User & Entity Behavioral Analytics in Incident Detection & Response, 2017

Machine Learning and AI for Rapid Deployment in Incident Response Threat Detection and Mitigation

USD 3,000.00

* Required Fields

USD 3,000.00

PAY BY INVOICE

Be the first to review this product

The report is about User and Entity Behavioral Analytics (UEBA) platforms used in the Incident Detection and Response (IDR) lifecycle and machine learning in various procedures in cybersecurity technologies. UEBA platforms apply algorithms over unstructured data sets to locate anomalies. By using a algorithm-based approach, UEBA is not limited to what can be learned from signatures or from techniques that require packet parsing. Divorced from signatures and packets, UEBA platforms are positioned to detect threats not possible in traditional cyber defense tools. UEBA platforms are deployed (typically) as plug-ins to network ingress/egress points and do not require agents or sensors (although additional visibili

Research Highlights

The report is about User and Entity Behavioral Analytics (UEBA) platforms used in the Incident Detection and Response (IDR) lifecycle and machine learning in various procedures in cybersecurity technologies.

UEBA platforms are attractive on several levels:

  • UEBA platforms apply algorithms over unstructured data sets to look for anomalies.
  • By using a math-based approach, UEBA is not limited to what can be learned from  signatures or from techniques that require packet parsing.
  • Divorced from signatures and packets, UEBA platforms may be able to detect threats not possible in traditional cyber defense tools.
  • UEBA platforms are deployed (typically) as plug-ins to network ingress/egress points and do not require agents or sensors (although additional visibility and endpoint management with the deployments of agents could be gained).
  • If a UEBA platform is trusted, it can reduce lightweight agent management, and more importantly, reduce the number of alerts facing SOC analysts.

Table of Contents

Executive SummaryKey FindingsKey Findings (continued)Executive Summary—Key Questions This Study Will AnswerIntroduction Introduction to the Research Introduction to the Research (continued) Definitions UEBA, Machine Learning, and Artificial IntelligenceDefinitions UEBA, Machine Learning, and Artificial Intelligence (continued)External Challenges—Drivers and Restraints:UEBA MarketDrivers and RestraintsDrivers Explained Drivers Explained (continued)Drivers Explained (continued) Drivers Explained (continued)Drivers Explained (continued)Drivers Explained (continued)Restraints ExplainedRestraints Explained (continued)Restraints Explained (continued)Restraints Explained (continued)Restraints Explained (continued)Restraints Explained (continued)Machine Learning and Artificial Intelligence (AI)Machine Learning and Artificial Intelligence Role in IDR Machine Learning and Artificial Intelligence Role in IDR (continued) Machine Learning and Artificial Intelligence Role in IDR (continued) Machine Learning and Artificial Intelligence Role in IDR (continued) More about Machine Learning and Artificial IntelligenceMore about Machine Learning and Artificial Intelligence (continued)More about Machine Learning and Artificial Intelligence (continued)Vendor Analysis of UEBA Platforms in IDR Attributes of Vendor Analysis of UEBA Platforms in IDR Vendor Analysis of UEBA Platforms in IDR Vendor Analysis of UEBA Platforms in IDR (continued) Vendor Analysis of UEBA Platforms in IDR (continued) Vendor Analysis of UEBA Platforms in IDR (continued) Vendor Analysis of UEBA Platforms in IDR (continued) Vendor Analysis of UEBA Platforms in IDR (continued) Vendor Analysis of UEBA Platforms in IDR (continued) Vendor Analysis of UEBA Platforms in IDR (continued) Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)Vendor Analysis of UEBA Platforms in IDR (continued)UEBA and Machine Learning in Cybersecurity PlatformsUEBA and Machine Learning in Cybersecurity Platforms UEBA and Machine Learning in Cybersecurity Platforms (continued) UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms—LogRhythmUEBA and Machine Learning in Cybersecurity PlatformsUEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued) UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)UEBA and Machine Learning in Cybersecurity Platforms (continued)The Last WordThe Last Word—Predictions The Last Word—Recommendations Legal DisclaimerVendor Participation SlidesVendor Profile—Arctic Wolf NetworksSOC-as-a-ServiceDelivered by Concierge Security EngineersVendor Profile—Aruba, a Hewlett Packard Enterprise CompanyVendor Profile—Aruba, a Hewlett Packard Enterprise Company (continued)Vendor Profile—Aruba, a Hewlett Packard Enterprise Company (continued)Vendor Profile—Awake SecurityVendor Profile—Darktrace The Enterprise Immune SystemVendor Profile—Darktrace Autonomous Response Capability: AntigenaVendor Profile—DemistoVendor Profile—ExabeamVendor Profile—LaceworkVendor Profile—LastlineVendor Profile—Lastline (continued) Vendor Profile—LogRhythm Threat Lifecycle ManagementVendor Profile—LogRhythm (continued)Vendor Profile—LumetaVendor Profile—Lumeta (continued)Vendor Profile—SecBI Vendor Profile—SecBI (continued)Vendor Profile—ThetaRayAppendixAppendix A—What are the Criteria in Multifactor Incident Detection and Response (IDR)Appendix A—Cybersecurity Technology Classes Included in Multifactor IDR Appendix A—Cybersecurity Technology Classes Not Included in Multifactor IDRAppendix B—Explaining Individual Attributes of the IDR Lifecycle Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)Appendix B—Explaining Individual Attributes of the IDR Lifecycle (continued)MethodologyThe Frost & Sullivan StoryThe Journey to Visionary InnovationThe Frost & Sullivan StoryValue Proposition—Future of Your Company & CareerGlobal PerspectiveIndustry Convergence360º Research PerspectiveImplementation ExcellenceOur Blue Ocean Strategy

Infographic





Why Frost & Sullivan

Working with the CEO’s growth team to create a vision based on a transformation growth strategy

Creating content-based digital marketing strategies that leverage our research perspective to differentiate and “tell your story”

Tracking over 1000 emerging technologies and analyzing the impact by industry and application to reveal the companies to watch in each sector

The Frost & Sullivan team is based in our 45 global offices and have developed a powerful global understandings of how industries operate on a global level.