Solution Briefs
Exabeam and Cribl
July 13, 2023
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More
If you’re looking for documentation or training materials follow the links below.
See our documentation
Exabeam and Cribl
July 13, 2023
Achieving OMB M-21-31 with Exabeam
July 11, 2023
Government agencies are tasked with achieving mature M-21-31 compliance by August 27, 2023. Yet despite best efforts, as the deadline approaches, many agencies struggle to complete their journeys due to technological challenges around legacy systems, the complexity of the requirements, resource allocation, and budget constraints as they continue to throttle progress.
State and Local Government
April 28, 2023
With public safety, finances, sensitive information, and trust at stake, it’s necessary that state and local government agencies implement solutions that enable security teams to quickly and accurately detect, investigate, and respond to cyberthreats. Exabeam helps agencies keep critical systems up and running and protect citizens’ valuable personal data.
Replacing or Augmenting Splunk with Exabeam
April 11, 2023
Automated Investigation Experience
December 7, 2022
Behavioral Analytics
November 29, 2022
Exabeam and Google Cloud
October 28, 2022
Bringing the Modern SOC to Cloud-Oriented Organizations
Exabeam and Mimecast
October 20, 2022
Exabeam Ingester for CrowdStrike
May 3, 2022
Detect and investigate advanced attacks and insider threats with UEBA.
Your Greatest Adversary Could Be an Insider Threat
April 21, 2022
External Attacks: Ransomware and Phishing Attacks
March 8, 2022
Higher Education
December 21, 2021
Empower small teams with analytics and automation for faster, more accurate, and cost-effective threat detection, and response.
Malware
July 12, 2021
Malware is any malicious program or code developed by adversaries with the intent to cause damage to data or a system or gain unauthorized access to a network.
Ransomware
June 23, 2021
Ransomware is a form of malware designed to encrypt a target organization’s files, holding the data hostage until the organization pays the ransom demanded by the attackers.
Abnormal Authentication
June 21, 2021
Using out-of-the-ordinary authentication actions to identify a malicious insider.
Destruction of Data
June 15, 2021
Destruction of data is when a user destroys data in an effort to evade detection or sabotage a corporation.
Audit Tampering
June 15, 2021
Audit tampering is when a user tampers with audit logs in an effort to destroy an incriminating audit trail and evade detection.
Exabeam Overview
May 27, 2021
Giving your organization the best chance to outsmart the odds.
Data Leak
May 26, 2021
Data leak is when a malicious insider illicitly and deliberately transfers data outside of an organization.
Privilege Abuse
May 24, 2021
Workforce Protection
May 24, 2021
Workforce protection identifies a user who is exhibiting signs of leaving an organization or communicating with a competitor.
Data Access Abuse
May 24, 2021
Data access abuse is when a user abnormally accesses sensitive corporate data or resources. This activity serves as a leading indicator of data leakage.
Industry Solution Brief – Retail
May 24, 2021
Secure the omnichannel experience, protect critical data and support a culture of regulatory compliance
Manufacturing
May 24, 2021
Protect intellectual property, secure smart factory initiatives and overcome the cybersecurity skills shortage.
Exabeam Answers 10 Questions to Ask About a Cloud SIEM
May 10, 2021
Account Manipulation
May 10, 2021
Security teams struggle to detect attacks using account manipulation
Privileged Activity
May 10, 2021
Detect and respond to unusual behavior by privileged accounts, critical assets, and privileged processes
Data Exfiltration
May 10, 2021
Data exfiltration occurs when an external attacker illicitly and deliberately transfers data outside of an organization
Evasion
May 10, 2021
Detect and respond to attackers who are performing actions to evade detection
Exabeam Threat Detection Investigation and Response Use Case Packages
May 10, 2021
Achieve successful security outcomes with prescriptive, threat-centric solutions.
Privilege Escalation
March 2, 2021
Detect, investigate and respond to privilege escalation incidents.
Lateral Movement
March 2, 2021
Detect, investigate and respond to lateral movement incidents.
Compromised Credentials
March 2, 2021
Detect, investigate and respond to indicators of compromised credentials.
Exabeam and Amazon S3
November 3, 2020
Thwart attacks on cloud storage objects.
Healthcare
September 15, 2020
Mitigate your cybersecurity risks, support a culture of regulatory compliance, and overcome the cybersecurity skills shortage.
Exabeam and Code42
September 14, 2020
Quickly collect, detect, and respond to insider threats.
CBEST 2.0 Security Assessment Framework
July 14, 2020
The CBEST 2.0 Security Assessment Framework is designed to assist organizations as they assess and improve their cybersecurity readiness.
Financial Services
June 30, 2020
A behavior-based approach to detecting insider threats and compromised credentials.
Exabeam and Armis
June 29, 2020
Extend SIEM visibility into Internet of Things (IoT) devices to unify IoT and IT device defense.
Exabeam Solution Brief – Symantec
July 24, 2019
Exabeam and Netskope
July 24, 2019
Exabeam Solution Brief – Crowdstrike
July 24, 2019
Exabeam Solution Brief – SecureAuth + Core Security
December 6, 2018
Exabeam Solution Brief – Okta
December 6, 2018
Exabeam Solution Brief – DUO
December 6, 2018
Exabeam Solution Brief – Centrify
December 6, 2018
Exabeam and F5 Networks Solution Brief
November 2, 2016
Learn how the Exabeam and F5 Networks integration provides increased insider threat detection and accelerated incident investigation and SOC automation.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |