Skip to main content

Webinar Recap: 2017 Cybersecurity Trends & Predictions

Today’s enterprises are under a continuous stream of cyberattacks and security operations centers need to equip themselves with what’s to come. Exabeam Chief Security Strategist, Stephen Moore and Exabeam Director of Threat Research, Barry Shteiman expanded on the current state of play and the future of cybersecurity in a recent webinar. Current State of the SOC Organizations fall into one of two categories: they have a SOC, or they don’t. Unfortunately, the many organizations that[…]

Read more

Topics: SECURITY, SIEM

The Future of Cybersecurity & Industry Predictions

Exabeam’s Chief Security Strategist, Stephen Moore, was invited to share his predictions for the future of cybersecurity with VMBlog for 2018 as part of their 10th annual industry executive exclusive. In his post, he shares his perspective on the changing face of cybersecurity. Robust cybersecurity policies are an absolute necessity given the changing landscape of cybersecurity. People regularly ask questions like, “Do organizations even need a CISO anymore?”, “Should cybersecurity sit independent of IT?”, and[…]

Read more

Topics: SECURITY

Announcing Exabeam Advanced Analytics Version 3.3

We are thrilled to announce the general availability of the latest version of Exabeam Advanced Analytics (AA), our User and Entity Behavior Analytics solution.  Advanced Analytics version 3.3 helps our customers: Obtain deeper insight into user activity Streamline workflows across multiple Exabeam solutions Leverage their own data science algorithms for analytics Exabeam Advanced Analytics Version 3.3 Key features Dynamic Peer Grouping – capability examines a user’s behavior compared to their active directory (AD) peers helps[…]

Read more

Topics: data science, Product release

Exabeam Wins Red Herring Global 100 and Computing Security Excellence Awards

We’re thrilled to announce that Exabeam recently won two prestigious awards. These awards were: The Red Herring 2017 Global Top 100 The Computing Security Excellence Award for Security and Event Management Exabeam Named Red Herring 2017 Global Top 100 Winner Since the mid 90s, Red Herring has selected the top privately owned startups from specific geographic regions and highlighted them in their top 100 showcase.  To be considered for the list, companies must be: Technology[…]

Read more

Topics: awards and recognition, SECURITY, SIEM

Exabeam Highlighted in the Expanding Cisco Security Technology Ecosystem

Earlier this week, Cisco Security released a blog announcing more than 26 new integrations with 3rd party security products.  Here at Exabeam, we’re thrilled to have been prominently mentioned several times throughout the announcement for the value our integrations deliver to joint Cisco / Exabeam customers. This exemplifies the commitment we’ve made to working with Cisco Security as a strategic partner. Exabeam was specifically mentioned for several integrations including: Cisco Firepower Cisco Umbrella The joint[…]

Read more

Topics: benefits, Partnerships, SECURITY

Machine Learning SDK for Security Analytics

Once I was asked by an aspiring data scientist what the challenges are in getting into the field of user and entity behavior analytics (UEBA).  After all, data scientists have been applying their skills successfully across many industries.  Yet, I believe security analytics poses some challenges representing high barriers of entries for a data scientist new to the area.  First, there is the obvious need to collect and process the 3Vs (volume, variety, and velocity)[…]

Read more

Topics: data science

Sharpening First-Time Access Alert for Insider Threat Detection

Residents participating in a neighborhood crime watch look out for signs of suspicious activity.  A new car parked on the street is probably the first thing to register in a resident’s mind.  Other hints like the time of day, what the driver carries, or how he loiters around all add up before one decides to call the police.  A User Behavior Analytics (UBA) system works much the same way, with various statistical indicators jointly working[…]

Read more

Topics: data science

Anomalous User Activity Detection in Enterprise Multi-Source Logs

Network users’ activities generate events every day.  Logged events collected from multiple sources are valuable for user activity profiling and anomaly detection.  A good analytics use case for insider threat detection is to see if a user’s collection of events today is anomalous to her historical daily collections of events.  In an earlier blog, I highlighted a method to address this use case that leverages distributed computing built on HDFS and Apache Spark.  In this[…]

Read more

Topics: data science

Account Resolution via Market Basket Analysis

Machine learning and statistical analysis have many practical applications in the detection of malicious user and entities as part of  User & Entity Behavior Analytics (UEBA) solutions.  Threat detection typically garners attention, this is as true on the show floor of security conferences, as it is for the text of marketing material.  Equally important, although less mentioned, is the application of machine learning for context estimation. Contextual information such as whether the machine is a[…]

Read more

Topics: data science

UBA, UEBA, & SIEM: Security Management Terms Defined

This blog post seeks to define and explain some common acronyms involved in today’s security management landscape. What is UBA?   UBA stands for User Behavior Analytics and it’s an analytics led threat detection technology. UBA uses machine learning and data science to gain an understanding of how users (humans) within an environment typically behave, then to find risky, anomalous activity that deviates from their normal behavior and may be indicative of a threat. How[…]

Read more

Topics: SECURITY, Uncategorized
2017