Security Intelligence Platform from Exabeam launched
Thursday, February 2, 2017
Richard Harris |
Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.
Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and international impact. They are serious and require new approaches to detect them and shut them down.
To address credential-based attacks, IT security organizations see the need to collect massive amounts of activity data, to connect that data and detect threats, and to respond effectively to shut down threats completely. This type of collection, analysis, and response has traditionally been performed via Security Information and Event Management (SIEM) solutions, a $2.1B market in 2016, growing to $3B by 2020. However, SIEM products are no longer able to detect credential-based attacks, whether from a hacker using stolen passwords or from a malicious employee using his or her own access rights. These products limit data collection by pricing by the byte. Even worse, large shortfalls in security expertise mean that firms are unable to solve their problems simply by hiring more experts; they don’t exist.
Exabeam addresses this need to collect more data than ever before, to make better connections across that data to detect threats, and to augment human analysts during incident response. Their platform provides security intelligence and management solutions to help organizations of any size protect their most valuable information. The Exabeam Security Intelligence Platform includes five key products that can be deployed separately or in combination:
- Log Manager: Built on open source big data technology, Log Manager provides unlimited security data collection, indexing, and search, at a predictable price. Since Log Manager pricing is not based on data volume, customers can collect and retain as much data as their needs require.
- Advanced Analytics: Advanced Analytics uses patented stateful sessions to detect credential-based threats, even when attackers switch devices or identities. Exabeam Advanced Analytics already enables threat detection at many financial services, healthcare, retail, energy, and government organizations around the globe.
- Incident Responder: To address chronic security hiring shortfalls, Incident Responder provide automated playbook creation and execution, so that detected attacks are shut down quickly and completely. Incident Responder includes out of the box playbooks for the most common attacks, such as phishing attacks, malware, stolen passwords, and data theft.
- Threat Hunter: As part of an investigation, Threat Hunter enables analysts to proactively search for attackers on a network. Analysts can easily, via point and click, search for users that have any combination of activities or attributes that might be related to a specific type of attack.
- Cloud Connectors: Since almost every organization now operates some percentage of its IT in the cloud, integrating that data into log management, detection, and incident response is required. Exabeam Cloud Connectors enable customers to bring log data from popular cloud services such as Office 365, Amazon Web Services, Salesforce.com, Box, and others into the platform, where it it automatically linked to on-premise behaviors.
“Data breaches are now affecting national political and economic systems, and the technologies that have been used to detect and respond to these attacks are completely ineffective,” said Nir Polak, CEO and Founder of Exabeam. “A completely new approach to data protection is required, one that relies on modern analytics and automation, married to human expertise.”
Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and international impact. They are serious and require new approaches to detect them and shut them down.
To address credential-based attacks, IT security organizations see the need to collect massive amounts of activity data, to connect that data and detect threats, and to respond effectively to shut down threats completely. This type of collection, analysis, and response has traditionally been performed via Security Information and Event Management (SIEM) solutions, a $2.1B market in 2016, growing to $3B by 2020. However, SIEM products are no longer able to detect credential-based attacks, whether from a hacker using stolen passwords or from a malicious employee using his or her own access rights. These products limit data collection by pricing by the byte. Even worse, large shortfalls in security expertise mean that firms are unable to solve their problems simply by hiring more experts; they don’t exist.
Exabeam addresses this need to collect more data than ever before, to make better connections across that data to detect threats, and to augment human analysts during incident response. Their platform provides security intelligence and management solutions to help organizations of any size protect their most valuable information. The Exabeam Security Intelligence Platform includes five key products that can be deployed separately or in combination:
- Log Manager: Built on open source big data technology, Log Manager provides unlimited security data collection, indexing, and search, at a predictable price. Since Log Manager pricing is not based on data volume, customers can collect and retain as much data as their needs require.
- Advanced Analytics: Advanced Analytics uses patented stateful sessions to detect credential-based threats, even when attackers switch devices or identities. Exabeam Advanced Analytics already enables threat detection at many financial services, healthcare, retail, energy, and government organizations around the globe.
- Incident Responder: To address chronic security hiring shortfalls, Incident Responder provide automated playbook creation and execution, so that detected attacks are shut down quickly and completely. Incident Responder includes out of the box playbooks for the most common attacks, such as phishing attacks, malware, stolen passwords, and data theft.
- Threat Hunter: As part of an investigation, Threat Hunter enables analysts to proactively search for attackers on a network. Analysts can easily, via point and click, search for users that have any combination of activities or attributes that might be related to a specific type of attack.
- Cloud Connectors: Since almost every organization now operates some percentage of its IT in the cloud, integrating that data into log management, detection, and incident response is required. Exabeam Cloud Connectors enable customers to bring log data from popular cloud services such as Office 365, Amazon Web Services, Salesforce.com, Box, and others into the platform, where it it automatically linked to on-premise behaviors.
“Data breaches are now affecting national political and economic systems, and the technologies that have been used to detect and respond to these attacks are completely ineffective,” said Nir Polak, CEO and Founder of Exabeam. “A completely new approach to data protection is required, one that relies on modern analytics and automation, married to human expertise.”
Become a subscriber of App Developer Magazine for just $5.99 a month and take advantage of all these perks.
MEMBERS GET ACCESS TO
- - Exclusive content from leaders in the industry
- - Q&A articles from industry leaders
- - Tips and tricks from the most successful developers weekly
- - Monthly issues, including all 90+ back-issues since 2012
- - Event discounts and early-bird signups
- - Gain insight from top achievers in the app store
- - Learn what tools to use, what SDK's to use, and more
Subscribe here