White Papers Archives - Exabeam

Exabeam Resource Library

Discover more about the Exabeam Security Operations Platform, learn about the latest in SecOps, and find resources to help mature your SOC. Browse by content type or explore our featured picks below.
Already a customer?

If you’re looking for documentation or training materials follow the links below.

See our documentation
See our training material

White Papers


Recent

White Papers

Top 3 Things to Consider When Building Your Modern Threat Detection and Response Program

August 2, 2021

Read More

All White Papers

Top 3 Things to Consider When Building Your Modern Threat Detection and Response Program
August 2, 2021

Read More

A SOC Manager’s Guide to New Efficiencies Automating the Full Threat Detection and Response Workflow
July 29, 2021

Read More

SIEM and XDR: A Comparison Guide
July 21, 2021

Read More

Want to Turbocharge your threat detection and response?
July 7, 2021

Read More

5 Questions on the Future of SIEM and Cloud Answered
July 7, 2021

Read More

Thinking about shifting your SIEM to the cloud? Read this first.
July 7, 2021

Read More

C-RAF 2.0: Meet Your C-RAF Maturity Assessment Requirements With Exabeam
May 27, 2021

Read More

Preventing Insider Threats with UEBA
March 15, 2021

Read More

10 Reasons to Augment Your SIEM with Behavioral Analytics
January 26, 2021

Read More

Unlocking Effective Threat Detection and Investigation with Analytics and TTPs
April 22, 2020

Read More

Exabeam Validated Architectures
April 20, 2020

Read More

NIST 800-171 Guidelines
April 16, 2020

Read More

Securing Operational Technology for Rapid Threat Detection and Response
April 15, 2020

Read More

The Exabeam Cloud Security Toolkit
March 17, 2020

Read More

Supporting RMiT Guidelines with Exabeam
March 2, 2020

Read More

Using the MITRE ATT&CK Knowledge Base to Improve Threat Hunting and Incident Response
January 10, 2020

Read More

The Essential Guide to SIEM
January 8, 2020

Read More

Securing the Cloud with Modern SIEM Monitoring and Analytics
December 4, 2019

Read More

A Technology Solution for Protecting Federal Agencies from Insider Threats
December 3, 2019

Read More

Insider Risk Management: Adapting to the Evolving Security Landscape
October 7, 2019

Read More

IBM QRadar SIEM Migration Guide
July 24, 2019

Read More

Splunk SIEM Migration Guide
July 24, 2019

Read More

Micro Focus ArcSight SIEM Migration Guide
July 24, 2019

Read More

8 Steps to Migrate your SIEM
March 26, 2019

Read More

Exabeam Smart Timelines
March 20, 2019

Read More

Ten Must-Have Features of a Modern SIEM
January 8, 2019

Read More

Rules Versus Models in Your SIEM
October 25, 2018

Read More

Meeting the Latest NIST SP 800-53 Revision 4 Guidelines
October 25, 2018

Read More

Meeting ISO 27002 Standards
October 25, 2018

Read More

Complying with SOX Regulations Using the Exabeam Security Intelligence Platform
July 10, 2018

Read More

Implementing PCI DSS 3.2 Controls with Exabeam
May 3, 2018

Read More

Streamlining IR Operations with Orchestration and Automation
October 26, 2017

Read More

Step-by-Step Incident Response for Today’s Top 3 Security Scenarios
August 16, 2017

Read More

Protect Critical Infrastructure with Security Intelligence
June 15, 2017

Read More

Adhering to GDPR Security Controls with Exabeam
March 15, 2017

Read More

Monitoring Sensitive File Access with UEBA
November 2, 2016

Read More

The Incident Response Makeover Guide
October 10, 2016

Read More

Understanding the Exabeam Session Data Framework
June 3, 2016

Read More

Supporting MAS-TRM Guidelines with Exabeam
June 2, 2016

Read More

Applying Data Science to User and Entity Behavior Analytics
April 29, 2016

Read More

Detecting Compromised User Credentials
February 11, 2016

Read More

UEBA for Data Loss Prevention
December 9, 2015

Read More

Get the Latest on Information Security

We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.

Or get our RSS feed