0% found this document useful (0 votes)
72 views2 pages

Securonix UEBA

Securonix UEBA 6.0 is a machine learning and behavior analytics-based solution designed to detect advanced insider and cyber threats, fraud, and non-compliance. It features a modern user interface, enhanced analytical capabilities, and over 350 out-of-the-box connectors for quick deployment. The solution also includes predictive learning, incident management, and data privacy features to improve threat detection and operational efficiency.

Uploaded by

Diego Parra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views2 pages

Securonix UEBA

Securonix UEBA 6.0 is a machine learning and behavior analytics-based solution designed to detect advanced insider and cyber threats, fraud, and non-compliance. It features a modern user interface, enhanced analytical capabilities, and over 350 out-of-the-box connectors for quick deployment. The solution also includes predictive learning, incident management, and data privacy features to improve threat detection and operational efficiency.

Uploaded by

Diego Parra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

DATASHEET

Securonix UEBA 6.0

The #1 Analyst Rated UEBA Solution


Modern threats are complex, often executed with compromised credentials or with the help of insiders with legitimate credentials, and
carried out over long periods of time. Predicting, detecting and containing these threats is near-impossible using traditional signature- based
solutions that were not developed to protect organizations from modern day cyber or insider attacks. Securonix UEBA 6.0 is purpose-
built to rapidly detect any threat, anywhere, leveraging machine learning and behavior analytics that analyzes and cross-correlates all
interactions between users, systems, applications, IP addresses and data to detect advanced insider threats, cyber threats, fraud, cloud
data compromise and non-compliance.

Light, nimble and quick to deploy, Securonix UEBA version 6.0 is faster and smarter. It comes with a new, ultra-modern user experience
based on design concepts that provide intuitive visualizations of enterprise risk and one-click actions for threat management and incident
response. New enhanced analytical and machine learning capabilities have been added to detect ransomware and advanced cyber-
attacks. Securonix UEBA 6.0 has 350 out-of-the-box connectors and over one thousand one-click deploy threat models that immediately
deliver tangible value.

WHAT’S NEW IN SECURONIX UEBA 6.0?

Advanced Behavior Analytics


dashboards and reports. UEBA 6.0 comes with new line-of-
Events that can look harmless in isolation often map into high-risk business use cases, dashboards and reporting for fraud, trade
threats when analyzed in context over time. UEBA 6.0 correlates surveillance and patient data analytics.
and analyzes events from multiple sources such as user, device,
asset, application, and network segment to predict, detect and Threat Model Exchange
contain slow-and-low attacks that are invisible to legacy solutions.
UEBA 6.0 comes packaged with The Securonix Threat Model
200+ new threat models have been added to this release in
Exchange®, a library of threat models sourced by the Securonix
addition to tuning of existing models for further risk refinement.
cyber research team in collaboration with our cross industry
client base, partners and national security leaders. The exchange
Quick Time-to-Value
enables customers to access, download and deploy the latest
Getting UEBA 6.0 up and running is even faster and more Securonix threat models with a single click.
automated than ever before. With built-in data connectors and
pre-packaged use cases, implementation is swift and results are Enhanced User Experience
immediate.
Securonix 6.0 has a new user interface with elegant visualizations
of enterprise risk and intuitive, easy-click actions to mitigate
Adaptive Learning Framework
threats and risk. The solution also provides data insights and
UEBA 6.0 uses adaptive learning and supervised classification fully customizable dashboards. The entity risk view have been
algorithms to provide real-time feedback to the system based on updated to provide a full 360-degree perspective on an entity’s
the findings and remediation patterns. This improves threat fidelity, risk profile.
threat detection and operational efficiency by cutting out the need
for security analysts to manually tune the system. Securonix UEBA Cloud
Securonix UEBA Cloud delivers the solution as a turn-key cloud-
More Packaged Applications For Fraud, Trade Surveillance
based service. Customers get all the benefits of UEBA 6.0 without
and Patient Data Analytics
the hassle of managing and maintaining the platform. The solution
Securonix uses packaged solutions to provide out-of-the-box use is highly scalable and secure and is ideal for organizations that
cases for specific threats and industries, plus use case models, are looking for rapid deployment and quick time to value.

LEARN MORE LET’S TALK


[Link] +1 (310) 641-1000 14665 Midway Rd. Suite #100, Addison, TX 75001 | ©2017 Securonix
SECURONIX UEBA 6.0 DATASHEET

Insider Threat Cyber Threat Fraud Cloud Security


• Data Exfiltration • Pass-The-Hash • Payment Fraud • Anomalous Data Sharing
• Privileged Account Misuse • Lateral Movement • Retail Fraud • Privilege Misuse
• Patient Data Snooping • Ransomware • Customer Fraud • Data Exfiltration
• IP Theft • Beaconing, DGA • Internal Fraud • Unauthorized Login & Access
• Access Anomolies • Phishing • Trade Surveillance • External Attacks

• Privileged Account • Cyber Threat Analytics • Applications Security • Patient Data Analytics
Analytics Analytics
• Fraud Analytics
• Data Security Analytics • Cloud Security Analytics • Access Analytics
• Trade Surveillance

KEY PRODUCT FEATURES indicates an intention to quit would be flagged for the elevated risk
of data theft associated with employees who plan to leave their jobs.
Real-time Behavior Analytics Predictive analytics can also inform decision automation such as
access blocks or increased authentication requirements.
Patented unsupervised and supervised machine learning and
statistical algorithms profile normal activity and detect anomalies.
Investigation and Response
Some of the key signature-less techniques include mix-max
clustering, peer analysis, event rarity analysis, predictive learning, Full incident management capabilities investigate and respond
fuzzy correlation, robotic pattern detection, DGA detection and to threats including link-analysis with drag-and-drop graphical
sequential learning. representation for ad-hoc investigations, reviews and analysis.
Plus, case management capabilities with out-of-the-box, dynamic
Connector Library workflows based on industry best practices are built into the platform.
Case management workflows are fully customizable based on client
350+ out-of-the-box connectors integrate with a variety of structured
need.
and unstructured data sources including enterprise applications,
identity systems, and non-technical data sources such as badge
Data Privacy
readers and social media that are not supported by typical log
management solutions. A critical capability for UEBA solutions that leverage contextual user
behavior patterns, UEBA 6.0 provides complete data masking and
Packaged Applications encryption capabilities to protect user identities while still enabling
robust analytics on their activities. With granular, role-based access
Out-of-the-box content in the form of packaged applications
control, access and entitlements to data can be limited by business
specifically designed for insider threat, cyber threat, fraud, and
needs. Detailed logging capabilities are available to ensure a full audit
cloud security analytics is delivered in the form of threat models and
trail of all activities within the solution.
built-in connectors that enable rapid deployment and quick time to
value. Key packaged applications include: data security analytics,
Cyber Threat Hunting
privileged account analytics, cyber threat analytics, application
security analytics, cloud security analytics, fraud analytics and patient Securonix Spotter threat hunting product enables blazing-fast
data analytics. hunting using natural language search. Searching for threat actors
and IOCs is simplified with visual pivoting on any entity to develop
Predictive Learning valuable threat context. Visualized data can be saved as dashboards
or exported via standard data formats.
Algorithms analyze patterns of behaviors to predict future risks
associated with a user or entity. For example, a user whose behaviors

LEARN MORE LET’S TALK


[Link] +1 (310) 641-1000 14665 Midway Rd. Suite #100, Addison, TX 75001 | ©2017 Securonix

You might also like