New Exabeam User Behavior Analytics Software Release

Exabeam announced the release of Exabeam Version 1.7 to its rapidly growing customer base, which includes companies in the government, financial services, healthcare, power and energy, and retail markets. Since its User Behavior Analytics solution was first made generally available in February, Exabeam is now deployed at more than 50 customer sites, up from 20 customer sites five months ago. Like the original solution, Exabeam Version 1.7 employs Stateful User TrackingT and machine learning to understand normal user credential behaviors so anomalous behaviors can be quickly discovered and managed, and to empower security teams with the information they need to stop attacks quickly.

Combining behavioral analytics, data science and machine learning, Exabeam Version 1.7 boasts the following new features and capabilities:

  • Differentiating asset types without accessing an asset database – Exabeam Version 1.7 automatically understands device behavior and learns how it should monitor different types of assets in the environment, which saves security teams time and money by avoiding manual processes.
  • Visibility into highly privileged service account characteristics for risk reduction – Organizations have two types of highly privileged accounts: one used by humans and one used by machines. Exabeam learns the difference to know if an attack is originating from a business partner organization or from inside the company, so security teams know how to handle attacks more efficiently and effectively.
  • Determining organizational activity risks Executives need to understand where internal risks are originating in order to analyze and address them. Exabeam Version 1.7 highlights employees who travel frequently, are BYOD users or have more access privileges.
  • Monitoring exploitation of account creation as an attack vector within the IT environment Phantom employee accounts are used by attackers to stay inside organizations for long periods of time, often causing the largest data breaches. Using behavior analytics to discover these accounts as they are created reduces the risk of data breaches happening in the first place, let alone continuing over lengthy time periods.

“User behavior analytics is critical to quickly understanding the real risks threatening today's complex infrastructure environments,” said John Masserini, vice president and CISO at MIAX Options Exchange, an Exabeam customer. “Exabeam provides visibility into attacker behaviors by first understanding what are normal credential behaviors to then reveal what’s anomalous. Exabeam helps organizations identify and neutralize malicious intruders that may have otherwise gone unnoticed until it is too late.”

“In a business environment that’s always in flux, the security team doesn’t always know what systems and credentials have been provisioned and to whom. This constricts the visibility they need to see attacks in context. Using the right mix of security knowledge and data science, we can solve this hard problem,” said Nir Polak, Exabeam CEO. “Exabeam Version 1.7 uses data science to address inefficiencies in incident response and a lack of security context in the enterprise to find attackers empowering malware with stolen credentials to impersonate users.”


  • Live From ISC West 2023: Day 1

    ISC West 2023 in Las Vegas, Nevada, has officially begun! Make sure to keep an eye on Security Today’s ISCW Live 2023 page, as well as our associated Twitter accounts—@SecurToday and @CampusSecur—for the latest updates from the show floor at the Venetian Expo. Read Now

    • Industry Events
    • ISC West
  • It Happened Again

    Just yesterday (as of this writing), it happened again. A 28-year-old woman shot her way into a Christian elementary school in Nashville, Tenn., on Monday and killed three children and three adults, according to national news. AP News reports that the victims were three 9-year-old children, a top school administrator, a substitute teacher, and a school custodian Read Now

  • Let's Get to Work

    You are standing at the conference center doors just waiting to get into the exhibit hall. I know you are because I’m standing next to you. This week at ISC West has been three years in the making. Last year was encouraging, and here we are waiting for the Big Show. Read Now

    • Industry Events
    • ISC West
  • Using Modern Technology

    Using Modern Technology

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. Read Now

Featured Cybersecurity

New Products

  • PACE® Long Range Ethernet Solutions

    PACE® Long Range Ethernet Solutions

    Altronix introduces the newest addition to its portfolio of PACE® Long Range Ethernet Solutions. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Paxton10 CORE Cameras

    Paxton10 CORE Cameras

    The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3