You searched for artificial - Exabeam

Exabeam Named Winner in 2019 Artificial Intelligence Excellence Awards

SAN MATEO, Calif., March 14, 2019 – Exabeam, the Smarter SIEM™ company, today announced that its user and entity behavior analytics (UEBA) platform, Exabeam Advanced Analytics, was named a Product/Service category winner in the Business Intelligence Group’s Artificial Intelligence Excellence Awards program. Exabeam’s product, Advanced Analytics, leverages AI to learn employee and machine behavior from IT and security infrastructure event logs to automatically detect anomalous behavior indicative of a security threat. The platform fully integrates[...]

Understanding the Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cybersecurity

When it comes to artificial intelligence (AI) and machine learning (ML), there’s no shortage of buzz and hype. Often referred to interchangeably, artificial intelligence and machine learning are part of our daily reality and technology lexicon—whether it’s in a product marketing pitch or a Netflix recommendation for which movie to see. AI, ML, and Deep Learning in Cybersecurity In cybersecurity, as these and other emerging technologies like deep learning (DL) evolve, their capabilities have become[...]

Exabeam OEMs ZeroFox to Enhance Threat Intelligence

FOSTER CITY, Calif. & WASHINGTON, May 5, 2022 – Exabeam, the leader in Next-gen SIEM and XDR, and ZeroFox, a leading external cybersecurity threat intelligence provider, today announced an OEM partnership to enhance indicators of compromise (IoC) with an added layer of threat intelligence for Exabeam Fusion SIEM and Exabeam Fusion XDR customers. In addition to Exabeam site collector and cloud connecter data, Exabeam will merge the ZeroFox Adversary Disruption service into the Exabeam Threat[...]

What is Cloud Security Posture Management (CSPM)?

Cloud Security Explainers: Cloud Security: Principles, Solutions, and Architectures > What is Cloud Security Posture Management (CSPM)? What Is Cloud Security Monitoring? Cloud Security Solutions: 8 Solution Categories You Must Know Cloud Security Threats: Top Threats and 3 Mitigation Strategies Cloud Security Tools: Cloud Provider or Third Party Tools? Cloud Security Controls: Key Elements and 4 Control Frameworks Cloud Security Standards: ISO, PCI, GDPR and Your Cloud 9 Cloud Security Best Practices You Must Know[...]

Security Big Data Analytics: Past, Present and Future

Security big data analytics, or cybersecurity analytics, helps security analysts and solution vendors do much more with log and event data. Legacy Security Information and Event Management (SIEM) solutions are limited to manually defining correlation rules, which are brittle, hard to maintain, and result in many false positives. Machine learning techniques can help security systems identify patterns and threats with no prior definitions, rules, or attack signatures — and with much higher accuracy. However, to[...]

Planning Before the Breach

Cybersecurity risk can come from anywhere — a lone wolf, organized cybercriminals, nation-states, or rogue insiders.  In 2020, more than 80 percent of the breaches that were reported involved compromised credentials, according to the Verizon Data Breach Investigations Report (DBIR). How many times have you gotten a breached password detection alert, prompting you to change your password? Unfortunately, our credentials are out there in the wild, making them a big part of the risk picture.[...]

Podcast – The New CISO Podcast Episode 60: Invest in People as Much as Tools

The New CISO Podcast Episode 60: Invest in People as Much as Tools Podcast Transcript | Air Date October 21, 2021 Listen to the Podcast Steve: From Exabeam, this is The New CISO, a show about the people who lead IT security teams, the challenges they face, and how they overcome them. If you like what you hear, please rate, review and subscribe to hear our new episodes first. Steve: Luk, thank you so much[...]

Webinar – Planning Before the Breach: You Can’t Protect What You Can’t See

Planning Before the Breach: You Can’t Protect What You Can’t See Webinar Transcript | Air Date March 15, 2022 Watch the Webinar | Read the Blog Post Okay, thanks for joining us today for our webinar on Planning Before the Breach, you can't protect what you can't see. My name is Steve Salinas, I'm the director of solutions and marketing here at Exabeam and today we're going to be talking about something none of us[...]

Exabeam/KPMG Joint Special Session After Report

Exabeam and KPMG co-hosted a special online session titled "Manufacturing Industry CISO Roundtable - From 'Prevention' to 'Discovery,' the Future and Present of Security Monitoring" on October 20, 2021. The session covered trends in security incidents alongside the approaches and concerns of participating companies regarding security monitoring, and an active discussion took place on the future outlook in the field. In this report, we introduce the presentations and discussions that took place during the seminar.[...]

61 results found for artificial.
Showing results 1 - 10