Skip to main content

Exabeam Federal Solutions

Public agencies manage significant amounts of sensitive data, and as a result, are some of the biggest targets for external hackers and insider threats. These same agencies often face budgetary and hiring pressures, resulting in limited ability to detect and respond to data-related threats. Exabeam security intelligence solutions provide an analytics platform for understanding and assessing modern cyberthreats.  Agencies use Exabeam to detect complex attacks, to hunt for adversaries on the network, and to amplify SOC analysts’ capabilities for investigation and response. Exabeam Federal solutions are delivered by a team with deep experience in agency security, coming from firms such as ArcSight, Blue Coat, Palo Alto Networks,  and HP.

 

Federal Advisory Board

ReghydeReg Hyde

 

Reginald D. Hyde brings decades of national security career experience having worked in senior positions at the Central Intelligence Agency (CIA) and within the Intelligence Community (IC).  During his time in public service, Mr. Hyde developed a wide-range of knowledge and subject matter expertise having worked on important assignments involving policy, strategy, management, operations and new technologies.

Today, Mr. Hyde is the Executive Director of The University of Alabama Cyber Institute in addition to sitting on several corporate advisory boards.  Prior to retiring from government, Mr. Hyde served as the Deputy Under Secretary of Defense for Intelligence and Security (DUSDI), the civilian equivalent of a 3-Star General, and Deputy to the Under Secretary of Defense for Intelligence.  In this role, Mr. Hyde oversaw a broad portfolio related to optimizing the intelligence activities of the uniformed services and the Combat Support Agencies. Prior to that, Mr. Hyde served for nearly 30 years as a CIA operations officer, serving abroad in four overseas assignments, including two as a chief of station. He helped standup In-Q-Tel, the strategic venture arm of the IC, and held a number of senior executive positions in the Agency and Intel Community. He has an undergraduate degree in Business and Economics, a master’s degree in public policy from Princeton University; a juris Doctor from the University of Alabama School of Law.

 

johnmaludaGeneral (Ret.) John Maluda

 

Maj. Gen. (Ret.) John W. Maluda was previously the Director, Cyberspace Transformation and Strategy, Secretary of the Air Force Office of Warfighting Integration and Chief Information Officer, the Pentagon, Washington, D.C. He was responsible for establishing cyberspace as a domain in and through which Air Force flies and fights, to deliver sovereign options for defense of the United States and its global interests. General Maluda’s staff experience includes positions at Headquarters U.S. Air Force, Air Combat Command, U.S. Air Forces in Europe, Air Force Special Operations Command, U.S. Space Command and the White House Communications Agency.

 

petertseronis
Peter Tseronis
Pete Tseronis was previously the Department of Energy’s first Chief Technology Officer.  In that role, Pete was responsible for providing strategic direction and vision throughout the Department and is charged with establishing a formal and sustainable federal technology deployment program that offers secure transformative innovative solutions to tough challenges. As the Department’s Chief Technology Officer, Pete was instrumental in addressing the divide among the public and private sectors and ultimately helped ensure that Department has the most secure innovative services available to support its mission.

 

 

Learn More

Click to download the following Exabeam Federal Solutions documents:

nitp_thmb

 

Solution Brief: Adhering to the National Insider Threat Policy (NITP) with Exabeam: In 2011, U.S. Executive Order 13587 established the National Insider Threat Task Force (NITTF), under joint leadership of the Attorney General and the Director of National Intelligence. A year later, the President issued the National Insider Threat Policy. This policy introduced a set of standards – including people, process, and procedures – for preventing damage from insider threats, i.e. malicious or harmful-but-inadvertent activities by employees or contractors with trusted access to sensitive data and system. This brief describes how the Exabeam Security Intelligence Platform supports the National Insider Threat Policy and its components.

 

next_gen_defenses_thmb

 

Research Report: ICIT Publication: Next Generation Defenses for a Hyper Evolving Threat Landscape: The onslaught of attacks on our Critical Infrastructure sectors by nation state, mercenary, and criminal is robbing organizations of millions worth of IP. Read this publication for a compilation of essays written by ICIT Fellows, which offer a wide-ranging look at some of the most impactful cybersecurity defenses today.

 

fed_insider_thmb

 

Whitepaper: Preventing Agency Insider Threats with UBA: Insider threats continue to present a major risk to federal agencies of any size. This paper describes the insider threat in more detail and presents a solution for detecting and responding to internal adversaries that wish to steal and leak sensitive information.

 

fed_TH_ds_thmb

 

Data Sheet: Threat Hunter for Federal AgenciesThreat hunting enables analysts to proactively search for and respond to adversaries on the network. Exabeam Threat Hunter brings the power of threat hunting to every analyst within a Security Operations Center (SOC).

 

fedprthumb Press Release: Exabeam Announces Federal Advisor Board: Members of the Advisory Board Include Cybersecurity Leaders from the US Air Force, Department of Defense, and Department of Energy.

 

 

2017