White Papers
A CISO’s Guide to the AI Opportunity in Security Operations
September 25, 2023
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
r-tec chooses the Exabeam Security Operations Platform to support their SOC, MDR, and incident response services
Read More
In this two-day, virtual, instructor-led course, students will learn how to troubleshoot the technical components that make up Advanced Analytics. Students will learn about the underlying tools and technologies that power Advanced Analytics, uncovering how to troubleshoot them along the way. They will interact with the User Interface, Data Systems, Analytics Engine, and Log Ingestion... Read more »
Read More
Maximize data visibility and reduce costs with New-Scale SIEMTM from Exabeam and Cribl Stream Legacy SIEM solutions weren’t built for today’s complex, rapidly expanding environments, creating what we call the SIEM effectiveness gap. This gap is widening as data volumes increase, driving up the cost of storage and resources needed to manage security alerts. Platforms... Read more »
Read More
If you’re looking for documentation or training materials follow the links below.
See our documentation
White Papers
September 25, 2023
Read MoreA CISO’s Guide to the AI Opportunity in Security Operations
September 25, 2023
10 Reasons SIEM Should Remain Dedicated to Security
June 27, 2023
A CISO’s Guide to Rethinking Insider Risk
June 13, 2023
Discover insights and strategies to tackle insider threats in your organization in our comprehensive white paper. This essential guide offers valuable information on understanding and addressing insider threats, equipping you with practical tools and frameworks to enhance your organization's security posture.
A CISO’s Guide to Defender Alignment
April 25, 2023
Splunk to Exabeam Transition Blueprint
April 11, 2023
A CISO’s Guide to Adversary Alignment
November 18, 2022
Preventing Insider Threats with UEBA
October 12, 2022
Detecting Compromised User Credentials
October 11, 2022
How Exabeam Solves 7 Use Cases for Compromised Insiders
October 9, 2022
Meeting ISO 27002 Standards
October 9, 2022
Keys to the Kingdom: Guidance for Effective Zero Trust Architecture
August 22, 2022
Using a Layered Approach to Improve Ransomware Detection and Response
June 19, 2022
Why Are Companies STILL Getting Breached?
February 9, 2022
Top 10 Reasons to Augment Your Legacy SIEM with XDR
February 3, 2022
A CISO’s Guide to Communicating Risk
January 31, 2022
How to Fast Track Logging Compliance for OMB Memorandum M-21-31 with Exabeam
December 29, 2021
The Responsibility of Risk
November 15, 2021
Top 3 Things to Consider When Building Your Modern Threat Detection and Response Program
August 2, 2021
A SOC Manager’s Guide to New Efficiencies Automating the Full Threat Detection and Response Workflow
July 29, 2021
SIEM and XDR: A Comparison Guide
July 21, 2021
Want to Turbocharge your threat detection and response?
July 7, 2021
5 Questions on the Future of SIEM and Cloud Answered
July 7, 2021
Featuring Insights from Joseph Blankenship, VP, Research Director, Forrester
Thinking about shifting your SIEM to the cloud? Read this first.
July 7, 2021
10 Questions to Ask About a Cloud SIEM
C-RAF 2.0: Meet Your C-RAF Maturity Assessment Requirements With Exabeam
May 27, 2021
10 Reasons to Augment Your SIEM with Behavioral Analytics
January 26, 2021
Why behavioral analytics should be part of your organization's security health.
Unlocking Effective Threat Detection and Investigation with Analytics and TTPs
April 22, 2020
How UEBA and MITRE ATT&CK Techniques Significantly Improves SOC Productivity
Exabeam Validated Architectures
April 20, 2020
This paper on Exabeam Validated Architectures provides an overview of validated architectures and the information you need, including design principles, best practice guidelines, and general information to successfully select and deploy Exabeam products.
NIST 800-171 Guidelines
April 16, 2020
Protecting controlled unclassified information with Exabeam.
Securing Operational Technology for Rapid Threat Detection and Response
April 15, 2020
A new generation of Industrial IoT devices leverage the internet for smarter Operational Technology (OT).
Supporting RMiT Guidelines with Exabeam
March 2, 2020
The Risk Management in Technology (RMiT) guidelines published by Bank Negara Malaysia sets a rigorous standard for risk management programs for financial institutions in Malaysia.
Using the MITRE ATT&CK® Knowledge Base to Improve Threat Hunting and Incident Response
January 10, 2020
The Essential Guide to SIEM
January 8, 2020
Securing the Cloud with Modern SIEM Monitoring and Analytics
December 4, 2019
Many enterprises are embracing the cloud to supersede on-premises data center resources.
A Technology Solution for Protecting Federal Agencies from Insider Threats
December 3, 2019
NITTF Requirements Mapping Guide
IBM QRadar SIEM Migration Guide
July 24, 2019
Micro Focus ArcSight SIEM Migration Guide
July 24, 2019
8 Steps to Migrate your SIEM
March 26, 2019
Exabeam Smart Timelines
March 20, 2019
Ten Must-Have Features of a Modern SIEM
January 8, 2019
Rules Versus Models in Your SIEM
October 25, 2018
Meeting the Latest NIST SP 800-53 Revision 4 Guidelines
October 25, 2018
Complying with SOX Regulations Using the Exabeam Security Intelligence Platform
July 10, 2018
Implementing PCI DSS 3.2 Controls with Exabeam
May 3, 2018
Learn how Exabeam can be used to help companies meet various security controls detailed within PCI-DSS.
Streamlining IR Operations with Orchestration and Automation
October 26, 2017
Read this white paper to see how effective responses prevent minor security incidents from becoming major data breaches.
Step-by-Step Incident Response for Today’s Top 3 Security Scenarios
August 16, 2017
Get Response Playbooks for Malware, Phishing and Departed Employee.
Protect Critical Infrastructure with Security Intelligence
June 15, 2017
Learn how user and entity behavior analytics (UEBA) can help critical infrastructure identify and respond to anomalous and/or risky behavior.
Adhering to GDPR Security Controls with Exabeam
March 15, 2017
Learn how Exabeam helps organizations better monitor access of personal data and ensure alignment with the European General Data Protection Regulation (GDPR).
Monitoring Sensitive File Access with UEBA
November 2, 2016
Learn how to detect and evaluate file access risk across the entire file handling lifecycle with UEBA.
The Incident Response Makeover Guide
October 10, 2016
Understand how automation can slash response timelines and increase SOC productivity. Get the ROI and operational benefits of a UEBA solution.
Understanding the Exabeam Session Data Framework
June 3, 2016
Learn how to link risky activity across identities and accounts with a new data layer for your security analytics.
Supporting MAS-TRM Guidelines with Exabeam
June 2, 2016
Learn how to apply behavioral monitoring to MAS-TRM Guidelines.
Applying Data Science to User and Entity Behavior Analytics
April 29, 2016
Discusses the effective use of data science within a UEBA system.
8 Key Functions to Prevent Data Loss with User and Entity Behavior Analytics
December 9, 2015
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |