Story image

ManageEngine introduces user and entity behaviour analytics in its SIEM solution

07 Mar 2019

ManageEngine, the real-time IT management company, announced that it has introduced user and entity behaviour analytics (UEBA) into its SIEM solution, Log360. 

With score-based risk assessment, threat corroboration, anomaly detection powered by machine learning, and other new capabilities, the Log360 UEBA add-on helps security professionals identify, qualify, and investigate internal threats and anomalies by extracting more information from logs for better context.

According to Verizon’s 2018 Data Breach Investigations Report, over a quarter of the 53,308 cyber attacks in 2017 involved insiders. 

Insider threats can be particularly difficult to detect with conventional threat detection systems, as it’s hard to spot the signs of someone using their legitimate access to data for nefarious purposes, and both vulnerabilities and exploits are unknown. 

UEBA delivers more robust and accurate threat detection by using machine learning to set a baseline of a user’s normal activity and then flag any deviations from that baseline.   ManageEngine director of program management Manikandan Thangaraj says, "In today’s IT security landscape, rigid alert rules and conventional threat detection systems no longer make the cut.”

“The need of the hour is a system that can learn and adapt to continuous change. Log360 UEBA does just that and improves the accuracy of threat detection, helping SOC personnel qualify and investigate threats that actually merit investigation."   Highlights of Log360 UEBA

Log360 UEBA monitors user activity captured in logs to identify behavioural changes. User activities that would otherwise go unnoticed are flagged, reducing the time it takes to detect and respond to threats. The highlights of Log360 UEBA include:

  • Anomaly detection: Spots deviant user and entity behaviour such as logons at unusual hours, excessive login failures, and file deletions from a host that is not generally used by a particular user.  
  • Score-based risk assessment: Generates a risk score for each user and entity based on how dangerous their behaviour is, helping security admins determine which threats merit investigation.  
  • Threat corroboration: Identifies indicators of compromise and indicators of an attack, exposing major threats including insider threats, account compromise, and data exfiltration.
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.