Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Securify Adds ID Recognition

CUPERTINO, Calif. -- Securify today announced the availability of the latest version of the company’s flagship security appliances for real-time visibility and control of network relationships. The latest generation of Securify’s network security monitoring solutions delivers robust user identity features. Securify automatically verifies that user behavior involving critical business systems complies with security best practices and business controls.

Securify Correlates Networked Application Activity to User Identities
Securify’s new identity capabilities are designed for efficient incident response and remediation while helping organizations achieve monitoring best practices. Securify enables companies to pinpoint the highest risk behavior occurring on a critical business system and instantly track this behavior back to an individual user. Securify achieves this by automatically validating network relationships and behavior by user against pre-built controls. Verifying appropriate user behavior across critical business systems has traditionally been attempted with log analysis, but this was time-intensive as well as reactive. With Securify, organizations can quickly and easily detect risks due to deviations from secure practices and intended usage.

Securify’s comprehensive insider-risk detection capabilities leads to more effective security and compliance. These capabilities ultimately enable companies to protect the value of their corporate brands and property. For example, Securify delivers protection against the following threats, risks and related variants:

  • Unintentional risks from unauthorized and insecure services
  • Actual insider abuse by contractors, outsourcers or even rogue employees accessing confidential data
  • Targeted attacks where hackers gain access into the network

At the same time, the solution streamlines the monitoring efforts required of security and network operations staff.
“True protection for critical business processes now requires adding intelligence to security solutions, including contextual knowledge of individual user activity against business and security controls,” said Eric Ogren, security analyst at Enterprise Strategy Group. “Securify takes the unique approach of implementing security controls based on business relationships between users, applications, and assets to enable IT to make fast, effective decisions to stop insider misuse, comply with government regulations, and keep these critical systems up and running.”

“Securify has allowed us to verify intended usage of our critical systems,” said Mike Ma, senior security engineer at Openwave. “In addition, we’ve been able to flag risks in real time and instantly identify users, instead of doing it manually with reactive server log analysis.”

Securify Inc.