ABA is a subset of UEBA. UEBA applies behavioral analytics to detect risk in users, entities, and non-human identities. ABA uses the same approach for AI agents and autonomous activity, giving your security operations team targeted visibility into AI-driven risk as part of its broader UEBA strategy.
BRANCHENFÜHRENDES UEBA EINSETZEN
Upgrade a SIEM With UEBA
New-Scale Analytics can run on top of your SIEM to address insider threats, credential theft, and advanced attacks. Its UEBA engine applies risk-based anomaly detection to user and entity activity, while ABA adds visibility into AI agents and other non-human behavior

NORMALES VERHALTEN VERSTEHEN
Detect and Prioritize Anomalies
New-Scale Analytics builds behavioral baselines and uses business context to refine risk scores. Your team can identify subtle changes in users, entities, and non-human identities. ABA highlights activity from AI agents. When risk meets a set threshold, a case opens for investigation.

Kontextbezogene Erkenntnisse
Use Entity Context
Entities in your environment, such as users, endpoints, servers, and applications, are critical to determining risk. Attack Surface Insights identifies entities in parsed logs and connects attributes and contextual data to build profiles that strengthen behavioral detections.
Fokus auf Ergebnisse
Prioritize Your Most Critical Threats
Integrate data from many sources to increase visibility in your on-premises and cloud environments. Tailor detection and response workflows to address high-risk activity, including suspicious AI agent behavior. ABA extends UEBA to the AI workforce.
MEHR WERT REALISIEREN
Maximize Productivity With AI and Automation
Automated timelines organize related detections chronologically, visualizing the full scope of a threat. Activity is summarized for anomalies and prebuilt playbooks reduce manual routines so your team can respond faster.
EASY SETUP, POWERFUL PERFORMANCE
Replace or Augment Your On-Premises SIEM
Industry-leading TDIR is now more attainable for organizations at any size or maturity. New-Scale Fusion is a full-featured platform for a new deployment or SIEM replacement, while New-Scale Analytics adds advanced behavioral analytics to your current SIEM.
Brauchen Sie Unterstützung? Sprechen Sie direkt mit einem Experten.
KontaktHäufig gestellte Fragen
How does ABA relate to UEBA?
How does Exabeam UEBA help secure AI agents and automated workflows?
UEBA learns normal behavior for users and entities to detect meaningful changes over time. ABA extends this model to AI agents and automated workflows. It adds behavioral visibility, centralized monitoring, and investigation support so analysts can identify suspicious activity and respond with better context.
Can I see and edit the Exabeam UEBA detection rules?
Yes. The Exabeam Community contains Knowledge Base articles on how to see and edit detections. It’s recommended to clone a rule first and then make changes needed for your organization.
How does New-Scale Analytics use generative AI for security?
New-Scale Fusion uses generative AI to accelerate investigations, run natural-language queries, build reports, and recommend incident response steps. It learns from past security events to help identify potential threats sooner and reduce the workload for your security operations team.
We plan to deploy New-Scale Analytics. Are there resources to help bring our security operations team up to speed?
Yes. Exabeam offers an extensive training curriculum, including a track for analysts who are new to UEBA. Training includes free virtual courses as well as instructor-led hands-on sessions.
„Keine andere Technologie bietet Einblicke und die Anpassung von Verhaltensmodellen wie Exabeam. Sie waren Pioniere bei der Analyse des Benutzer- und Entitätsverhaltens (UEBA).“
-
-
Nick Forster
Leiter der Sicherheitsoperationen | Das fehlende Bindeglied
Exabeam in Aktion sehen
Fordern Sie weitere Informationen oder eine Live-Demo der führenden Plattformen für Bedrohungserkennung, Untersuchung und Reaktion (TDIR) an.
Mehr erfahren:
- Welches SIEM passt zu Ihnen: selbst gehostet oder Cloud-native?
- Daten im Cloud-Maßstab erfassen und überwachen
- Wie die Überwachung und Analyse des Verhaltens von KI und automatisierten Agenten riskante nicht-menschliche Aktivitäten aufdeckt
- Benutzeraktivitäten automatisch bewerten und analysieren
- Mit Incident-Timelines das Gesamtbild erkennen
- Wie Playbooks bei der richtigen nächsten Entscheidung unterstützen
- Compliance-Vorgaben unterstützen
Preisgekrönte Marktführer im Bereich Sicherheit





