IT Brief UK - Technology news for CIOs & IT decision-makers
High tech security operations center analysts monitoring digital threat maps

Gurucul launches AI-SOC Analyst to transform cybersecurity centres

Today

Gurucul has announced the release of its new AI-SOC Analyst, an artificial intelligence-powered system designed to enhance the functioning of security operations centres (SOC) through a blend of automated and human-led processes.

The AI-SOC Analyst has been developed to handle the automatic triage of alerts, extract and classify key artefacts, assign risk scores and respond dynamically by either escalating alerts or remediating incidents. According to the company, this mechanism is set to reduce mean time to resolution (MTTR) by 83%.

The system is designed to emulate experienced human analysts by investigating each alert, obtaining relevant context, and establishing the priority of incidents that truly require attention. This approach allows SOC teams to benefit from autonomous incident handling, supplemented by insights and evidence-based recommendations that facilitate faster and more informed decision-making by human analysts.

An additional feature is the integration of the Sme AI copilot, which employs generative AI for interpreting complex data, summarising threat intelligence and incident reports, translating log patterns into plain language, and suggesting queries and appropriate next steps during investigations.

Management perspectives

Saryu Nayyar, Chief Executive Officer of Gurucul, said: "As threats proliferate, alert fatigue, understaffed SOCs, analyst burnout, and increasing threat complexity remain pervasive problems. Gurucul's AI-SOC Analyst frees them from the vast majority of repetitive, high-volume and mundane tasks to instead focus on higher-value work. Humans remain a critical piece of security operations, and we're giving them the tools needed to be successful in today's fast-paced threat landscape to deliver faster responses. This innovation marks a huge step in Gurucul's journey to transform SOC operations and continues to underscore our commitment to securely harnessing the power of AI to empower the SOC."

The AI-SOC Analyst offers uninterrupted 24/7 monitoring for alert handling, removing concerns over weekends, holidays, and analyst burnout. Gurucul states that the system can investigate alerts within seconds, thus decreasing both the mean time to detection (MTTD) and MTTR. It is designed to complement human analysts by providing consistent, unbiased decisions and minimising human error or subjective judgement during alert handling.

Operational impact

By leveraging behaviour analysis and correlation, the AI-SOC Analyst can filter out false positives, ensuring that only credible and actionable threats are escalated to human analysts. The platform is capable of triaging thousands of alerts simultaneously, aimed at reducing the need for large SOC teams focused on the early stages of triage and investigation, thereby enhancing cost efficiency and scalability of security operations.

Gurucul's offering is described as the industry's first AI Analyst that is natively integrated with the Gurucul Unified Data and Security Analytics Platform. The company highlights transparency and explainability as central features, allowing every decision made by the AI-SOC Analyst to be reviewable and open to validation, ultimately supporting ongoing feedback and improvements.

The automation encompasses Level 1 SOC analyst responses, while equipping Level 2 and Level 3 analysts with deeper insights, risk prioritisation, evidence-based recommendations, and automation for responses to incidents.

Investment in artificial intelligence

Nilesh Dherange, Chief Technology Officer of Gurucul, said: "At Gurucul, we are on a mission to empower SOC teams with the power and promise of AI, unlocking human potential with fewer distractions, controlled costs and complete context. We are making huge investments in AI research and have added purpose-built use cases powered by the most suitable LLMs with this AI-SOC Analyst to automate alert triage and response with flexible workflows."

Emphasising integration into the existing platform, Gurucul asserts that trust is strengthened by making every AI decision transparent and explainable. The system is intended as a support mechanism, not a replacement, for human analysts, allowing more focus on complex threats and strategic tasks.

Neda Pitt, Chief Information Security Officer, said: "Gurucul's AI-SOC Analyst is a game changer for the SOC. The AI-driven insights with automated triage and response provide a level of visibility and speed we simply have never had. It helps prioritize what matters, cuts through the noise, and stays ahead of an ever-changing threat landscape. It's like having an intelligent co-pilot in the SOC, augmenting human analysts without adding headcount!"

Gurucul has announced demonstrations of the AI-SOC Analyst for industry professionals and plans to continue adapting AI to support SOC operations through ongoing research and use-case development.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X