Skip to content

Exabeam Confronts AI Insider Threats Extending Behavior Detection and Response to OpenAI ChatGPT and Microsoft Copilot — Read the Release.

Blog Posts by:

Steve Kansa

Vice President of Product Management | Exabeam | Steven Kansa is a creative and driven leader with over 20 years of experience in product management. As the Vice President of Product Management, Steven is responsible for defining the product direction and strategy for the company’s self-hosted and cloud-native SIEM platforms. A graduate of Michigan State University with a degree in Computer Science, Steven enjoys mentoring high-performing teams that excel at building solutions customers love. His extensive background spans the complete product lifecycle, from concept to scaled customer adoption. With experience in products from cybersecurity to application development and from mobile to mainframes, Steven has helped tens of thousands of customers across the globe throughout his career. Outside of his professional pursuits, Steven enjoys spending quality time with his family and dog as well as skiing and boating. 

  • Filter:
  • Topic
  • Product
  • Industry
  • Use Case

Learn More About Exabeam

Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

  • Guide

    Five Benefits of Augmenting Microsoft Sentinel with New-Scale Analytics

  • Brief

    LogRhythm SIEM Platform for Qatar Cybersecurity Compliance

  • Podcast

    From Chef to CISO: Unlocking the Recipe to Security Leadership

  • Blog

    What’s New in New-Scale April 2026: Securing the Agentic Enterprise With Behavioral Analytics

  • Blog

    What’s New in the April 2026 LogRhythm SIEM Release

  • Data Sheet

    New-Scale Fusion

See Exabeam in Action

Request more information or request a demo of the industry’s most powerful platforms for threat detection, investigation, and response (TDIR).

Learn more:

  • If self-hosted or cloud-native SIEM is right for you
  • How to ingest and monitor data at cloud scale
  • How monitoring and analyzing AI and automated agent behavior uncovers risky non-human activity
  • How to automatically score and profile user activity
  • See the complete picture using incident timelines
  • Why playbooks help make the next right decision
  • Support compliance mandates

Award-Winning Leaders in Security

  • Cyber Security Excellence Awards 2025 - Winner
  • CRN Security 100 | 2025
  • InfoSec Innovator Awards 2024
  • The Cyber Influencer of the Year | 2024
  • Google Cloud Partner of the Year 2024 Award
  • CRN Security 100 | 2026