White Papers
Considering Microsoft Sentinel for SIEM?
May 5, 2024
Read More
r-tec entscheidet sich für die Exabeam Security Operations Platform zur Unterstützung seiner SOC-, MDR- und Vorfallsreaktions-Services
Read More
AI-driven Exabeam Fusion: Bring an end to your SIEM nightmares. It’s time for faster, easier, and more accurate threat detection, investigation, and response (TDIR). Exabeam Fusion applies AI and automation to security operations workflows for a holistic approach to combating cyberthreats, delivering the most effective TDIR. AI-driven detections pinpoint high-risk threats by learning normal behavior... Read more »
Read More
As cyberattacks become increasingly frequent, sophisticated, and hard to detect, security operationsteams are struggling with the limitations of legacy security information and event management (SIEM) and traditional perimeter security. Traditional platforms haven’t kept pace with the growth of data, the sophistication of attacks, or the shift to the cloud. Nor can it handle the increasing... Read more »
Read More
r-tec entscheidet sich für die Exabeam Security Operations Platform zur Unterstützung seiner SOC-, MDR- und Vorfallsreaktions-Services
Read More
r-tec entscheidet sich für die Exabeam Security Operations Platform zur Unterstützung seiner SOC-, MDR- und Vorfallsreaktions-Services
Read More
AI-driven Exabeam Fusion: Bring an end to your SIEM nightmares. It’s time for faster, easier, and more accurate threat detection, investigation, and response (TDIR). Exabeam Fusion applies AI and automation to security operations workflows for a holistic approach to combating cyberthreats, delivering the most effective TDIR. AI-driven detections pinpoint high-risk threats by learning normal behavior... Read more »
Read More
As cyberattacks become increasingly frequent, sophisticated, and hard to detect, security operationsteams are struggling with the limitations of legacy security information and event management (SIEM) and traditional perimeter security. Traditional platforms haven’t kept pace with the growth of data, the sophistication of attacks, or the shift to the cloud. Nor can it handle the increasing... Read more »
Read More
If you’re looking for documentation or training materials follow the links below.
See our documentation
Considering Microsoft Sentinel for SIEM?
May 5, 2024
Architecting Threat Detection, Investigation, and Response (TDIR)
April 1, 2024
Unlocking the Power of AI in Security Operations: A Primer
December 30, 2023
Applying Data Science to User and Entity Behavior Analytics (UEBA)
October 6, 2023
Discusses the effective use of data science within a UEBA system.
Exabeam Incident Response for the Top Three Security Scenarios
October 5, 2023
A CISO’s Guide to the AI Opportunity in Security Operations
September 25, 2023
10 Reasons SIEM Should Remain Dedicated to Security
June 27, 2023
A CISO’s Guide to Rethinking Insider Risk
June 13, 2023
A CISO’s Guide to Defender Alignment
April 25, 2023
A CISO’s Guide to Adversary Alignment
November 18, 2022
Preventing Insider Threats with UEBA
October 12, 2022
Detecting Compromised User Credentials
October 11, 2022
Meeting ISO 27002 Standards
October 9, 2022
How Exabeam Solves 7 Use Cases for Compromised Insiders
October 9, 2022
Keys to the Kingdom: Guidance for Effective Zero Trust Architecture
August 22, 2022
Using a Layered Approach to Improve Ransomware Detection and Response
June 19, 2022
Why Are Companies STILL Getting Breached?
February 9, 2022
Top 10 Reasons to Augment Your Legacy SIEM with XDR
February 3, 2022
A CISO’s Guide to Communicating Risk
January 31, 2022
How to Fast Track Logging Compliance for OMB Memorandum M-21-31 with Exabeam
December 29, 2021
The Responsibility of Risk
November 15, 2021
Top 3 Things to Consider When Building Your Modern Threat Detection and Response Program
August 2, 2021
A SOC Manager’s Guide to New Efficiencies Automating the Full Threat Detection and Response Workflow
July 29, 2021
SIEM and XDR: A Comparison Guide
July 21, 2021
Want to Turbocharge your threat detection and response?
July 7, 2021
5 Questions on the Future of SIEM and Cloud Answered
July 7, 2021
Featuring Insights from Joseph Blankenship, VP, Research Director, Forrester
Thinking about shifting your SIEM to the cloud? Read this first.
July 7, 2021
10 Questions to Ask About a Cloud SIEM
10 Reasons to Augment Your SIEM with Behavioral Analytics
January 26, 2021
Why behavioral analytics should be part of your organization's security health.
Unlocking Effective Threat Detection and Investigation with Analytics and TTPs
April 22, 2020
How UEBA and MITRE ATT&CK Techniques Significantly Improves SOC Productivity
Protecting Controlled Unclassified Information with Exabeam: Meeting NIST 800-171 Rev 2 Guidelines
April 16, 2020
Securing Operational Technology for Rapid Threat Detection and Response
April 15, 2020
A new generation of Industrial IoT devices leverage the internet for smarter Operational Technology (OT).
Using the MITRE ATT&CK® Knowledge Base to Improve Threat Hunting and Incident Response
January 10, 2020
The Essential Guide to SIEM
January 8, 2020
Securing the Cloud with Modern SIEM Monitoring and Analytics
December 4, 2019
Many enterprises are embracing the cloud to supersede on-premises data center resources.
A Technology Solution for Protecting Federal Agencies from Insider Threats
December 3, 2019
NITTF Requirements Mapping Guide
IBM QRadar SIEM Migration Guide
July 24, 2019
8 Steps to Migrate your SIEM
March 26, 2019
Exabeam Smart Timelines™
March 20, 2019
Ten Must-Have Features of a Modern SIEM
January 8, 2019
Rules Versus Models in Your SIEM
October 25, 2018
Meeting the Latest NIST SP 800-53 Revision 5 Guidelines
October 25, 2018
Implementing PCI DSS 3.2 Controls with Exabeam
May 3, 2018
Learn how Exabeam can be used to help companies meet various security controls detailed within PCI-DSS.
Streamlining IR Operations with Orchestration and Automation
October 26, 2017
Read this white paper to see how effective responses prevent minor security incidents from becoming major data breaches.
Protect Critical Infrastructure with Security Intelligence
June 15, 2017
Learn how user and entity behavior analytics (UEBA) can help critical infrastructure identify and respond to anomalous and/or risky behavior.
Adhering to GDPR Security Controls with Exabeam
March 15, 2017
Learn how Exabeam helps organizations better monitor access of personal data and ensure alignment with the European General Data Protection Regulation (GDPR).
Monitoring Sensitive File Access with UEBA
November 2, 2016
Learn how to detect and evaluate file access risk across the entire file handling lifecycle with UEBA.
The Incident Response Makeover Guide
October 10, 2016
Understand how automation can slash response timelines and increase SOC productivity. Get the ROI and operational benefits of a UEBA solution.
Understanding the Exabeam Session Data Framework
June 3, 2016
Learn how to link risky activity across identities and accounts with a new data layer for your security analytics.
Supporting MAS-TRM Guidelines with Exabeam
June 2, 2016
Learn how to apply behavioral monitoring to MAS-TRM Guidelines.
8 Key Functions to Prevent Data Loss with User and Entity Behavior Analytics
December 9, 2015
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |