Statements (124)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:acquired |
Securonix, Inc.
|
gptkbp:client |
Fortune 500 companies
|
gptkbp:competes_with |
gptkb:Log_Rhythm
gptkb:Company IBMQ Radar |
gptkbp:founded |
gptkb:2013
|
gptkbp:founder |
Khaled A. M. M. Al-Mansoori
|
gptkbp:has_part |
gptkb:software
gptkb:Cloud_access_security_broker_(CASB) Risk management Data analytics Compliance management Penetration testing Incident response planning Network security Fraud detection Security policy management Threat intelligence Incident management Threat hunting Security compliance Security orchestration Vulnerability management Threat modeling Identity and access management (IAM) Application security Endpoint security Security awareness training Data security solutions Security incident reporting Security incident response Security compliance audits Security incident analysis Security incident communication Security incident documentation Security incident tracking Security metrics Security incident management Data loss prevention (DLP) Security incident response plan Security governance Security risk assessment Security incident response training Security incident response services Security incident resolution Security incident response tools Security incident response exercises Security incident response solutions Security operations management Security incident prevention Security incident recovery Security operations center (SOC) solutions Security incident response policy Security incident response team Security incident response framework solutions Security incident response framework services process Security incident response framework training exercises Security incident response framework evaluation process Security incident response framework maintenance process Security incident response framework recovery process Security incident response framework guidelines process Security incident response framework implementation process Security incident response framework solutions process Security incident response framework training process Security incident response framework assessment process Security incident response framework best practices Security incident response best practices Security incident response capabilities Security incident response framework Security incident response framework analysis Security incident response framework assessment Security incident response framework capabilities Security incident response framework communication Security incident response framework development Security incident response framework documentation Security incident response framework evaluation Security incident response framework guidelines Security incident response framework improvement Security incident response framework maintenance Security incident response framework management Security incident response framework policy Security incident response framework prevention Security incident response framework recovery Security incident response framework services Security incident response framework software Security incident response framework strategy Security incident response framework testing Security incident response framework tools Security incident response framework tools process Security incident response framework training Security incident response guidelines Security incident response process Security incident response software Security incident response strategy Security threat intelligence Security incident response framework improvement process Security incident response framework prevention process Security incident response framework policy process Security incident response framework management process Security incident response framework strategy process Security incident response framework testing process Security incident response framework best practices process Security incident response framework implementation Security incident response framework analysis process Security incident response framework communication process Security incident response framework documentation process Security incident response framework software process Security incident response framework capabilities process Security incident response framework training exercises process Security incident response framework development process |
gptkbp:headquartered_in |
gptkb:United_States
|
gptkbp:headquarters |
gptkb:Addison,_Texas
|
https://www.w3.org/2000/01/rdf-schema#label |
Securonix
|
gptkbp:is_known_for |
Real-time monitoring
Advanced analytics Automated response |
gptkbp:offers |
User and Entity Behavior Analytics (UEBA)
|
gptkbp:provides |
Incident response
Threat detection |
gptkbp:specializes_in |
gptkb:concert_tour
|
gptkbp:uses |
Machine learning
|
gptkbp:bfsParent |
gptkb:RSA_Security_LLC
|
gptkbp:bfsLayer |
5
|