Skip to main content

How Union Bank Gets the Most from Its Data Loss Prevention Solution

When you’re a major player in a highly-regulated industry, it becomes even more important to ensure safeguards against data exfiltration to protect your customers and your business. The question becomes, “How do you scale your data loss prevention (DLP) operations when you’re handling a huge volume of daily transactions and thousands of potential security incidents?” This post helps you understand the limits of commonly used solutions, as well as how to use Exabeam to improve[…]


Is this Chad's Personal E-mail Address? A Data Exfiltration Context

Data exfiltration is a common, multi-faceted security threat every enterprise faces. It’s defined as the unauthorized transfer of private data or intellectual property from a corporate computer to an external location. One way such illegitimate data transfer occurs is through the e-mail channel. The chance of a disgruntled or a departing employee e-mailing confidential data to their personal account is all too easy. How can this scenario be addressed? Several existing security products attempt to[…]

Topics: data science

Extracting Actionable Information from Windows Events

Within your corporate network, Windows event logs are a primary source of information that is critical to understanding user behavior and emerging security threats. But examining events individually does not provide the comprehensive picture that lets you see unusual or suspicious behaviors. Part of the problem is that there are a lot of events—more than 1600. You need to know which ones are important and which ones can be safely ignored. Another part of the[…]


DFIR 101: Triage Collection

During a typical day, your team might have to review dozens or hundreds of security alerts, hopefully only a fraction of which will turn out to be real incidents. As you begin your response to these alerts, rather than simply trusting the alert as 100% accurate and remediating, or pulling a full disk image from each potentially infected endpoint, you can do something in between: a triage collection. Exabeam Threat Researcher, Ryan Benson expanded on[…]


5 Things to Know About Exabeam Data Lake

Earlier this week we launched Exabeam Data Lake—previously known as Exabeam Log Manager—a security data lake that helps you collect and store unlimited amounts of security data to meet threat detection and compliance use cases.  Here are 5 things you should know about Data Lake: 1. You Can Buy It How You Want to Buy It We understand that traditionally there has been a fair amount of angst amongst SIEM buyers related to how these[…]


Webinar Recap: 2017 Cybersecurity Trends & Predictions

Today’s enterprises are under a continuous stream of cyberattacks and security operations centers need to equip themselves with what’s to come. Exabeam Chief Security Strategist, Stephen Moore and Exabeam Director of Threat Research, Barry Shteiman expanded on the current state of play and the future of cybersecurity in a recent webinar. Current State of the SOC Organizations fall into one of two categories: they have a SOC, or they don’t. Unfortunately, the many organizations that[…]


The Future of Cybersecurity & Industry Predictions

Exabeam’s Chief Security Strategist, Stephen Moore, was invited to share his predictions for the future of cybersecurity with VMBlog for 2018 as part of their 10th annual industry executive exclusive. In his post, he shares his perspective on the changing face of cybersecurity. Robust cybersecurity policies are an absolute necessity given the changing landscape of cybersecurity. People regularly ask questions like, “Do organizations even need a CISO anymore?”, “Should cybersecurity sit independent of IT?”, and[…]


Announcing Exabeam Advanced Analytics Version 3.3

We are thrilled to announce the general availability of the latest version of Exabeam Advanced Analytics (AA), our User and Entity Behavior Analytics solution.  Advanced Analytics version 3.3 helps our customers: Obtain deeper insight into user activity Streamline workflows across multiple Exabeam solutions Leverage their own data science algorithms for analytics Exabeam Advanced Analytics Version 3.3 Key features Dynamic Peer Grouping – capability examines a user’s behavior compared to their active directory (AD) peers helps[…]

Topics: data science, Product release

Exabeam Wins Red Herring Global 100 and Computing Security Excellence Awards

We’re thrilled to announce that Exabeam recently won two prestigious awards. These awards were: The Red Herring 2017 Global Top 100 The Computing Security Excellence Award for Security and Event Management Exabeam Named Red Herring 2017 Global Top 100 Winner Since the mid 90s, Red Herring has selected the top privately owned startups from specific geographic regions and highlighted them in their top 100 showcase.  To be considered for the list, companies must be: Technology[…]

Topics: awards and recognition, SECURITY, SIEM

Exabeam Highlighted in the Expanding Cisco Security Technology Ecosystem

Earlier this week, Cisco Security released a blog announcing more than 26 new integrations with 3rd party security products.  Here at Exabeam, we’re thrilled to have been prominently mentioned several times throughout the announcement for the value our integrations deliver to joint Cisco / Exabeam customers. This exemplifies the commitment we’ve made to working with Cisco Security as a strategic partner. Exabeam was specifically mentioned for several integrations including: Cisco Firepower Cisco Umbrella The joint[…]

Topics: benefits, Partnerships, SECURITY