New! Entity Analytics product announced

March 13, 2018 09:00 ET | Source: Exabeam SAN MATEO, Calif., March 13, 2018 (GLOBE NEWSWIRE) — Exabeam, the next-gen SIEM company, today announced a new product that uses machine learning to spot compromised IoT and other devices. Exabeam Entity Analytics discovers the normal behavior of medical, industrial, networking, home and mobile devices, and uses that Read more about New! Entity Analytics product announced[…]

How Criminals Can Build a “Web Dossier” from Your Browser

How Criminals Can Build a “Web Dossier” from Your Browser All kinds of personal information, from your location, work hours, habits, banks, applications, and even passwords are there for the taking. Web browsers store an incredible amount of sensitive information about you. Website developers have a variety of ways of using modern browsers to customize Read more about How Criminals Can Build a “Web Dossier” from Your Browser[…]

Seminar 18 April 2018

Keystep og CS Business Partner inviterer til frokostseminar på The Thief onsdag 18. april kl. 08.30-12.00. (Klikk her for å melde deg på)  Keystep og CS Business Partner inviterer til seminar hvor vi presenterer løsninger som adresserer utfordringer rundt innsidetrusler og applikasjonssikkerheten i sky. Det er fortsatt en stor utfordring for mange organisasjoner å oppdage Read more about Seminar 18 April 2018[…]

Visionary in the 2017 Gartner Magic Quadrant

Exabeam was named a Visionary in the 2017 Gartner Magic Quadrant for Security Information and Event Management (SIEM) systems. Over the course of this year, we’ve been working tirelessly to craft a Next-Gen SIEM, based on our deep understanding of the market and the problems inherent to the incumbent, legacy SIEM vendors therein. We’ve focused Read more about Visionary in the 2017 Gartner Magic Quadrant[…]

The secrets web browsers hold about users are there for the taking

The secrets web browsers hold about users are there for the taking Read the whole article here A simple malware attack could expose all the data stored in a web browser, including browsing habits, online purchases and bank information, according to a new threat report released on Monday. The major internet companies and service providers Read more about The secrets web browsers hold about users are there for the taking[…]

5 Steps to Unstructured Data Security

The market for file share analysis technology to help organisations understand and manage unstructured data is growing rapidly. It is expected to reach $400 million by the end of 2017. Here are five key steps enterprises can take towards securing unstructured data and file shares: Assess security risks. Identify which data is business-critical and which Read more about 5 Steps to Unstructured Data Security[…]

IT environment and the cyber threat landscape is rapidly evolving

When planning your investments in cyber security, it’s critical to find technology that can deliver real value now — and also as both your IT environment and the cyber threat landscape rapidly evolve. Look for a cyber security solution with the following functionality: Built-in advanced analytics that can spot a variety of sophisticated attacks in Read more about IT environment and the cyber threat landscape is rapidly evolving[…]