• Exabeam
UEBA

The world’s most-deployed behavioral analytics security solution, using modern threat detection and machine learning investigation.

Complex Threat Identification Using Behavioral Analysis

Cyberattacks are becoming more complex and harder to find. Analysts often can’t find attacks using correlation rules because they lack context or do not set up rules for incidents they’ve never seen, generating false negatives. Correlation rules also require significant maintenance. Advanced Analytics automatically detects the behaviors indicative of a threat. It also fully integrates with the Exabeam Threat Intelligence Service and third party threat intelligence services to provide real-time, actionable intelligence into potential threats in your environment by uncovering indicators of compromise (IOCs) and malicious hosts.

Prebuilt Timelines Automatically Reconstruct Security Incidents

An analyst’s time is precious. Using legacy tools, it can take days or weeks to manually construct an incident timeline. Advanced Analytics provides a machine-incident timeline for every user and entity, every day. Anomalies are flagged and details of the incident and its context are displayed, including data insight models. What took significant time to investigate in a legacy SIEM now takes minutes, making security teams more productive and investigations more calculated.

Extend Behavioral Analytics to Cloud Storage Objects

Organizations are moving their data to the cloud to leverage the scalability, security, and performance of an object storage service. But cloud data storage has been the root of many breaches, because configuration blunders go undetected and easily expose sensitive data. Advanced Analytics logs activity from cloud storage objects in multi-cloud environments—namely Amazon S3, Azure Blobs, and Google Cloud Platform Cloud Storage buckets—to provide organizations complete visibility into their cloud storage activity and the databases unintentionally exposed to the internet. Advanced Analytics then builds behavioral models to detect malicious user activity, like inappropriate access, to prevent compromise or exfiltration of sensitive data stored in the cloud.

Align Detection to the MITRE ATT&CK Framework

Inconsistent taxonomies across analysts and tools make collaboration during threat detection and investigation needlessly complicated. The MITRE ATT&CK framework solves this problem by providing a common framework for analysts to use to describe attacker tactics and techniques. Advanced Analytics maps Exabeam detection methods and event labels to the MITRE ATT&CK framework, allowing security analysts to view and filter MITRE techniques within Exabeam Smart Timelines. Analysts can mouse over labels to see a pop-up description of that technique, or click on labels to open the MITRE webpage for a more detailed description.

Dynamic Peer Grouping

User behavior patterns often differ based on attributes, including: the team the user is on, what projects they are involved in, where they are located, etc. To provide an additional layer of detection, dynamic peer grouping uses machine learning to assign users to groups based on their behavior, and then cross-references their activity against that of those groups to identify anomalous, risky behavior.

Lateral Movement Detection

Lateral movement is a method attackers use to move through a network by using IP addresses, credentials, and machines in search of key assets. Tracking is difficult, because data must be analyzed from everywhere and logs are often incomplete. Advanced Analytics allows security teams to see an attacker’s movement by using patented host-IP-user mapping to fill in the log gaps, and attributes all activity to users and devices. This attribution, combined with data enhancement and additional context, provides visibility into abnormal behavior and risky activity.

Asset Ownership Association

One part of performing a security investigation is the manual process of determining who owns or regularly uses the devices involved in an incident. It’s incredibly time-intensive for security teams. Exabeam’s patented host-IP-user mapping in Advanced Analytics easily and efficiently allows analysts to determine the owner of a device based on their behavior and interactions.

 

Other Products