White Papers
Applying Data Science to User and Entity Behavior Analytics (UEBA)
October 6, 2023
Discusses the effective use of data science within a UEBA system.
Read MoreIf you’re looking for documentation or training materials follow the links below.
See our documentation
White Papers
October 6, 2023
Discusses the effective use of data science within a UEBA system.
Read MoreApplying Data Science to User and Entity Behavior Analytics (UEBA)
October 6, 2023
Exabeam Incident Response for the Top Three Security Scenarios
October 5, 2023
A CISO’s Guide to the AI Opportunity in Security Operations
September 25, 2023
10 Reasons SIEM Should Remain Dedicated to Security
June 27, 2023
A CISO’s Guide to Rethinking Insider Risk
June 13, 2023
A CISO’s Guide to Defender Alignment
April 25, 2023
Splunk to Exabeam Transition Blueprint
April 11, 2023
A CISO’s Guide to Adversary Alignment
November 18, 2022
Preventing Insider Threats with UEBA
October 12, 2022
Detecting Compromised User Credentials
October 11, 2022
Meeting ISO 27002 Standards
October 9, 2022
How Exabeam Solves 7 Use Cases for Compromised Insiders
October 9, 2022
Keys to the Kingdom: Guidance for Effective Zero Trust Architecture
August 22, 2022
Using a Layered Approach to Improve Ransomware Detection and Response
June 19, 2022
Why Are Companies STILL Getting Breached?
February 9, 2022
Top 10 Reasons to Augment Your Legacy SIEM with XDR
February 3, 2022
A CISO’s Guide to Communicating Risk
January 31, 2022
How to Fast Track Logging Compliance for OMB Memorandum M-21-31 with Exabeam
December 29, 2021
The Responsibility of Risk
November 15, 2021
Top 3 Things to Consider When Building Your Modern Threat Detection and Response Program
August 2, 2021
A SOC Manager’s Guide to New Efficiencies Automating the Full Threat Detection and Response Workflow
July 29, 2021
SIEM and XDR: A Comparison Guide
July 21, 2021
Want to Turbocharge your threat detection and response?
July 7, 2021
5 Questions on the Future of SIEM and Cloud Answered
July 7, 2021
Thinking about shifting your SIEM to the cloud? Read this first.
July 7, 2021
10 Reasons to Augment Your SIEM with Behavioral Analytics
January 26, 2021
Unlocking Effective Threat Detection and Investigation with Analytics and TTPs
April 22, 2020
Exabeam Validated Architectures
April 20, 2020
NIST 800-171 Guidelines
April 16, 2020
Securing Operational Technology for Rapid Threat Detection and Response
April 15, 2020
Using the MITRE ATT&CK® Knowledge Base to Improve Threat Hunting and Incident Response
January 10, 2020
The Essential Guide to SIEM
January 8, 2020
Securing the Cloud with Modern SIEM Monitoring and Analytics
December 4, 2019
A Technology Solution for Protecting Federal Agencies from Insider Threats
December 3, 2019
IBM QRadar SIEM Migration Guide
July 24, 2019
Micro Focus ArcSight SIEM Migration Guide
July 24, 2019
8 Steps to Migrate your SIEM
March 26, 2019
Exabeam Smart Timelines
March 20, 2019
Ten Must-Have Features of a Modern SIEM
January 8, 2019
Rules Versus Models in Your SIEM
October 25, 2018
Meeting the Latest NIST SP 800-53 Revision 4 Guidelines
October 25, 2018
Complying with SOX Regulations Using the Exabeam Security Intelligence Platform
July 10, 2018
Implementing PCI DSS 3.2 Controls with Exabeam
May 3, 2018
Streamlining IR Operations with Orchestration and Automation
October 26, 2017
Protect Critical Infrastructure with Security Intelligence
June 15, 2017
Adhering to GDPR Security Controls with Exabeam
March 15, 2017
Monitoring Sensitive File Access with UEBA
November 2, 2016
The Incident Response Makeover Guide
October 10, 2016
Understanding the Exabeam Session Data Framework
June 3, 2016
Supporting MAS-TRM Guidelines with Exabeam
June 2, 2016
8 Key Functions to Prevent Data Loss with User and Entity Behavior Analytics
December 9, 2015