Exabeam Marries Analytics App to SIEM Platform

Mike Vizard

Many IT organizations have invested in security information and event management (SIEM) platforms only to discover that they’ve essentially created a static database that logs security events. They can query that database when there’s an issue to correlate past and present attacks. But in terms of real actionable intelligence, many legacy SIEM platforms are limited.

Exabeam this week announced it is extending its reach beyond end-user behavior analytics to deliver a SIEM platform that is specifically optimized to detect attacks based on compromised end-user credentials. Exabeam CEO Nir Polak says the Exabeam Security Intelligence Platform differentiates itself because even though most cyberattacks today involve compromised end-user credentials, existing SIEMs don’t make it easy to keep track of these types of attacks.

Polak says Exabeam is applying the machine learning algorithms it developed for its analytics application in combination with a variety of open source technologies to create a SIEM that includes a log manager, threat hunter tools, incident response playbooks, as well as connectors to cloud applications and services. That approach, says Polak, enables Exabeam to deliver a SIEM platform capable of processing massive amounts of data at a substantially lower cost than rival SIEM platforms.

In fact, Polak notes that one of the ironies of SIEM platforms based on proprietary software infrastructure is that most IT organizations get charged based on the amount of data stored in them. That results in a situation where the IT organization winds up trying to limit the amount of data being analyzed to reduce overall costs.

“They wind up not being able to afford to analyze all their data,” says Polak.

ExabeamSIEM

Exabeam is still beta testing elements of its SIEM platform. But given the rising level of sophistication associated with IT security attacks, it’s clear that bolstering IT security defenses is a major priority for IT organizations. A big part of that defense strategy is naturally going to involve marrying advanced analytics to what will be massive amounts of data stored in a SIEM platform.


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.