration with McAfee ESM enables McAfee to deliver a more holistic enterprise security platform with actionable security intelligence and is a natural continuation of our existing partnership with McAfee DLP. The new ESM integration tackles the issues that companies are facing today with Big Security Data and the inability to quickly respond to emerging threats, which unnoticed until much damage is done."

"Securonix's advanced identity correlation and behavior analysis capabilities enable us to tackle some of the most complex and challenging insider and advanced targeted threat events plaguing our customers," said Ed Barry, Vice President of Security Innovation Alliance, McAfee. "We're excited to work with Securonix to bring these significant capabilities to the market."

McAfee Enterprise Security Manager (ESM) expands SIEM from simple event analysis to accurate and actionable information through the integration of threat, user and countermeasure intelligence. For more information on McAfee SIA and McAfee ESM please visit: and

About Securonix

Securonix provides the industry's first behavior based, signature-less anomaly detection engine that features advanced identity correlation, automated risk scoring and abnormality detection for access and activities. For further information email

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.