5 Steps to Unstructured Data Security

The market for file share analysis technology to help organisations understand and manage unstructured data is growing rapidly. It is expected to reach $400 million by the end of 2017. Here are five key steps enterprises can take towards securing unstructured data and file shares: Assess security risks. Identify which data is business-critical and which Read more about 5 Steps to Unstructured Data Security[…]

IT environment and the cyber threat landscape is rapidly evolving

When planning your investments in cyber security, it’s critical to find technology that can deliver real value now — and also as both your IT environment and the cyber threat landscape rapidly evolve. Look for a cyber security solution with the following functionality: Built-in advanced analytics that can spot a variety of sophisticated attacks in Read more about IT environment and the cyber threat landscape is rapidly evolving[…]

Exabeam Launches New Security Intelligence Platform To Challenge Legacy SIEM Vendors

Exabeam announced on Tuesday the launch of its new Security Intelligence Platform, a solution it said will extend its user behavior analytics (UBA) offering to disrupt the legacy SIEM market.The Exabeam Security Intelligence Platform includes five products: Exabeam Log Manager, Exabeam Advanced Analytics, Exabeam Incident Responder, Exabeam Threat Hunter and Exabeam Cloud Connectors. Combined, CEO Read more about Exabeam Launches New Security Intelligence Platform To Challenge Legacy SIEM Vendors[…]

The World Has Changed; Shouldn’t Your Security Change, Too? ·

From day one, Exabeam had a vision for something better than today’s SIEM solutions. We felt these products were fundamentally broken: SIEM log management was built on old, proprietary technology and was (over)priced by the byte; SIEM correlation rules were a mess and ineffective, and they caused more work for analysts than they eliminated. SIEM Read more about The World Has Changed; Shouldn’t Your Security Change, Too? ·[…]