Search DubaiPRNetwork.com

Home >> Technology

ManageEngine Introduces User and Entity Behavior Analytics in its SIEM Solution

Wednesday, March 6, 2019/ Editor -  

Share

Home >> Technology

 

ManageEngine, the real-time IT management company, today announced that it has introduced user and entity behavior analytics (UEBA) into its SIEM solution, Log360. With score-based risk assessment, threat corroboration, anomaly detection powered by machine learning, and other new capabilities, the Log360 UEBA add-on helps security professionals identify, qualify, and investigate internal threats and anomalies by extracting more information from logs for better context.

According to Verizon's 2018 Data Breach Investigations Report, over a quarter of the 53,308 cyberattacks in 2017 involved insiders. Insider threats can be particularly difficult to detect with conventional threat detection systems, as it’s hard to spot the signs of someone using their legitimate access to data for nefarious purposes, and both vulnerabilities and exploits are unknown. UEBA delivers more robust and accurate threat detection by using machine learning to set a baseline of a user’s normal activity, and then flag any deviations from that baseline.

'In today’s IT security landscape, rigid alert rules and conventional threat detection systems no longer make the cut. The need of the hour is a system that can learn and adapt to continuous change,' said Manikandan Thangaraj, director of program management at ManageEngine. 'Log360 UEBA does just that and improves the accuracy of threat detection, helping SOC personnel qualify and investigate threats that actually merit investigation.'

Highlights of Log360 UEBA

Log360 UEBA monitors user activity captured in logs to identify behavioral changes. User activities that would otherwise go unnoticed are flagged, reducing the time it takes to detect and respond to threats. The highlights of Log360 UEBA include:

Anomaly detection: Spots deviant user and entity behavior such as logons at unusual hours, excessive logon failures, and file deletions from a host that is not generally used by a particular user.
Score-based risk assessment: Generates a risk score for each user and entity based on how dangerous their behavior is, helping security admins determine which threats merit investigation.
Threat corroboration: Identifies indicators of compromise and indicators of attack, exposing major threats including insider threats, account compromise, and data exfiltration.
 


Previous in Technology

Next in Technology


Home >> Technology Section

Latest Press Release

Introducing the MK Beach Club Pieces

Emirates MarsUnder the theme of ‘Governance in the Age of Artificial Intelligenc ...

Emirates Mars Mission Science Week to commence in July

du first telco operator in the Middle East to launch 5G mobile devices

Jumeirah College Dubai celebrates remarkable ‘Graduation Day'

Hamilton present Ventura collection

La Grande Vie by Corum

Sophos Boosts Intercept X for Server with Endpoint Detection and Response to Hel ...

From the Big Screen to Real Life: Tag Heuer Unveils New Monaco Limited Edition ...

Top 5 Technology Gift Ideas for Father's Day

Nissan shares vision for future mobility at CES Asia 2019

The Ralph Lauren Purple Label Spring 2020 Collection

Bedroom Decoration and Mattress Myths Debunked by IKEA

Rove At The Park opens doors to a thrilling lifestyle experience in Dubai Parks ...

Begin a new journey at Middlesex University Dubai this September

Your Last Chance to Seize Sofitel the Palm S Unrivaled Summer Offer

Zaki Nusseibeh, UAE Minister of State Upholds Tolerance and Cooperation in Movin ...

An Environmentally Friendly Approach to Interior Design with Home and Soul Dubai

Restoration by Parmigiani Fleurier

Sharjah Chamber Concludes its Participation in the World Chamber Congress in Bra ...