Solution Briefs
Exabeam Fusion on Google Cloud
April 16, 2024
Read More
r-tec entscheidet sich für die Exabeam Security Operations Platform zur Unterstützung seiner SOC-, MDR- und Vorfallsreaktions-Services
Read More
AI-driven Exabeam Fusion: Bring an end to your SIEM nightmares. It’s time for faster, easier, and more accurate threat detection, investigation, and response (TDIR). Exabeam Fusion applies AI and automation to security operations workflows for a holistic approach to combating cyberthreats, delivering the most effective TDIR. AI-driven detections pinpoint high-risk threats by learning normal behavior... Read more »
Read More
As cyberattacks become increasingly frequent, sophisticated, and hard to detect, security operationsteams are struggling with the limitations of legacy security information and event management (SIEM) and traditional perimeter security. Traditional platforms haven’t kept pace with the growth of data, the sophistication of attacks, or the shift to the cloud. Nor can it handle the increasing... Read more »
Read More
r-tec entscheidet sich für die Exabeam Security Operations Platform zur Unterstützung seiner SOC-, MDR- und Vorfallsreaktions-Services
Read More
r-tec entscheidet sich für die Exabeam Security Operations Platform zur Unterstützung seiner SOC-, MDR- und Vorfallsreaktions-Services
Read More
AI-driven Exabeam Fusion: Bring an end to your SIEM nightmares. It’s time for faster, easier, and more accurate threat detection, investigation, and response (TDIR). Exabeam Fusion applies AI and automation to security operations workflows for a holistic approach to combating cyberthreats, delivering the most effective TDIR. AI-driven detections pinpoint high-risk threats by learning normal behavior... Read more »
Read More
As cyberattacks become increasingly frequent, sophisticated, and hard to detect, security operationsteams are struggling with the limitations of legacy security information and event management (SIEM) and traditional perimeter security. Traditional platforms haven’t kept pace with the growth of data, the sophistication of attacks, or the shift to the cloud. Nor can it handle the increasing... Read more »
Read More
If you’re looking for documentation or training materials follow the links below.
See our documentation
Exabeam Fusion on Google Cloud
April 16, 2024
What Comes Next for Your AI Cybersecurity Strategy?
April 8, 2024
Exabeam Copilot
February 27, 2024
Threat Center
February 27, 2024
Top 13 Use Cases for User and Entity Behavior Analytics (UEBA)
December 21, 2023
Outcomes Navigator
December 21, 2023
M-21-31 Exabeam + Cribl
October 2, 2023
Exabeam and Cribl
July 13, 2023
Achieving OMB M-21-31 with Exabeam
July 11, 2023
Government agencies are tasked with achieving mature M-21-31 compliance by August 27, 2023. Yet despite best efforts, as the deadline approaches, many agencies struggle to complete their journeys due to technological challenges around legacy systems, the complexity of the requirements, resource allocation, and budget constraints as they continue to throttle progress.
State and Local Government
April 28, 2023
With public safety, finances, sensitive information, and trust at stake, it’s necessary that state and local government agencies implement solutions that enable security teams to quickly and accurately detect, investigate, and respond to cyberthreats. Exabeam helps agencies keep critical systems up and running and protect citizens’ valuable personal data.
Replacing or Augmenting Splunk with Exabeam
April 11, 2023
Automated Investigation Experience
December 7, 2022
Behavioral Analytics
November 29, 2022
Exabeam and Google Cloud
October 28, 2022
Bringing the Modern SOC to Cloud-Oriented Organizations
Exabeam Ingester for CrowdStrike
May 3, 2022
Detect and investigate advanced attacks and insider threats with UEBA.
Your Greatest Adversary Could Be an Insider Threat
April 21, 2022
External Attacks: Ransomware and Phishing Attacks
March 8, 2022
Higher Education
December 21, 2021
Empower small teams with analytics and automation for faster, more accurate, and cost-effective threat detection, and response.
Malware
July 12, 2021
Malware is any malicious program or code developed by adversaries with the intent to cause damage to data or a system or gain unauthorized access to a network.
Ransomware
June 23, 2021
Ransomware is a form of malware designed to encrypt a target organization’s files, holding the data hostage until the organization pays the ransom demanded by the attackers.
Abnormal Authentication
June 21, 2021
Using out-of-the-ordinary authentication actions to identify a malicious insider.
Destruction of Data
June 15, 2021
Destruction of data is when a user destroys data in an effort to evade detection or sabotage a corporation.
Audit Tampering
June 15, 2021
Audit tampering is when a user tampers with audit logs in an effort to destroy an incriminating audit trail and evade detection.
Exabeam Overview
May 27, 2021
Giving your organization the best chance to outsmart the odds.
Data Leak
May 26, 2021
Data leak is when a malicious insider illicitly and deliberately transfers data outside of an organization.
Privilege Abuse
May 24, 2021
Workforce Protection
May 24, 2021
Workforce protection identifies a user who is exhibiting signs of leaving an organization or communicating with a competitor.
Data Access Abuse
May 24, 2021
Data access abuse is when a user abnormally accesses sensitive corporate data or resources. This activity serves as a leading indicator of data leakage.
Industry Solution Brief – Retail
May 24, 2021
Secure the omnichannel experience, protect critical data and support a culture of regulatory compliance
Manufacturing
May 24, 2021
Protect intellectual property, secure smart factory initiatives and overcome the cybersecurity skills shortage.
Account Manipulation
May 10, 2021
Security teams struggle to detect attacks using account manipulation
Privileged Activity
May 10, 2021
Detect and respond to unusual behavior by privileged accounts, critical assets, and privileged processes
Data Exfiltration
May 10, 2021
Data exfiltration occurs when an external attacker illicitly and deliberately transfers data outside of an organization
Evasion
May 10, 2021
Detect and respond to attackers who are performing actions to evade detection
Exabeam Threat Detection Investigation and Response Use Case Packages
May 10, 2021
Achieve successful security outcomes with prescriptive, threat-centric solutions.
Privilege Escalation
March 2, 2021
Detect, investigate and respond to privilege escalation incidents.
Lateral Movement
March 2, 2021
Detect, investigate and respond to lateral movement incidents.
Compromised Credentials
March 2, 2021
Detect, investigate and respond to indicators of compromised credentials.
Exabeam and Amazon S3
November 3, 2020
Thwart attacks on cloud storage objects.
Healthcare
September 15, 2020
Mitigate your cybersecurity risks, support a culture of regulatory compliance, and overcome the cybersecurity skills shortage.
Exabeam and Code42
September 14, 2020
Quickly collect, detect, and respond to insider threats.
CBEST 2.0 Security Assessment Framework
July 14, 2020
The CBEST 2.0 Security Assessment Framework is designed to assist organizations as they assess and improve their cybersecurity readiness.
Financial Services
June 30, 2020
A behavior-based approach to detecting insider threats and compromised credentials.
Exabeam and Armis
June 29, 2020
Extend SIEM visibility into Internet of Things (IoT) devices to unify IoT and IT device defense.
Exabeam Solution Brief – Symantec
July 24, 2019
Exabeam and Netskope
July 24, 2019
Exabeam Solution Brief – Crowdstrike
July 24, 2019
Exabeam Solution Brief – SecureAuth + Core Security
December 6, 2018
Exabeam Solution Brief – Okta
December 6, 2018
Exabeam Solution Brief – DUO
December 6, 2018
Exabeam Solution Brief – Centrify
December 6, 2018
Exabeam and F5 Networks Solution Brief
November 2, 2016
Learn how the Exabeam and F5 Networks integration provides increased insider threat detection and accelerated incident investigation and SOC automation.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |