Securonix Wins Second Computer Technology Review MVP Award for Data Exfiltration Solution

Securonix Data Exfiltration Analytics Detects Misuse of Sensitive Data Access and Usage, Providing Context-Based Behavior and Security Intelligence

Los Angeles, California, UNITED STATES

LOS ANGELES, CA--(Marketwired - Sep 16, 2015) - Securonix, the industry-leading security analytics platform for advanced threat detection, announced today that it has been selected by Computer Technology Review as two-time winner of the MVP Award recognizing leaders within the IT security space.

Securonix was recognized for its Data Exfiltration solution, which provides critical monitoring and detection of insider and cyber threat attacks against critical data. The Securonix Intelligence Platform was awarded an MVP earlier this year.

"Today's targeted attacks, whether launched by insiders or by external hackers, are primarily focused on stealing an organization's most sensitive data. Not only is Securonix Data Exfiltration Analytics an innovative technology solution that enterprise organizations need, but Securonix is a leader in providing technology that successfully meets the challenge of securing corporate and government agency assets against insider threats," said Kim Kay, editor-in-chief of Computer Technology Review.

The primary defense for organizations is application access controls and in some cases DLP (Data Loss Prevention) monitoring tools. Fully deployed, these controls tend to be defenseless against motivated insiders or outsiders and they generate a continuous stream of false positives. To combat these complex threats effectively, organizations need better context of a user's identity, behavior and their associated peers in order to pinpoint the real attacks and to focus monitoring efforts on what is high risk before it is too late.

Securonix Data Exfiltration addresses this challenge through real time monitoring and analysis of sensitive data access and usage at the source in applications (e.g. SAP, Oracle eBusiness, EPIC, other COTS, custom) and data repositories (e.g. SharePoint, Documentum, etc.). Securonix automatically detects high-risk data access and usage for real-time investigation and access removal, thereby reducing the exposure to sensitive data at its source. Meanwhile, if DLP monitoring at the endpoint, egress, or host is being used, Securonix will automatically identify the true high-risk DLP events through advanced identity, behavior and peer group analysis. The combination of these advanced monitoring and detection techniques provides the real user identity and behavior context to rapidly detect the most complex data theft and snooping attacks.

Computer Technology Review is a US-based news portal that has been covering the best of IT, focusing on storage, cloud, virtualization, data protection, security and beyond since 1980. Complete details on the award can be found at

About Securonix
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from inside and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced data security, insider threats and fraud attacks automatically and accurately. The world's top companies rely on Securonix as an enterprise security analytics platform to find abnormal patterns in user access, activities and violations and get more context for their current SIEM, DLP, Log Monitoring or IAM solutions. For more information visit