Dell teams with Securonix to provide advanced security analytics for Active Directory and enterprise applications

Via Dell

Jun 28, 2016

  • Technical integration between Dell Change Auditor and Securonix offers customers a deeper level of analysis into user and administrative changes to Microsoft Active Directory, Exchange, and file server activities
  • Collaboration uniquely positions Dell Systems and Information Management to address the growing market concern for securing data in Active Directory environments
  • Securonix analytical capabilities leverage the latest advances in user behavior analytics and machine learning to automatically and accurately detect critical threats in real-time
  • Together Securonix and AD close potential security gaps by determining where, when, and from what device changes originate

Dell today announced a technology partnership with Securonix to improve the security of data in Active Directory (AD) and other enterprise application environments. The partnership combines the unique insights delivered by the Dell Change Auditor product with actionable security intelligence capabilities provided by Securonix.

AD is an attractive target for cyber criminals because it is the most widely used enterprise repository of user account and password credentials. The AD-Securonix integration means organizations can rest assured that the keys to their critical data are protected by the most advanced security analytics solution on the market.

Dell is committed to delivering solutions to market that arm organizations with the identity analytics and intelligence capabilities needed to safeguard against today’s threat landscape. Dell’s partnership with Securonix gives customers the much needed insight into their Microsoft Infrastructure and Identity Management domains.

Securonix is the pioneer of user and entity behavior analytics (UEBA) for cyber security. The company’s products combine the latest advances in machine learning and artificial intelligence with advanced anomaly detection techniques to accurately predict, prevent, detect and respond to threats in real time.

Data security breaches have become increasingly sophisticated and common, and hackers usually initiate them by compromising and exploiting AD user credentials to gain access to sensitive data. Combine this with the time-consuming, cumbersome processes for change reporting and access logging for AD and enterprise applications, and organizations struggle with:

  • Keeping on top of the massive amounts of audit data generated by users ‒ from correlating it to establishing a baseline for ‘normal activity’ for all employees.
  • Finding and determining activity that is considered abnormal and may be indicative of an internal threat or external breach is difficult, and sometimes nearly impossible.
  • Lack of controls to secure the environment, leaving gaps for internal and external breaches that can mean significant financial losses, as well as damage to the company’s reputation.

Technology partnership improves security of data in AD environments

Dell Change Auditor delivers easy-to-digest logs for AD and Windows environments to help IT, security and compliance teams audit, alert, protect and report on user and administrator activity, configuration, and application changes. It helps enterprises prevent the risk of system downtime, misuse of sensitive data, failed audits and security breaches, while ensuring business management can prove to auditors and internal stakeholders that compliance and security policies are enforced throughout the organization. Securonix is a security intelligence platform that relies on signature-less technology for the detection, monitoring, investigation and management of information security threats and risks. It uses a behavior-based threat prediction, detection and prevention engine that mines, enriches, analyzes, prioritizes, and transforms machine data into actionable intelligence. Combining the strengths of Change Auditor and Securonix enables customers to:

  • Cut through all the noise and identify potential security threats and breaches much faster.
  • Close potential security gaps by providing critical information on where and when change activities occurred, as well as from whom and what device the change originated.
  • Speed resolution of security issues and identify misconfigurations, enabling a better understanding and forensic analysis of events and trends.

Supporting Quotes:

Tom Crane, director, product management, Dell Systems and Information Management

" With Active Directory under constant assault, organizations need a layered approach to security, including automated tools for change auditing and anomalous pattern detection. Securonix uses the rich data gathered from the Change Auditor logs to provide out-of-the-box advanced security analytics, behavior-based anomaly detection, and threat and risk dashboards that give organizations real-time insight into potential threats."

Forrester Research

"Microsoft’s Active Directory (AD) has evolved into the most widely used enterprise repository for digital identities. AD’s growing importance also means it’s a tempting target for hackers who attack AD infrastructure to elevate privileges and pilfer data. Increasing AD security requirements have led to the creation of targeted solutions."1

Sachin Nayyar, Co-Founder and CEO, Securonix

"We’re thrilled to partner with Dell. Our technical integration resolves critical security vulnerabilities for Active Directory users by combining best of breed event monitoring capabilities with security analytics. Together we’re saving IT organizations time and money while enhancing their ability to rapidly detect the stealthiest security threats in their environment."


Dell Change Auditor and Securonix are sold separately. Both are available now.

1 "Vendor Landscape: Active Directory Security And Governance Solutions, Solutions To Help You Secure And Monitor Your Active Directory Infrastructure," by Merritt Maxim and Andras Cser, January 5, 2016

This content extract was originally sourced from an external website (Dell) and is the copyright of the external website owner. TelecomTV is not responsible for the content of external websites. Legal Notices

Email Newsletters

Sign up to receive TelecomTV's top news and videos, plus exclusive subscriber-only content direct to your inbox.