09:34 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Securonix And McAfee Expand Insider And Advanced Persistent Threat Detection Capabilities Through Security Innovation Alliance

Integrated offering provides a comprehensive security intelligence solution that can detect both known and unknown threats

LOS ANGELES, Sept. 26, 2012 /PRNewswire/ -- Securonix, The Security Intelligence Company, today announced that it has expanded its technical collaboration with McAfee through the McAfee® Security Innovation Alliance(TM) (SIA) partner program. Securonix has integrated its Security Intelligence Platform with McAfee Enterprise Security Platform (ESM), McAfee's security information and event monitoring (SIEM) solution, providing it rich identity, access, and behavior risk context and anomaly detection for identification and rapid response to insider and advanced threats.

The integrated offering provides a comprehensive security intelligence solution that can detect both known and unknown threats. The combined solution detects anomalies in activity logs and risk ranks these anomalies so organizations can focus their investigations on the highest risk activities and users. By using an innovative behavior-based anomaly detection technique in conjunction with peer group analysis technique, the solution detects abnormal usage patterns over billions of logged events.

"The growing demand and phenomenal market growth our company is experiencing is a continued validation of our solution," says Sachin Nayyar, CEO and Founder of Securonix. "The integration with McAfee ESM enables McAfee to deliver a more holistic enterprise security platform with actionable security intelligence and is a natural continuation of our existing partnership with McAfee DLP. The new ESM integration tackles the issues that companies are facing today with Big Security Data and the inability to quickly respond to emerging threats, which unnoticed until much damage is done."

"Securonix's advanced identity correlation and behavior analysis capabilities enable us to tackle some of the most complex and challenging insider and advanced targeted threat events plaguing our customers," said Ed Barry, Vice President of Security Innovation Alliance, McAfee. "We're excited to work with Securonix to bring these significant capabilities to the market."

McAfee Enterprise Security Manager (ESM) expands SIEM from simple event analysis to accurate and actionable information through the integration of threat, user and countermeasure intelligence. For more information on McAfee SIA and McAfee ESM please visit: and

About Securonix

Securonix provides the industry's first behavior based, signature-less anomaly detection engine that features advanced identity correlation, automated risk scoring and abnormality detection for access and activities. For further information email

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web