UEBA - User and Entity Behavior Analytics | ||||||||||||||||||
Hadoop | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Clouds | N/A | N/A | N/A | N/A |
| N/A |
| N/A | N/A | N/A | N/A | N/A | N/A |
|
| N/A |
| N/A |
On-premises software | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||||
Advanced Analytics | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||||
Incident Response | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Machine Learning | N/A | N/A | ||||||||||||||||
Licensing model all based on identity | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
|
| N/A | N/A |
| N/A |
Deep Learning | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |
Visibility into users via reports and dashboards | N/A | |||||||||||||||||
Near real-time alerts | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||||||
Forensic Tools | N/A | N/A | N/A | N/A | ||||||||||||||
Customizable notification | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Role based reports | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Threat Intelligence reports | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Technologies integration |
|
| N/A | N/A |
| N/A | N/A |
|
|
|
|
|
|
|
| N/A |
|
|
Log collection from SaaS apps | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Logs and User context data from Active directory | N/A | N/A | N/A | N/A | N/A | |||||||||||||
Logs from endpoint security solutions | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Network flow/Packet data | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Unstructured contextual data | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Log collection from OS, apps, services | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||||
Meta data from electronic communications | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Statistical models | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||||
Modelling based rules and signatures | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Catching users with anomaly behavior on start by baselining model | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
System adaptation to user's dynamic role changes | N/A | N/A | N/A | N/A | N/A |
UEBA - User and Entity Behavior Analytics |
Hadoop |
Clouds |
On-premises software |
Advanced Analytics |
Incident Response |
Machine Learning |
Licensing model all based on identity |
Deep Learning |
Visibility into users via reports and dashboards |
Near real-time alerts |
Forensic Tools |
Customizable notification |
Role based reports |
Threat Intelligence reports |
Technologies integration |
Log collection from SaaS apps |
Logs and User context data from Active directory |
Logs from endpoint security solutions |
Network flow/Packet data |
Unstructured contextual data |
Log collection from OS, apps, services |
Meta data from electronic communications |
Statistical models |
Modelling based rules and signatures |
Catching users with anomaly behavior on start by baselining model |
System adaptation to user's dynamic role changes |