Exabeam's Threat Hunter Offers Security to Office Networks from APT Attacks

By CIOReview | Wednesday, March 2, 2016
701
1182
232

SAN MATEO, CA: User Behavior Analytics is a solution towards detection of insider threats, targeted attacks and financial fraud. Recently, security start up Exabeam launched its Threat Hunter product to provide security analysts the ability to query user data- collected by the firm’s user behavior analytics (UBA) platform. User activity can be tracked across multiple dimensions with the aid of  Threat  Hunter to find sessions that contain risky behaviors.

Enterprise breaches pertaining to credit card numbers are not the only matter of concern.  Enterprises need to stay off the hook from APT’s (Advanced Persistent threats) that consist of a new breed of hackers who tend to infiltrate into office networks and function by being part of the professional network. Their goal, typically, is to steal valuable intellectual property, such as confidential project descriptions, contracts, and patent information through  Phishing emails and other malicious tricks.

Big Data science form Exabeam’s UBA platform has been incorporated to alarm security teams to track down suspicious user behavior. Threat Hunter provides increased security through findings of advanced persistent threats before data loss is caused. Possibilities of data breach are reduced by being under the radar and finding attackers that are hiding in the network. Threat Hunter shows faster response to cyber attacks where effective removal of all malware is carried out post detection of attacks by finding all traces of activity.

The Threat unter software from Exabeam has been a life saver for many office networks. In the proactive security intelligence framework, the threat hunter is used by analysts to clean up malwares from a particular office network that is attacked by hackers. A parameter pertaining to event change such as a change in account password is added to the algorithm of the software that helps  track down suspicious activity in office networks. This in turn helps to zero in at a hacker who impersonates as a valid internal user in the network who usually are the main perpetrators behind unusual account lockouts.