コンテンツへスキップ

Securing the Future of Work: Agent Behavior Analytics with Google Cloud — Read the Blog

What's New at Exabeam

エクサビームの新着情報

90日ごとにお届けする新製品のイノベーションについてご紹介します。リリースノートを読む、役立つリソースをダウンロードする、リリースウェビナーに登録する!

ウェビナーに参加する プレスリリースを読む

July 2025 Updates

In April, we introduced Exabeam Nova, the industry’s first security-specific AI agent purpose-built to proactively manage and accelerate investigations while driving continuous improvement.

Our July 2025 release extends Exabeam Nova’s capabilities with the new Exabeam Nova Advisor Agent in Outcomes Navigator—a built-in strategic planning assistant that helps security leaders assess coverage, identify gaps, and communicate security posture with clarity. Leaders can ask direct questions about their deployment and get actionable insights in return.

INTELLIGENT, OUTCOMES-DRIVEN SECURITY

The First Cybersecurity Strategy Agent for SOC Leadership

Exabeam Nova is the industry’s first and only AI system with an agent built especially for the CISO. Embedded in Outcomes Navigator, the Exabeam Nova Advisor Agent helps shift your SOC from reactive alert triage to proactive program optimization. It delivers boardroom-ready summaries that highlight opportunities to reduce risk, demonstrate the value of security projects and investments, and show measurable progress in strengthening your security posture.

Six Specialized AI Agents

Exabeam Nova includes six specialized AI agents, each trained and optimized to support critical SOC functions. Unlike vendors that bolt AI on as an afterthought, Exabeam Nova is built into the platform as a coordinated system—designed from the ground up to drive productivity and efficiency across security operations.

Exabeam Nova delivers measurable impact:

  • Reduce investigation times by over 50%
  • Boost analyst productivity by up to 80%
  • アラート・トリアージでシフトあたり平均3時間を節約

アドバイザーエージェント

A strategic overlay for leadership, the Advisor Agent delivers daily reports on security posture, MITRE ATT&CK® coverage, and outcome alignment. It highlights strengths, uncovers gaps, and recommends targeted improvements—turning posture insights into action.

検索エージェント

Lets analysts query security data using natural language, in multiple languages—no need to write in Exabeam Query Language (EQL). Integrated directly into Threat Center, this agent makes complex searches fast and intuitive.

Converts natural language queries into charts and dashboards. From basic metrics to detailed detection trends, this agent helps teams visualize patterns, system performance, and threat activity clearly and quickly.

Threat Scoring Agent

Identifies the most relevant events using adaptive, behavior-based scoring. It continuously analyzes patterns and context to surface high-priority signals for further investigation, reducing noise and sharpening analyst focus.

調査エージェント

Automatically generates case titles, detailed summaries, and deep threat analyses. It classifies threats, identifies key vectors, highlights top detections, and recommends next steps. With AI-driven entity summaries and context from Attack Surface Insights, it delivers a comprehensive, end-to-end view that helps analysts investigate faster and respond more effectively.

Analyst Assistant Agent

A real-time, context-aware chat companion that understands case-specific and general questions. It provides instant, relevant insights, helping analysts work faster without digging through data or documentation.

クラウドネイティブ・プラットフォームの新機能

New-Scale Platform

High performance analytics and automation delivering advanced SIEM capabilities and measurable security outcomes via the cloud.

Smarter Alert Triage

Accelerate response with streamlined workflows in Threat Center. Analysts can now  group, stage, queue, and assign alerts more easily, keeping teams aligned, cutting through backlogs, and reducing time to action.

New Custom Rules with New-Scale Analytics

Address complex, organization-specific threats with custom behavioral rules. Build, import, and export rules in JSON format, then validate them through reprocessing and training to ensure precise detection and broader use case coverage.

Attack Surface Insights: User Risk Trend Chart

Visual trend lines show rising or declining risk scores over time, helping analysts spot unusual behavior early and reduce investigation time. These insights are easily accessible from the Threat Center UI.

Behavioral Detections for New-Scale SIEM

New behavioral detections are now available for New-Scale SIEM, bringing baseline behavioral analytics capabilities to customers who don’t yet use New-Scale Analytics. These detections map to ATT&CK techniques and are delivered as a pre-packaged set of correlation rules, ready to run in your SIEM.

Improved User and Device Entity Watchlists

Build real-time watchlists using automation and threat scoring. Easily track high-value users, a such as executives and contractors, and critical hosts with a configurable UI embedded in Threat Center for fast, focused monitoring.

Cloud-native architecture

セルフホスティング・プラットフォームの新機能

LogRhythm SIEM

A scalable, feature rich, and easy-to-use self-hosted SIEM offering unmatched visibility, protection, and threat detection across all environments, systems, and assets.

Surface Critical Threats with 14 New Alarm Filters

Version 7.21 introduces 14 filterable alarm fields, doubling the previous total. Analysts can now triage faster by filtering alarms by user, IP, hostname, location, VMID, and more. This enables precise threat detection and faster, targeted response.

Use Case: Sort Alarms by MITRE ATT&CK® TTPs

Expanded alarm filtering now allows analysts to sort alerts by ATT&CK tactics, techniques, and procedures. With AI Engine rules mapped to Common Events, teams can instantly prioritize alarms based on known adversary behaviors—accelerating detection and investigation workflows.

Instant Log Data in Data Indexer Dashboards

LogRhythm SIEM now offers a “View Logs” option directly within Data Indexer Dashboards, eliminating the need to switch contexts. Analysts can seamlessly pivot from high-level metrics to raw logs in a single click, accelerating threat hunting and forensic analysis.

Gain actionable insight 

Exabeamのデモを見る

脅威の検知、調査、対応(TDIR)のための業界最強のプラットフォームに関する詳細情報の請求やデモのご依頼はこちらから。

詳細はこちら:

  • セルフホスト型SIEMとクラウドネイティブ型SIEMのどちらが適しているか
  • クラウドスケールでデータを取り込み、監視する方法
  • なぜユーザーとデバイスの異常な行動を見ることが重要なのか
  • ユーザーの活動を自動的にスコア化し、プロファイリングする方法
  • インシデント・タイムラインを使って全体像を見る
  • プレーブックが次の正しい決断に役立つ理由
  • コンプライアンスの義務化

受賞歴のあるセキュリティ界のリーダー

  • Cyber Security Excellence Awards 2025 - Winner
  • CRN Security 100 | 2025
  • Inc. 5000 | 2022
  • InfoSec Innovator Awards 2024
  • The Cyber Influencer of the Year | 2024
  • Google Cloud Partner of the Year 2024 Award