ABA is a subset of UEBA. UEBA applies behavioral analytics to detect risk in users, entities, and non-human identities. ABA uses the same approach for AI agents and autonomous activity, giving your security operations team targeted visibility into AI-driven risk as part of its broader UEBA strategy.
DEPLOY INDUSTRY-LEADING UEBA
Upgrade a SIEM With UEBA
New-Scale Analytics can run on top of your SIEM to address insider threats, credential theft, and advanced attacks. Its UEBA engine applies risk-based anomaly detection to user and entity activity, while ABA adds visibility into AI agents and other non-human behavior

UNDERSTAND NORMAL BEHAVIOR
Detect and Prioritize Anomalies
New-Scale Analytics builds behavioral baselines and uses business context to refine risk scores. Your team can identify subtle changes in users, entities, and non-human identities. ABA highlights activity from AI agents. When risk meets a set threshold, a case opens for investigation.

CONTEXTUAL INSIGHTS
Use Entity Context
Entities in your environment, such as users, endpoints, servers, and applications, are critical to determining risk. Attack Surface Insights identifies entities in parsed logs and connects attributes and contextual data to build profiles that strengthen behavioral detections.
FOCUS ON OUTCOMES
Prioritize Your Most Critical Threats
Integrate data from many sources to increase visibility in your on-premises and cloud environments. Tailor detection and response workflows to address high-risk activity, including suspicious AI agent behavior. ABA extends UEBA to the AI workforce.
REALIZE MORE VALUE
Maximize Productivity With AI and Automation
Automated timelines organize related detections chronologically, visualizing the full scope of a threat. Activity is summarized for anomalies and prebuilt playbooks reduce manual routines so your team can respond faster.
EASY SETUP, POWERFUL PERFORMANCE
Replace or Augment Your On-Premises SIEM
Industry-leading TDIR is now more attainable for organizations at any size or maturity. New-Scale Fusion is a full-featured platform for a new deployment or SIEM replacement, while New-Scale Analytics adds advanced behavioral analytics to your current SIEM.
How can we help? Talk to an expert.
Contact UsFrequently Asked Questions
How does ABA relate to UEBA?
How does Exabeam UEBA help secure AI agents and automated workflows?
UEBA learns normal behavior for users and entities to detect meaningful changes over time. ABA extends this model to AI agents and automated workflows. It adds behavioral visibility, centralized monitoring, and investigation support so analysts can identify suspicious activity and respond with better context.
Can I see and edit the Exabeam UEBA detection rules?
Yes. The Exabeam Community contains Knowledge Base articles on how to see and edit detections. It’s recommended to clone a rule first and then make changes needed for your organization.
How does New-Scale Analytics use generative AI for security?
New-Scale Fusion uses generative AI to accelerate investigations, run natural-language queries, build reports, and recommend incident response steps. It learns from past security events to help identify potential threats sooner and reduce the workload for your security operations team.
We plan to deploy New-Scale Analytics. Are there resources to help bring our security operations team up to speed?
Yes. Exabeam offers an extensive training curriculum, including a track for analysts who are new to UEBA. Training includes free virtual courses as well as instructor-led hands-on sessions.
“No other technology provides insights and behavioral model customization like Exabeam. They pioneered user and entity behavior analytics (UEBA).”
-
-
Nick Forster
Head of Security Operations | The Missing Link
See Exabeam in Action
Request more information or request a demo of the industry’s most powerful platforms for threat detection, investigation, and response (TDIR).
Learn more:
- If self-hosted or cloud-native SIEM is right for you
- How to ingest and monitor data at cloud scale
- How monitoring and analyzing AI and automated agent behavior uncovers risky non-human activity
- How to automatically score and profile user activity
- See the complete picture using incident timelines
- Why playbooks help make the next right decision
- Support compliance mandates
Award-Winning Leaders in Security





