Skip to main content


Introducing Behavioral Analysis for Devices - Exabeam Entity Analytics

This week we announced Exabeam Entity Analytics, a product that analyzes the behavior of machines and devices instead of users. Why would you need this? Well, to start with, IoT. According to Gartner, over 8 billion IoT devices were in use in 2017. Eight billion! Many of these devices are vulnerable due to default credentials, un-updated or proprietary software, or lack of management (or all three). Recent stories of CCTV cameras used to mount denial[…]

Topics: Product release, SECURITY, SIEM

Extracting Actionable Information from Windows Events

Within your corporate network, Windows event logs are a primary source of information that is critical to understanding user behavior and emerging security threats. But examining events individually does not provide the comprehensive picture that lets you see unusual or suspicious behaviors. Part of the problem is that there are a lot of events—more than 1600. You need to know which ones are important and which ones can be safely ignored. Another part of the[…]


5 Things to Know About Exabeam Data Lake

Earlier this week we launched Exabeam Data Lake—previously known as Exabeam Log Manager—a security data lake that helps you collect and store unlimited amounts of security data to meet threat detection and compliance use cases.  Here are 5 things you should know about Data Lake: 1. You Can Buy It How You Want to Buy It We understand that traditionally there has been a fair amount of angst amongst SIEM buyers related to how these[…]


Webinar Recap: 2017 Cybersecurity Trends & Predictions

Today’s enterprises are under a continuous stream of cyberattacks and security operations centers need to equip themselves with what’s to come. Exabeam Chief Security Strategist, Stephen Moore and Exabeam Director of Threat Research, Barry Shteiman expanded on the current state of play and the future of cybersecurity in a recent webinar. Current State of the SOC Organizations fall into one of two categories: they have a SOC, or they don’t. Unfortunately, the many organizations that[…]


Exabeam Wins Red Herring Global 100 and Computing Security Excellence Awards

We’re thrilled to announce that Exabeam recently won two prestigious awards. These awards were: The Red Herring 2017 Global Top 100 The Computing Security Excellence Award for Security and Event Management Exabeam Named Red Herring 2017 Global Top 100 Winner Since the mid 90s, Red Herring has selected the top privately owned startups from specific geographic regions and highlighted them in their top 100 showcase.  To be considered for the list, companies must be: Technology[…]

Topics: awards and recognition, SECURITY, SIEM

Ransomworm: Don’t Cry – Act.


In July last year, we released our research report on the Anatomy of a Ransomware attack in which we looked into both the financial model of ransomware and then detection as it unfolds. Due to the recent WannaCry ransomware craze, we think it’s time to revisit. When we addressed ransomware last year, we made a significant comment about the ever-evolving nature of malicious software. We predicted that in the near future (evidently now) ransomware will move[…]

Topics: data science, ransomware, SECURITY, SIEM, Uncategorized

5 Aspects to Consider When Evaluating SIEM Solutions

Considering SIEM Solutions

The SIEM category is quite mature; all Magic-Quadrant-Leader products are more than a decade old. In fact, the youngest product is 14 years old. When these products were in their prime, design requirements were different: an enterprise-class product might be expected to store 50 TB of logs; correlation rules were considered a major advance over signatures for detection; searches were judged on speed and it was acceptable to require complex search syntax; finally, the hard[…]

Topics: SIEM

Flipping the SIEM Value Equation

If you operate a SIEM, you probably deeply sympathize with what I’m about to say. SIEMs are over priced. More accurately, SIEMs are overpriced compared to the value they actually provide to their customers. Not only are these systems responsible for draining security budgets, they aren’t effective in helping customers to effectively manage security incidents. The Economics of SIEMs (and Razors) All legacy SIEMs have at least one thing in common, some form of data[…]