Exabeam Security Operations Platform - Exabeam

The Exabeam Security Operations Platform

Cloud-native SIEM and Security Log Management designed by security people for security people.

A new approach: New-Scale SIEM

The Exabeam Security Operations Platform provides the industry’s most complete cloud-native product offerings for threat detection, investigation and response (TDIR). Security log management leverages a cloud-scale architecture to ingest, parse, store, and search data at lightning speed. Behavioral analytics baseline the normal behavior of users and devices with histograms to detect, prioritize, and respond to anomalies based on risk. An automated investigation experience across the TDIR workflow provides a complete picture of a threat, automating manual routines and simplifying complex work.

All platform products are delivered as modular components using a shared services architecture. The key services of the platform and their supporting capabilities are included below.

A new approach: New-Scale SIEM™
Data Collection

Data Collection

Collect data from on-premises or cloud data sources from 200+ on-premises products, 34 cloud-delivered security products, 11 SaaS productivity applications, and 21 cloud infrastructure products from the three leading cloud infrastructure providers.

Security Data Preparation and Organization

Exabeam built a Common Information Model (CIM) to provide normalized, security-relevant logs that are faster and easier to parse, store, and manage from any vendor. The CIM schema simplifies the normalization, categorization, and transformation of raw log data into actionable events in support of security use cases. The CIM defines the 10 most important fields and 76 subjects used by security experts and specifies them as core, detection, or informational, and includes 395 activity types and two outcomes (specified as success or fail). This process allows organizations to more quickly detect and respond to threats, visualize and report on data, and supports lightning-fast search performance.

Security Data Preparation and Organization
Compliance and Certifications

Compliance and Certifications

Running national and global organizations means you need to comply with laws around the world, and Exabeam can help you meet your compliance requirements. Exabeam achieved ISO 27001 certification, SOC 2 Type II certification, is registered and certified with Privacy Shield, has appropriate technical and organizational measures in place for GDPR, and has resources available to help you address commitments to your own customers and their personal data.

The governance, risk, and compliance team at Exabeam is dedicated to maintaining a secure operating environment for your confidential data. A zero trust internal policy, ongoing security awareness training, and regular third-party security assessments are just a few of the ways Exabeam helps ensure the security of our customers.

Security Context Enrichment

Context enrichment provides powerful benefits across several areas of the platform. Exabeam supports enrichment using three methods: threat intelligence, geolocation, and user-host-IP mapping. Armed with the most up-to-date IoCs, our Threat Intelligence Service adds enrichments such as file, domain, IP, URL reputation, and TOR endpoint identification to prioritize or update existing correlations and behavioral models. Geolocation enrichment provides location-based context often not present in logs. Outside of authentication sources, user information is rarely present in logs — Exabeam’s user-host-IP mapping enrichment adds user details to logs which are critical to building behavioral models for detecting anomalous activity.

Security Context Enrichment
Data Ingestion and Parsing

Data Ingestion and Parsing

A new feature, Log Stream, delivers rapid log ingestion processing at a sustained rate of over 1M EPS. A central console enables you to visualize, create, deploy, and monitor parsers within a unified ingestion pipeline for all Exabeam products and features. As it is ingested, data is parsed using 7,937 pre-built log parsers and enriched using three context collectors from open source and commercial threat intelligence feeds. Enriched, parsed data is available as security-relevant events for faster performance in search, correlations, and dashboards. Live Tail capabilities provide self-service, real-time monitoring of parser performance, and visibility into the data pipeline, allowing organizations the ability to take immediate action to improve the quality of data ingestion.

MITRE ATT&CK® Coverage

The Exabeam Security Operations Platform uses the ATT&CK framework as a critical lens to help improve the visibility of your security posture. Support for ATT&CK spans all 14 categories, including 101 techniques and 180 sub-techniques in the ATT&CK framework.

MITRE ATT&CK Coverage
Use Case Outcome Analysis

Use Case Outcome Analysis

The Outcomes Navigator feature maps the feeds that come into the Exabeam platform against the most common security use cases and suggests ways to improve coverage. Outcomes Navigator supports measurable, continuous improvement focusing on outcomes by recommending information, event stream, and parsing configuration changes to close any gaps.

Correlation Rule Building

Correlation rules compare incoming events with predefined relationships between entities to identify and escalate anomalies. The Exabeam Correlation Rule Builder feature is a single interface that lets you write, test, publish, and monitor custom correlation rules for your most critical business entities and assets, including defining higher criticality rules for advanced threats sourced from the Threat Intelligence Service (available at no additional cost).

Properly designed correlation rules enable enterprises to surface a broad range of abnormal behavior and events. Correlation Rule Builder provides analysts with an easy application to create custom correlation rules suited to their organization’s security and use case requirements. Correlation rules monitor for well-known threats, identify compliance violations, and detect signature-based threats using context from the Threat Intelligence Service or other third-party threat intelligence.

Correlation Rule Building
Reporting and Dashboards

Reporting and Dashboards

Print, export, or view dashboard data with pre-built compliance reports, customized reports, and dashboards with 14 different chart types.

Build a dashboard in a minute from 14 different pre-built chart types as if you were using a leading BI tool. The Exabeam dashboard app is fully integrated within Exabeam products, allowing you to create powerful visualizations from your parsed log data quickly. Customers can choose one or more visuals to meet their business needs. These include bar chart, column chart, line graph, area chart, pie chart, donut chart, bubble chart, funnel, single value, sankey map, word cloud, heat map, table, and Coverage Map.

Service Health and License Consumption

The Service Health and Consumption feature provides high-level and detailed views of the health and data consumption performance of your Exabeam service. Visualize your service health and data consumption while monitoring your connections and sources. Monitoring visualizations makes it easy to understand the current state of your Exabeam implementation. The performance component illustrates how your data contributes to overall license consumption and highlights significant changes.

Service Health and License Consumption
Threat Intelligence Context

Threat Intelligence Context

Available in all Exabeam products at no additional cost, the Threat Intelligence Service adds context enrichment to events from multiple commercial and open source threat intelligence feeds, then aggregates, scrubs, and ranks them, using proprietary machine learning algorithms to produce a highly accurate, up-to-date stream of IoCs. The threat intelligence data is refreshed every 24 hours and leveraged by all Exabeam products.

200+

integrations

Collect data from 200+ on-premises products and supports 34 cloud-delivered security products, 11 SaaS productivity applications, and 21 cloud infrastructure products.

14

pre-built chart types

Build a dashboard in a minute from 14 different pre-built chart types as if you were using a leading BI tool.

14

MITRE ATT&CK® categories

Coverage for all ATT&CK categories, including 101 techniques and 180 sub-techniques.

Frequently Asked Questions

Question: Does the Solution Provide the Scaling and Ease of Management Benefits of a True SaaS Model?

Answer: Yes. As customer demand increases either due to a temporary spike in usage or normal customer growth over time, we leverage the elasticity of the cloud to add the necessary, incremental resources to meet that demand through auto-provisioning. In addition, we monitor hundreds of metrics for every service location to ensure availability.

Question: What Is the Expected Impact on Network or Internet Links?

Answer: Exabeam cloud-native solutions receive data from Collectors over the network or internet link through approved ports/protocols documented here. Collectors minimize the impact on the network through compression, batching, and local buffering to gracefully work in congested networks.

Question: How Does the Vendor Balance the Cadence of Feature and Function Upgrades With Adequate Testing to Ensure Availability and Quality?

Answer: Exabeam delivers updates and feature rollouts continuously on our cloud platform. Updates are immediately available to Exabeam Security Operations Platform customers.

We ensure the highest quality of all our feature rollouts by implementing proactive controls including:

Early access and beta customer program – Our beta program allows customers to try pre-release features. If you are interested in accessing a beta release, please contact [email protected]

Secure code development training – Regular security and code development training and rigorous process requirements arm our employees with the knowledge and support they need to keep all of our sensitive customer data safe. 

Static code analysis – We have facilitated security hardening during development by implementing processes to identify, triage, and remediate vulnerabilities.

Internal penetration testing – We conduct regular internal penetration tests to gauge network vulnerability and incident response. 

Third-party external penetration testing – We also conduct unscheduled pen tests by third-party organizations to review common techniques, tools, and procedures used by external threat actors.

Trusted by organizations
around the world

“Using Exabeam reminded me of how surprisingly fast the platform updates. There is an almost daily improvement on desired functions, and with Exabeam, it all keeps getting better.”

Keisuke Kawakami

Infrastructure System Division | MTI Ltd.

The cloud-native Exabeam® Security Operations Platform. Scale your speed, productivity, accuracy, and outcomes.

Learn more about the Exabeam Security Operations Platform

Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

The Exabeam Security Operations Platform

DATA SHEET

The Exabeam Security Operations Platform

Whether you replace a legacy product with a New-Scale SIEM, or complement an ineffective SIEM solution by adding the industry’s most powerful user and entity behavior analytics (UEBA) and automation to it, the Exabeam Security Operations Platform can help you achieve security operations success.

5 Ways Exabeam Helps Eliminate Compromised Credential Blindspots

GUIDE

5 Ways Exabeam Helps Eliminate Compromised Credential Blindspots

This guide will show you five ways to leverage Exabeam’s machine learning-powered solution to detect these activities through analytics, including mapping the activities to the MITRE ATT&CK® framework.

Keys to the Kingdom: Guidance for Effective Zero Trust Architecture

WHITE PAPER

Keys to the Kingdom: Guidance for Effective Zero Trust Architecture

In the event of a security breach, the cost to your organization can be tremendous in terms of both reputation and money. This paper attempts to resolve the confusion surrounding Zero Trust Architecture (ZTA), and presents a strategy to fill in the gaps exploited by malicious insiders and credential-based attacks

Introducing Exabeam Fusion: The Industry’s Most Powerful and Advanced Cloud-native SIEM

WEBINAR

Introducing Exabeam Fusion: The Industry’s Most Powerful and Advanced Cloud-native SIEM

Whether it’s phishing, ransomware, malware, or lateral movement, accessing valid credentials is the adversaries’ primary objective. Exabeam Fusion represents the industry’s most powerful and advanced cloud-native SIEM.

What else can Exabeam do for you?

At Exabeam, our goal is to help you achieve your business outcomes. Leverage our breadth of experience, resources, and tools to help your security team meet their business goals through deployment and beyond. This goal is our key focus for customers and partners alike.

Support

Exabeam Support is here to help you achieve your business outcomes by leveraging our breadth of experience, resources, and tools to help your security team meet its short- and long-term goals.

Learn More

Services

Exabeam Professional Services allow customers to accelerate their deployment, increase time to value, and manage policies themselves through a well defined framework of fixed delivery packages or bespoke services. These accelerate deployment, integration, and platform management while maximizing your success.

Learn More

Training

Provide your team with the tools and training they need to operate the Exabeam Security Operations Platform. With instructor-led or self-paced training, your employees will learn to maximize the features and functionality of your Exabeam solution and achieve the most value.

Learn More

Partners

Exabeam was founded on a principle of openness. Our go-to-market and technology partners are critical to our success. Security is a team sport, and our business partnerships are a key component of delivering customer success.

Learn More

See New-Scale SIEM in action.

The majority of reported breaches involve lost or stolen credentials. How can you keep up using last-generation tools?

New-Scale SIEM from Exabeam delivers security operations cloud-scale security log management, powerful behavioral analytics, and an automated investigation experience to detect and respond to the threats other tools miss. Whether you need a security log management upgrade, a SIEM replacement, or want to add analytics and automation on top of your legacy SIEM, Exabeam has a path to success.

Request a demo of the industry’s most powerful platform for threat detection, investigation, and response.

Get a demo today!