Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

A Closer Look Inside UEBA: Top 5 FAQs [Blog Series]

I was speaking with a distinguished IT Security analyst at Gartner this week and we spent a good portion of our time talking about both the excitement and the frothiness of the User and Entity Behavior Analytics (UEBA) space. With the spotlight burning brighter on insider threats, our customers are very interested in learning more about how to protect themselves and how UEBA and related technologies can help with this.blogseries.png

Over the next few weeks we’ll be posting a series of 5 blogs that talk about some of the most common questions we’re asked surrounding UEBA (Also called UBA for User Behavior Analytics or SUBA for Security User Behavior Analytics by Forrester Research)  to discuss this emerging category of solutions and some of the capabilities they offer. We’ll also look at how they intersect with other technologies like Next-generation Firewalls,  Security Information and Event Management (SIEM or also called Security Intelligence), 2 Factor and Multifactor Authentication, IT Risk Management, and Network Forensics to name a few.

The concept of UEBA, as defined by  Gartner in their Market Guide for User Behavior Analytics, is a cybersecurity process about detection of insider threats, targeted attacks, and fraud. UBA solutions look at patterns of human behavior, and then apply algorithms and statistical analysis to detect meaningful anomalies from those patterns—anomalies that indicate potential threats.

In the past two years we have seen a quick rise of security breaches caused by insider threats:  compromised credentials, malicious privileged insiders, and more. It should be no surprise that IT security organizations are looking beyond their concerns at the perimeter and taking a closer look at how to prevent insider threats.  UEBA can play a role in detecting and real-time response to these kinds of threats and breaches. 

You can follow the series here:

1. What is UEBA and why does it matter in Threat Detection? 

2.  Traditional UEBA vs Behavioral Firewall for Breach and Insider Threat Prevention. How do they Differ?

3. What are the benefits of UEBA? 

4. How do I get started with UEBA / Behavioral Firewalls and How quickly can ROI be realized?

5. What does it take to manage advanced UEBA and how can it make my security team more efficient and not more overwhelmed?”

 

Topics: ueba,

Posted by Heather Howland on September 21, 2016 1:18 AM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More