Identify Good UEBA Data with “Feature Analysis”

Gurucul is pleased to share details on our most effective machine learning models. Up next is a critical precursor to any User and Entity Behavior Analytics (UEBA) deployment. Gurucul Machine Learning Model: Feature Analysis How does the Feature Analysis machine learning model work, what does it do? The Feature Analysis ... Read More

Data Democracy Shines in the Wake of the Cloudera and Hortonworks Merger

Last month, Cloudera, Inc. and Hortonworks, Inc. announced the two companies will merge. The story is still developing, but it’s a familiar story of two competitors getting merged. What is unknown is the outcome: what will happen to customers and partners of both companies? Who’s on First? Cloudera and Hortonworks ... Read More

Thwart Money Laundering with “Dimensionality Reduction”

Gurucul is providing details on a few of our most popular machine learning models. Check out what’s up next! Gurucul Machine Learning Model: Dimensionality Reduction How does the Dimensionality Reduction machine learning model work, what does it do? The Dimensionality Reduction machine learning model performs line and attribute filtering. It ... Read More

Prevent Fraud with “Rare and Volume Based Analytics”

We are pleased to provide details on our most popular machine learning models. Check out the next in our series of informative blog articles. Gurucul Machine Learning Model: Rare and Volume Based Analytics How does the Rare and Volume Based Analytics machine learning model work, what does it do? This ... Read More

Stop Fileless Malware with “Abnormal PowerShell Command Execution”

Gurucul’s #MachineLearningMadness blog series continues to deliver details on our most popular machine leaning models. Next up is a critical model for Windows environments. Gurucul Machine Learning Model: Abnormal PowerShell Command Execution How does the Abnormal PowerShell Command Execution machine learning model work, what does it do? This machine learning ... Read More

Identify Outlier Access with “Clustering and K-Means”

It’s the gift that keeps on giving! Gurucul’s #MachineLearningMadness sessions at Black Hat USA 2018. We continue to roll out the details of the Machine Learning Models that Gurucul Risk Analytics uses to detect and stop insider threats, data exfiltration, privileged access abuse, fraud and more. Gurucul Machine Learning Model: ... Read More

How Do You Establish Credibility?

| | Blog, Gurucul Labs, PoC
Earlier this month, we met with our Executive Advisory Board. These are seasoned Chief Information Security Officers commanding enterprise security teams in various industries. In short, they are incredibly smart leaders who know exactly who they are and how they feel. They hold nothing back and this meeting was no ... Read More

Dynamic Provisioning: “Workflow Classification Regression Tree”

Gurucul Machine Learning Model: Workflow with Classification Regression Tree How does the Workflow with Classification Regression Tree machine learning model work, what does it do? This powerful model calculates a real-time risk score on the basis of multiple pieces of data including user outlier behavior percentage, resident user risk and ... Read More

Detect Host Compromise with “Domains Generated Algorithmically”

At Black Hat USA this year, Gurucul shared details of our most popular Machine Learning Models. We’ve covered four of them so far, read on to learn about the fifth model we presented at the conference. Gurucul Machine Learning Model: Domains Generated Algorithmically How does the Domains Generated Algorithmically (DGA) ... Read More

Detect Privileged Access Abuse with “Linear Regression”

You probably know by now – if you’ve been following our blog posts – that we ran a Machine Learning Madness campaign during Black Hat USA 2018. We revealed a starter set of 14 different machine learning models over 2 days. Read on to learn about model number 4. Gurucul ... Read More
Loading...