New Exabeam User Behavior Analytics Software Release

Exabeam announced the release of Exabeam Version 1.7 to its rapidly growing customer base, which includes companies in the government, financial services, healthcare, power and energy, and retail markets. Since its User Behavior Analytics solution was first made generally available in February, Exabeam is now deployed at more than 50 customer sites, up from 20 customer sites five months ago. Like the original solution, Exabeam Version 1.7 employs Stateful User TrackingT and machine learning to understand normal user credential behaviors so anomalous behaviors can be quickly discovered and managed, and to empower security teams with the information they need to stop attacks quickly.

Combining behavioral analytics, data science and machine learning, Exabeam Version 1.7 boasts the following new features and capabilities:

  • Differentiating asset types without accessing an asset database – Exabeam Version 1.7 automatically understands device behavior and learns how it should monitor different types of assets in the environment, which saves security teams time and money by avoiding manual processes.
  • Visibility into highly privileged service account characteristics for risk reduction – Organizations have two types of highly privileged accounts: one used by humans and one used by machines. Exabeam learns the difference to know if an attack is originating from a business partner organization or from inside the company, so security teams know how to handle attacks more efficiently and effectively.
  • Determining organizational activity risks Executives need to understand where internal risks are originating in order to analyze and address them. Exabeam Version 1.7 highlights employees who travel frequently, are BYOD users or have more access privileges.
  • Monitoring exploitation of account creation as an attack vector within the IT environment Phantom employee accounts are used by attackers to stay inside organizations for long periods of time, often causing the largest data breaches. Using behavior analytics to discover these accounts as they are created reduces the risk of data breaches happening in the first place, let alone continuing over lengthy time periods.

“User behavior analytics is critical to quickly understanding the real risks threatening today's complex infrastructure environments,” said John Masserini, vice president and CISO at MIAX Options Exchange, an Exabeam customer. “Exabeam provides visibility into attacker behaviors by first understanding what are normal credential behaviors to then reveal what’s anomalous. Exabeam helps organizations identify and neutralize malicious intruders that may have otherwise gone unnoticed until it is too late.”

“In a business environment that’s always in flux, the security team doesn’t always know what systems and credentials have been provisioned and to whom. This constricts the visibility they need to see attacks in context. Using the right mix of security knowledge and data science, we can solve this hard problem,” said Nir Polak, Exabeam CEO. “Exabeam Version 1.7 uses data science to address inefficiencies in incident response and a lack of security context in the enterprise to find attackers empowering malware with stolen credentials to impersonate users.”

Featured

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • The Progress of Biometrics

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.