July 2025 Updates
Exabeam is proud to share a series of powerful new features across our cloud-native and self-hosted platforms.
In April, we introduced Exabeam Nova, the industry’s first security-specific AI agent purpose-built to proactively manage and accelerate investigations while driving continuous improvement.
Our July 2025 release extends Exabeam Nova’s capabilities with the new Exabeam Nova Advisor Agent in Outcomes Navigator—a built-in strategic planning assistant that helps security leaders assess coverage, identify gaps, and communicate security posture with clarity. Leaders can ask direct questions about their deployment and get actionable insights in return.
Explore what’s new in Exabeam Nova, along with additional enhancements across the New-Scale and LogRhythm SIEM Platforms, below.
INTELLIGENT, OUTCOMES-DRIVEN SECURITY
The First Cybersecurity Strategy Agent for SOC Leadership
Exabeam Nova is the industry’s first and only AI system with an agent built especially for the CISO. Embedded in Outcomes Navigator, the Exabeam Nova Advisor Agent helps shift your SOC from reactive alert triage to proactive program optimization. It delivers boardroom-ready summaries that highlight opportunities to reduce risk, demonstrate the value of security projects and investments, and show measurable progress in strengthening your security posture.
Six Specialized AI Agents
Exabeam Nova includes six specialized AI agents, each trained and optimized to support critical SOC functions. Unlike vendors that bolt AI on as an afterthought, Exabeam Nova is built into the platform as a coordinated system—designed from the ground up to drive productivity and efficiency across security operations.
Exabeam Nova delivers measurable impact:
- Reduce investigation times by over 50%
- Boost analyst productivity by up to 80%
- Save an average of 3 hours per shift on alert triage
Advisor Agent
A strategic overlay for leadership, the Advisor Agent delivers daily reports on security posture, MITRE ATT&CK® coverage, and outcome alignment. It highlights strengths, uncovers gaps, and recommends targeted improvements—turning posture insights into action.
Search Agent
Lets analysts query security data using natural language, in multiple languages—no need to write in Exabeam Query Language (EQL). Integrated directly into Threat Center, this agent makes complex searches fast and intuitive.
Converts natural language queries into charts and dashboards. From basic metrics to detailed detection trends, this agent helps teams visualize patterns, system performance, and threat activity clearly and quickly.
Threat Scoring Agent
Identifies the most relevant events using adaptive, behavior-based scoring. It continuously analyzes patterns and context to surface high-priority signals for further investigation, reducing noise and sharpening analyst focus.
Investigation Agent
Automatically generates case titles, detailed summaries, and deep threat analyses. It classifies threats, identifies key vectors, highlights top detections, and recommends next steps. With AI-driven entity summaries and context from Attack Surface Insights, it delivers a comprehensive, end-to-end view that helps analysts investigate faster and respond more effectively.
Analyst Assistant Agent
A real-time, context-aware chat companion that understands case-specific and general questions. It provides instant, relevant insights, helping analysts work faster without digging through data or documentation.

NEW ON THE CLOUD-NATIVE PLATFORM
New-Scale Platform
High performance analytics and automation delivering advanced SIEM capabilities and measurable security outcomes via the cloud.
Smarter Alert Triage
Accelerate response with streamlined workflows in Threat Center. Analysts can now group, stage, queue, and assign alerts more easily, keeping teams aligned, cutting through backlogs, and reducing time to action.
New Custom Rules with New-Scale Analytics
Address complex, organization-specific threats with custom behavioral rules. Build, import, and export rules in JSON format, then validate them through reprocessing and training to ensure precise detection and broader use case coverage.
Attack Surface Insights: User Risk Trend Chart
Visual trend lines show rising or declining risk scores over time, helping analysts spot unusual behavior early and reduce investigation time. These insights are easily accessible from the Threat Center UI.
Behavioral Detections for New-Scale SIEM
New behavioral detections are now available for New-Scale SIEM, bringing baseline behavioral analytics capabilities to customers who don’t yet use New-Scale Analytics. These detections map to ATT&CK techniques and are delivered as a pre-packaged set of correlation rules, ready to run in your SIEM.
Improved User and Device Entity Watchlists
Build real-time watchlists using automation and threat scoring. Easily track high-value users, a such as executives and contractors, and critical hosts with a configurable UI embedded in Threat Center for fast, focused monitoring.

NEW ON THE SELF-HOSTED PLATFORM
LogRhythm SIEM
A scalable, feature rich, and easy-to-use self-hosted SIEM offering unmatched visibility, protection, and threat detection across all environments, systems, and assets.
Surface Critical Threats with 14 New Alarm Filters
Version 7.21 introduces 14 filterable alarm fields, doubling the previous total. Analysts can now triage faster by filtering alarms by user, IP, hostname, location, VMID, and more. This enables precise threat detection and faster, targeted response.
Use Case: Sort Alarms by MITRE ATT&CK® TTPs
Expanded alarm filtering now allows analysts to sort alerts by ATT&CK tactics, techniques, and procedures. With AI Engine rules mapped to Common Events, teams can instantly prioritize alarms based on known adversary behaviors—accelerating detection and investigation workflows.
Instant Log Data in Data Indexer Dashboards
LogRhythm SIEM now offers a “View Logs” option directly within Data Indexer Dashboards, eliminating the need to switch contexts. Analysts can seamlessly pivot from high-level metrics to raw logs in a single click, accelerating threat hunting and forensic analysis.

See Exabeam in Action
Request more information or request a demo of the industry’s most powerful platforms for threat detection, investigation, and response (TDIR).
Learn more:
- If self-hosted or cloud-native SIEM is right for you
- How to ingest and monitor data at cloud scale
- Why seeing abnormal user and device behavior is critical
- How to automatically score and profile user activity
- See the complete picture using incident timelines
- Why playbooks help make the next right decision
- Support compliance mandates
Award-Winning Leaders in Security