Perimeter

12/27/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LogRhythm Introduces Standalone User and Entity Behavior Analytics Offering

LogRhythm UEBA provides increased security coverage, faster threat detection with minimal investment.

Boulder, CO — LogRhythm, The Security Intelligence Company, today announced it has entered the User and Entity Behavior Analytics (UEBA) market with the introduction of LogRhythm UEBA, an independent analytics product that enhances the security of environments for customers that wish to augment a non-LogRhythm SIEM or introduce a standalone UEBA product if there is no formal SIEM in place. LogRhythm’s UEBA offering applies both machine learning-based behavioral analytics and real-time scenario-based threat detection to provide complete coverage in detecting user-based threats. These capabilities are combined within LogRhythm’s integrated workflow for detection and response, providing a highly efficient solution in recognizing and mitigating user-based threats.  

Based on advanced analytics of user behavior, LogRhythm UEBA provides increased security coverage with minimal investment for security professionals in enterprise and SME organizations who need protection from insider threats, compromised accounts, admin abuse and other user-based threats.

“Organizations are under siege by an ecosystem of threat actors, from motivated insiders to well-armed nation-states,” said Chris Brazdziunas, VP of products at LogRhythm. “Meanwhile, many security teams face significant obstacles securing qualified personnel to combat these threats. These challenges are sometimes heightened by organizational pressure to relax controls to unlock business productivity. UEBA arms organizations to detect and respond to user-based threats. Analysts are provided evidence-based starting points for investigation, rich visualizations for effective analysis, and direct access to data for rapid response.”

LogRhythm UEBA is distinct in the marketplace because, unlike other UEBA point solutions that use limited analytical methods, LogRhythm UEBA detects known and unknown threats via in-depth analytics, applying machine learning and scenario analytics to quickly surface and prioritize critical events. Further, LogRhythm UEBA employs cloud-based analytics that can evolve over time, taking into account feedback from customers to hone accuracy. LogRhythm UEBA collects threat training data from the whole of an organization’s activity and across its extended customer footprint. Collecting feedback from a global set of SOC analysts and incident responders makes the product smarter and faster. Additionally, LogRhythm provides customers with a library of field-proven user-based threat scenarios that operate in coordination with ML-observed activities to corroborate security relevancy for greater precision in identifying threats.

LogRhythm UEBA breathes life into existing and legacy SIEM deployments with an easy to deploy, highly effective UEBA solution that delivers fast ROI. Specific use cases for LogRhythm UEBA include:

  • Insider threat: A new study finds that most security professionals (88 percent) view insider threats as a dangerous and growing concern for their organization. LogRhythm UEBA provides machine-assisted monitoring of contractors and high-impact teams such as IT, finance and sales to prevent data theft, fraud, sabotage, policy violations and other dangerous activity. It uses behavioral profiling to spot deviations from normal behavior and scenario analytics to recognize established patterns.
  • Account takeover: Attackers who have compromised a network will attempt to take control of an account and move laterally until they attain their target. LogRhythm UEBA unmasks these imposters by examining the behavior of individual users and associated peer groups. External threats are quickly identified, preventing further compromise and damage.
  • Privilege abuse and misuse: With extensive access to systems and data, privileged users present heightened risk to the organization. LogRhythm UEBA helps ensure access rights are used appropriately. Its algorithms automatically monitor the creation and deletion of privileged accounts, the elevation of permissions, and the suspicious use of privileged accounts.

“A significant number of large enterprises are replacing their legacy SIEMs with LogRhythm’s next-gen platform, but not every organization is able to do that today,” said Matt Winter, vice president of marketing and business development at LogRhythm. “With LogRhythm UEBA, customers that aren’t yet ready for full replacement no longer have to settle for an unproven and functionally limited ‘SIEM helper’ or similar point product to get more value out of their existing SIEMs. Instead, LogRhythm now offers them a full-featured solution that’s architected to scale, can seamlessly grow with them as their needs evolve and has been repeatedly proven in large global deployments.”

LogRhythm UEBA is a standalone version of the LogRhythm product set for non-LogRhythm Enterprise or XM customer environments. The product is commercially available, and pricing is based on a per-user model, with hardware included through a subscription.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.