Securify Adds Identity-Based Discovery
Securify announced general availability of the next version of its identity-aware monitoring solution
CUPERTINO, Calif. -- Securify, Inc. today announced general availability of the next version of its identity-aware monitoring solution that discovers and verifies what each user is doing on the network in real-time. This major new release adds strong integration with Microsoft Active Directory in order to correlate activity with actual user names. This release breaks ground with its identity-based discovery capability and dashboard which supplants the need for tedious forensic querying of log data for network discovery tasks.
Securify’s automated discovery capability helps discover “who, what and where” during the planning phase of infrastructure change (such as network segmentation or data center moves) and identity and access management projects, without requiring any prior knowledge or rules definition. The Discovery Dashboard provides a single view of passively monitored traffic and correlates user groups and their associated activities on critical business systems. Securify’s appliances dynamically draw existing directory information including groups and memberships.
Unlike traditional solutions used for discovery, Securify does not require agents, logs or application recoding on the client or server side. Securify is also focused on real-time, continuous discovery and verification unlike other behavioral solutions that are used primarily for forensics and typically lack the identity-based controls and identity-based discovery that Securify offers.
“Leading enterprises continue to grant broader access to employees, contractors and partners and the importance of real-time user monitoring is growing exponentially,” said Buck French, Securify president and CEO.“ IT teams we have talked to spend an estimated 33 percent of their time trying to manually gain visibility and verify who is doing what and where on the network. Securify delivers an automated, real-time way to achieve this in order to support business initiatives while also meeting audit and compliance requirements.”
About the Author(s)
You May Also Like
Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024