sb-nz logo
Story image

Why User Behaviour Analytics are the secret weapon in your security strategy

27 Mar 2017

Imagine this: Someone who logs in to their bank account may check their balances and funds. Compare this to what a cyber hacker would do: log in, edit account records and wire money.

If there are multiple VPN sessions from a foreign country at 2am, but nobody is travelling and employees only log in from their local office at 8am – alarm bells should be ringing.

These are vastly different behaviour patterns – and LogRhythm has provided a way to set up alerts when this type of thing happens. It’s called User Behaviour Analytics (UBA). 

A new peer-written white paper, sponsored by LogRhythm, takes a look at how user behaviour analytics can really make the difference in your security protocols.

Titled CISOs Investigate: User Behavior Analytics – Peer-authored research, this firsthand look into UBA shows you:

  • What UBA is, how it works, and the key things you should consider
  • How to sell UBA to the C-Suite, reduce losses from breaches, staff implications and compliance
  • What UBA looks like in the market, including UBA vendors such as LogRhythm
  • What happens when UBA doesn’t work
  • Exclusive contributions from top CEOs, including IBM’s global CISO, David Cass
Story image
Gartner reveals the top strategic tech trends for 2021
“CIOs are striving to adapt to changing conditions to compose the future business - this requires the organisational plasticity to form and reform dynamically. Gartner’s top strategic technology trends for 2021 enable that plasticity.”More
Story image
Zoom to begin rolling out end-to-end encryption
Available starting from next week, it represents the first phase out of four of the company’s greater E2EE offering, which was announced in May following backlash that the company was lax on its security and privacy.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Link image
The importance of data resilience in the current cybersecurity climate
Protecting an organisation's data is one of the most crucial functions of any CISO. Strategies should be in place where data is stored securely and cost-effectively.More
Story image
Palo Alto Networks launches new SD-WAN solutions and enhancements
Palo Alto Networks has introduced two new SD-WAN appliances and enhancements to its next-generation SD-WAN solution, expanding the company’s CloudGenix SD-WAN solutions reach.More