sb-nz logo
Story image

Why User Behaviour Analytics are the secret weapon in your security strategy

27 Mar 2017

Imagine this: Someone who logs in to their bank account may check their balances and funds. Compare this to what a cyber hacker would do: log in, edit account records and wire money.

If there are multiple VPN sessions from a foreign country at 2am, but nobody is travelling and employees only log in from their local office at 8am – alarm bells should be ringing.

These are vastly different behaviour patterns – and LogRhythm has provided a way to set up alerts when this type of thing happens. It’s called User Behaviour Analytics (UBA). 

A new peer-written white paper, sponsored by LogRhythm, takes a look at how user behaviour analytics can really make the difference in your security protocols.

Titled CISOs Investigate: User Behavior Analytics – Peer-authored research, this firsthand look into UBA shows you:

  • What UBA is, how it works, and the key things you should consider
  • How to sell UBA to the C-Suite, reduce losses from breaches, staff implications and compliance
  • What UBA looks like in the market, including UBA vendors such as LogRhythm
  • What happens when UBA doesn’t work
  • Exclusive contributions from top CEOs, including IBM’s global CISO, David Cass
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Microsoft Exchange breach a wake-up call to ditch the server
"There are owners who still have in-house exchange servers because they are suspicious of the cloud or have concerns about their data sovereignty or don't want to contemplate the capital expenditure. But the warning is clear. Get rid of them."More
Story image
Almost a third of malware threats previously unknown - HP report
A new report has found 29% of malware captured was previously unknown due to the widespread use of packers and obfuscation techniques by attackers seeking to evade detection. More
Story image
Claroty discovers vulnerabilities in Ovarro TBox RTUs
The vulnerabilities could enable attackers to break into the systems and run code, crash systems, and meddle with configuration files, amongst other malicious actions.More