Análisis de comportamiento de entidad y usuario (UEBA)

Detect and Respond to Anomalous User Behavior with Security Analytics and Machine Learning

To avoid a data breach, your organization must detect and respond quickly to anomalous activity. User and entity behavior analytics (UEBA) can help you monitor for known threats and behavioral changes in user data, providing critical visibility to uncover user-based threats that might otherwise go undetected.

User-based threats are on the rise:

  • 69% of organizations report incidents of attempted data theft — by internal threats.
  • 81% of breaches involve stolen or weak credentials.
  • 91% of firms report inadequate insider threat detection programs.
    Verizon Data Breach Investigations Report, 2017

Vea cómo UEBA detecta y detiene una amenaza interna

LogRhythm User and Entity Behavior Analytics (UEBA) performs profiling and anomaly detection using a wide range of analytics approaches against diverse environmental data.

Enhance Your Security Maturity Through UEBA

Don’t be unprepared. Give your team the means to achieve greater visibility into users and their activity.

With UEBA, your team can:

  • Collect and prepare data from diverse sources to provide clean sets for effective analytics.
  • Obtain a true view of the identity of users and hosts — not just their disparate identifiers.
  • Detect known and unknown threats by applying full-spectrum analytics.
  • Accelerate threat qualification and investigation with powerful data visualizations and direct access to underlying data.
  • Streamline response using integrated playbooks, guided workflows, and approval-driven task automation.
  • Use artificial intelligence (AI) and machine learning (ML) technologies to improve time to detect and respond to threats.

Arm Your Organization with UEBA

Sixty-nine percent of organizations reported a recent insider data exfiltration attempt. Learn how to protect your environment with user and entity behavior analytics.

Quickly Spot Dangerous User-Based Activity

Don’t let insider threats fly under your radar. UEBA plays a critical role in providing visibility into user behavior and enhancing detection capabilities. UEBA empowers your team to expose insider threats, compromised accounts, privilege misuse, and more — all in real time.

Identify Malicious Insider Threats

Malicious insiders cause damaging, headline-making cyberbreaches, and acts of sabotage. Monitor for data exfiltration, policy violations, and other dangerous activity.

Uncover Compromised Accounts

Attackers use compromised account credentials in an overwhelming number of breaches. Distinguish between legitimate account activity and compromised account activity through deep behavior profiling and anomaly detection. Discover the imposter before a damaging breach occurs.

Expose Privilege Abuse and Misuse

Your privileged users have the keys to the kingdom, presenting a greater risk to your organization. Track how these privileges are being used by monitoring for unauthorized new account creation, privilege escalation, abnormal access, and other risky activity.

Spot Brute-Force Attacks

Attackers will programmatically target your cloud-based infrastructure and external authentication systems. Advanced monitoring and alerts keep you one step ahead of attackers. Know when you’re a target and quickly implement countermeasures to block access.

Identify New Privileged Accounts

It can be challenging to ensure appropriate access rights and keep track of super users. LogRhythm automatically monitors and reports on newly created privileged accounts and unauthorized elevation of permissions.

Track Unauthorized Data Access & Exfiltration

When a compromised user account or a rogue insider finds sensitive data, you need to know. Our full-spectrum analytics and file integrity monitoring (FIM) can help you detect when a user inappropriately accesses protected data — in real time.

Establish Identity on Your Network

Understanding and establishing identity on your network is mission critical. In any given environment, users, hosts, and applications coexist. By themselves, disparate actions from different users and entities mean nothing. Yet when those actions are associated and corroborated together, they can tell a comprehensive story, providing meaningful security and operational context.

LogRhythm TrueIdentity™ maps disparate user accounts and related identifiers to build a comprehensive baseline of a user’s actual identity. By baselining a user’s profile and comparing that activity to the individual’s peers, you can rapidly surface anomalous behavior for qualification and investigation.

Harness the Power of Full-Spectrum Analytics to Increase Visibility into User Behavior

LogRhythm’s UEBA solutions perform profiling and anomaly detection using a wide range of analytics approaches against diverse environmental data. LogRhythm delivers scenario- and behavior-based analytics, then corroborates insights, providing visibility across the spectrum of cyberattacks.

Surface and Prioritize Known Threats with Scenario-Based Analytics

Scenario-based analytics help your organization surface and prioritize known attacks — in real time. Apply established tactics, techniques, and procedures (TTPs) and signature-based indicators of compromise (IOC) to recognize different known scenarios along the Cyberattack Lifecycle (also known as the Cyber Kill Chain).

Deep Behavioral Profiling and Anomaly Detection Through Machine Learning

Behavior-based analytics help identify unknown attacks or zero-day exploits. Deep behavioral profiling enabled by supervised and unsupervised machine learning (ML) provides anomaly detection by recognizing subtle shifts in user activity. Focus on the problems that require intuition and creativity, and let ML help your security operations scale defeat evolving threats.

Actively Respond to and Neutralize Threats When It Matters Most

Anomaly and threat detection are only part of the story. Once you detect a concerning incident, you need a solution that allows you to qualify, investigate, and neutralize that threat. LogRhythm’s UEBA solutions provide embedded security orchestration, automation, and response (SOAR) capabilities that support the entire threat investigation, through remediation and recovery.

Embedded SOAR feature set:

  • Case Management: Ensure incidents don’t slip through the cracks. Case management capabilities centralize investigations enabling your team to securely collaborate. Easily create or escalate a case, assign a priority to it, add collaborators, and track remediation efforts.

  • Guided Workflows and Task Automation: LogRhythm SmartResponse automates a wide range of analyst tasks, increasing your productivity and accelerating incident response. Choose from fully automated playbook actions or semi-automated, approval-based response actions that allow you to review before countermeasures are executed.

A Solution for Every Environment