April 2026 Updates
The April New-Scale release expands Agent Behavior Analytics to help your team detect, understand, and govern AI-driven activity. You get broader behavioral detections, visibility into leading AI platforms, and automation that speeds investigation and response.

クラウドネイティブ・プラットフォームの新機能
New-Scale Fusion Security Operations Platform
A cloud-native platform that brings threat detection, investigation, and response (TDIR) together with behavioral analytics and AI-driven automation. You get measurable outcomes without added complexity.

EXPANDED AI THREAT DETECTION
エージェント行動分析
Agent Behavior Analytics (ABA), part of New-Scale Analytics, adds a broader set of detections for AI-driven threats. Coverage now includes the OWASP Agentic Top 10, helping your team detect prompt manipulation, Shadow AI, usage anomalies, and agent misuse.

AI PLATFORM VISIBILITY
Expanded AI Log Source Support
Native log ingestion and parsing for ChatGPT, Microsoft Copilot, and Google Gemini provide visibility into how AI is used across the enterprise. You can baseline behavior, investigate activity, and govern AI usage with data you can trust.
AUTOMATED PHISHING INVESTIGATION
Phishing Collector With Automated Workflow
A new phishing collector ingests reported emails from centralized inboxes and processes them through an automated workflow. Messages, attachments, alerts, and cases are grouped by campaign, reducing manual triage and accelerating investigations.

ACCELERATED INVESTIGATIONS
Exabeam Nova Global Search
An AI-driven global search helps analysts quickly find users, devices, logs, and events from one interface. Less time navigating tools means faster answers and more efficient investigations.
AUTOMATED RESPONSE ACTIONS
Universal Logout for Okta
Universal Logout for Okta revokes all active user sessions as soon as an account is flagged. Access is cut off immediately, limiting attacker movement and helping your team contain incidents faster.
セルフホスティング・プラットフォームの新機能
LogRhythm SIEM
A scalable, self-hosted SIEM that delivers comprehensive visibility, threat detection, and protection across environments, systems, and assets. You get control, flexibility, and predictable performance at scale.
AIE Events on Data Indexer Dashboards
Analysts can move from an Advanced Intelligence Engine (AIE) alert to the underlying data with one click. AIE events now appear directly in dashboards, connecting detection to investigation minimizing context switching and reducing mean time to respond.
リフレッシュされた脅威マップ
The redesigned Threat Map delivers a more intuitive, real-time view of threat activity. Clearer geographic context helps your team analyze attack patterns and assess business risk faster.
AIE API
A new API for Advanced Intelligence Engine lets teams create, read, update, and delete AIE rules programmatically. MSSPs and large organizations can automate rule management and maintain consistency across deployments.
Salesforceログ収集の改善
Improved Salesforce log collection provides deeper insight into user activity, permission changes, and potential data exfiltration. Your team can apply advanced analytics to detect threats within Salesforce.
JSONポリシービルダー
The new JSON Policy Builder uses a guided web interface to generate valid policy files. It removes manual JSON coding, simplifies automation, and helps reduce configuration errors.
プラットフォームの強化
This release includes support for Windows Server 2025 and Rocky 10. It also introduces a new Linux System Monitor Agent with near-feature parity to the Windows agent, along with ongoing security and performance improvements.

Exabeamのデモを見る
デモをリクエストして、Exabeamがセキュリティ・オペレーション・チームのエージェント型エンタープライズ・セキュリティ確保にどのように役立つかをご覧ください。
以下の事を学びます:
- 人間とエージェントの行動を監視・分析し、リスクを洗い出す
- 機械が構築したタイムラインで脅威を調査
- マルチエージェントAIを使用して、検知、調査、対応ワークフローを改善する。
- プレイブックを適用して意思決定を導く
- コンプライアンス要件のサポート
受賞歴のあるセキュリティのリーダー






