SHARE
Facebook X Pinterest WhatsApp

Exabeam Applies Big Data Analytics to Security

Six Big Business Intelligence Mistakes Most security attacks can be readily identified after the fact, once it becomes clear that some set of credentials is being used to access files in a way that they normally are not. The ideal goal would be to identify those patterns of abnormal behavior before a security breach can […]

Written By
MV
Mike Vizard
Oct 6, 2014
Slide Show

Six Big Business Intelligence Mistakes

Most security attacks can be readily identified after the fact, once it becomes clear that some set of credentials is being used to access files in a way that they normally are not. The ideal goal would be to identify those patterns of abnormal behavior before a security breach can be seriously exploited.

With that goal in mind, a startup vendor called Exabeam announced today that it has developed a namesake behavior intelligence platform that can be layered on top of existing security information event management (SIEM) systems or other sources of Big Data.

Announced at the Splunk User 2014 Conference, Mark Seward, vice president of marketing of Exabeam, says the vast majority of security breaches involve outsiders that have compromised end-user credentials to begin accessing files that those end users would normally not need to use in the performance of their duties.

Data Security

Leveraging Big Data analytics and machine learning algorithms, Seward says Exabeam is specifically designed to track user behavior, and detect and qualify threats not normally recognized by a SIEM. That approach, says Seward, enables Exabeam to establish what the normal end user behavior patterns are for any given enterprise. When changes to those patterns occur, Exabeam then alerts the IT organization in a way that provides context.

Seward says it’s not that IT organizations don’t have access to enough security information these days. It’s just that so many of the alerts generated by security products are not correlated in any way that gives the IT organization access to actionable intelligence. The end result is a general sense of fatigue when it comes to IT security that results in the IT staff ignoring many of the alerts because there is no accompanying insight.

No matter whether it’s Target or Home Depot, Seward says that once a breach is made, the key task at hand is finding a way to contain it. Rather than discovering those breaches months, sometimes even years, after they were made, Big Data analytics can now finally be applied in a way that identifies anomalous end-user behavior much sooner.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.