- Why Exabeam
Customers
r-tec
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More- Products
Featured Data Sheet
Troubleshooting Advanced Analytics (EDU-5101)
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More- Solutions
Featured Solution Brief
Exabeam and Cribl
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More- Resources
- Customers
- Partners
Get a DemoCustomers
r-tec
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More- Company
- Why Exabeam
Customers
r-tec
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More- Products
Featured Data Sheet
Troubleshooting Advanced Analytics (EDU-5101)
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More- Solutions
Featured Solution Brief
Exabeam and Cribl
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More- Resources
- Customers
- Partners
Exabeam Named Winner in 2019 Artificial Intelligence Excellence Awards
news
SAN MATEO, Calif., March 14, 2019 – Exabeam, the Smarter SIEM™ company, today announced that its user and entity behavior analytics (UEBA) platform, Exabeam Advanced Analytics, was named a Product/Service category winner in the Business Intelligence Group’s Artificial Intelligence Excellence Awards program. Exabeam’s product, Advanced Analytics, leverages AI to learn employee and machine behavior from IT and security infrastructure event logs to automatically detect anomalous behavior indicative of a security threat. The platform fully integrates[...]
Understanding the Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity
Blog InfoSec Trends
When it comes to artificial intelligence (AI) and machine learning (ML), there’s no shortage of buzz and hype. Often referred to interchangeably, artificial intelligence and machine learning are part of our daily reality and technology lexicon—whether it’s in a product marketing pitch or a Netflix recommendation for which movie to see. AI, ML, and Deep Learning in Cybersecurity In cybersecurity, as these and other emerging technologies like deep learning (DL) evolve, their capabilities have become[...]
A CISO’s Guide to the AI Opportunity in Security Operations
resource
Are you aware of the benefits and risks of using artificial intelligence (AI) in security operations? As business leaders and decision makers across various sectors embrace the potential of AI, they are confronted with critical questions, such as: What are the potential dangers? Could AI be used against us? Is our organization truly prepared? While these questions are far from baseless, given the transformative power of AI, it’s also essential to recognize that security operations[...]
A CISO’s Guide to the AI Opportunity in Security Operations
resource
As a CISO, are you prepared for the benefits and risk of leveraging AI in security operations? As business leaders and decision makers across various sectors embrace the potential of artificial intelligence (AI), they are confronted with critical questions: What are the potential dangers? Could AI be used against us? Do we have the right policies in place? How concerned should we be? Is our organization truly prepared? These questions are far from baseless, given[...]
AI SIEM: How SIEM with AI/ML is Revolutionizing the SOC
SIEM Explainers: SIEM Overview SIEM Architecture: Technology, Process and Data The Significance and Role of Firewall Logs Security Big Data Analytics: Past, Present and Future SIEM Log Management: Log Management in the Future SOC SIEM Implementation in 4 Steps Managed SIEM: Key Features, Benefits, and How to Choose a Provider SIEM Alerts: Understanding Security Information and Event Alerts Exploring SIEM Examples: Modern Capabilities and Top Solutions for Cybersecurity Five SIEM Benefits Unveiled: Strengthening Security and[...]
Exabeam Partners with Google Cloud on New Generative AI Features For Improving Security Operations
news
Building on a mature portfolio of machine-learning (ML) and AI capabilities, Exabeam New-Scale SIEM products add new generative AI experiences using Google Cloud technologies Foster City, Calif., August 30, 2023 - Exabeam, a global cybersecurity leader that created New-Scale SIEM™ for advancing security operations, and a 2023 Google Cloud Technology Partner of the Year for Security - Analytics, today announced it is expanding its partnership with Google Cloud in the development of generative artificial intelligence[...]
Threat Detection and Response: Technologies and Best Practices
New-Scale SIEM™ Explainers: 10 Must-Have Features to be a Modern SIEM Combating Cyber Attacks With SOAR Cloud SIEM: Features, Capabilities, and Advantages > Threat Detection and Response: Technologies and Best Practices Threat Detection and Response: Technologies and Best Practices What Is Threat Detection, Investigation, and Response? Threat detection and response, often abbreviated as TDR, refers to a collection of cybersecurity processes and solutions aimed at identifying, analyzing, and responding to security threats. If you add the[...]
The Eternal Learner: Tackling Insider Threats and AI-enhanced Phishing
Blog InfoSec Trends
In episode 94 of The New CISO Podcast, Steve Moore is joined by Jeff Schilling, Global CISO for Teleperformance. This marks Jeff’s third appearance on the show, where he emphasizes clear communication, the fundamental issue of insider threats, and the importance of being an “eternal learner.” At Teleperformance, Jeff oversees hundreds of security and compliance staff spread across 20 countries. He argues that often his biggest challenge as a CISO is making messages simple. “We've[...]
Bots in SOCs — The Rise of AI in Security Operations Centers
Blog InfoSec Trends
Artificial intelligence, or AI as we more commonly refer to it, is old news. In fact, from the first publicly announced program on AI in the mid-1950s, nearly 70 years have passed. That’s about the same amount of time from the launch of the first satellite (Sputnik 1) to the release of the iPhone. While there have been occasional breakthroughs in AI over the years, until recently, it generally wasn’t dinner table conversation. ChatGPT changed[...]
79 results found for artificial.
Showing results 1 - 12We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.Manage consentPrivacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.Cookie Duration Description cookielawinfo-checbox-analytics 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". cookielawinfo-checbox-functional 11 months The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". cookielawinfo-checbox-others 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. cookielawinfo-checkbox-necessary 11 months This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". cookielawinfo-checkbox-performance 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". viewed_cookie_policy 11 months The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. - Products
- Products