Securify Adds Identity-Based Discovery
Securify announced general availability of the next version of its identity-aware monitoring solution
CUPERTINO, Calif. -- Securify, Inc. today announced general availability of the next version of its identity-aware monitoring solution that discovers and verifies what each user is doing on the network in real-time. This major new release adds strong integration with Microsoft Active Directory in order to correlate activity with actual user names. This release breaks ground with its identity-based discovery capability and dashboard which supplants the need for tedious forensic querying of log data for network discovery tasks.
Securify’s automated discovery capability helps discover “who, what and where” during the planning phase of infrastructure change (such as network segmentation or data center moves) and identity and access management projects, without requiring any prior knowledge or rules definition. The Discovery Dashboard provides a single view of passively monitored traffic and correlates user groups and their associated activities on critical business systems. Securify’s appliances dynamically draw existing directory information including groups and memberships.
Unlike traditional solutions used for discovery, Securify does not require agents, logs or application recoding on the client or server side. Securify is also focused on real-time, continuous discovery and verification unlike other behavioral solutions that are used primarily for forensics and typically lack the identity-based controls and identity-based discovery that Securify offers.
“Leading enterprises continue to grant broader access to employees, contractors and partners and the importance of real-time user monitoring is growing exponentially,” said Buck French, Securify president and CEO.“ IT teams we have talked to spend an estimated 33 percent of their time trying to manually gain visibility and verify who is doing what and where on the network. Securify delivers an automated, real-time way to achieve this in order to support business initiatives while also meeting audit and compliance requirements.”
About the Author
You May Also Like