E-books and whitepapers

How to streamline user identity mapping

In this whitepaper, you will learn how Log360 can help you map discrete user accounts easily and achieve comprehensive user risk scoring.

Learn more

How to improve risk scoring and threat detection with UEBA

Learn how UEBA works and how it uses techniques such as peer grouping, seasonality, and UIM to improve threat detection.

Learn more

Understanding UEBA:
How machine learning can help secure your business

Learn about the science behind user and entity behavior analysis (UEBA), including how it works under the hood.

Learn more

Security hardening for Log360 UEBA

This document discusses the measures to prevent unauthorized users from accessing the EventLog Analyzer installation directory and modifying its contents.

Learn more

Best practices guide for Log360 UEBA

This guide details best practices which, if followed, ensure smooth operation and optimum performance of Log360 UEBA.

Learn more

Interactive case studies

Learn how UEBA uses risk scores to help stop even the most sophisticated attacks. We show you how UEBA performs in three different real-life scenarios:

  • 1) insider attack
  • 2) account compromise, and
  • 3) data exfiltration.
Start Now
×

Fill this form
to watch the video

  •  
  •  
  •  
    By clicking 'Watch the video', you agree to processing of personal data according to the Privacy Policy.

Blogs and articles

User and entity behavior analytics: The intelligent guardian of your business

Learn More

Zooming in on UEBA: Answering the “what” and the “how”

Learn More

Combating threats with UEBA: Health is wealth

Learn More

Combating threats with UEBA: Money matters

Learn More

Combating threats with UEBA: Cyberattacks in manufacturing

Learn More

Detecting anomalies: The what, the why and the how?

Learn More

The bright and dark sides of AI in cybersecurity

Learn More

How AI can improve how you assess the cyberrisk of your organization

Learn More

Combating threats with UEBA: Cyberattacks in the education sector

Learn More

Why seasonality factors are important to anomaly detection in cybersecurity

Learn More

Video

An introduction to UEBA:

Watch this short video to learn the basics of UEBA - it takes less than 90 seconds.

Play
×

Webcast

In this webcast, we explore how security teams can improve their threat detection and incident response plan with UEBA.

Play Now

Machine Learning in SIEM- Part 1

Join us for this two-day webinar series where we dive deep into the world of machine learning and explore some real-life examples of mitigating cyberthreats like account compromise, insider threats, data breaches, and more.

Play Now

Machine Learning in SIEM- Part 2

Join us for the second part of this two-day webinar series where we dive deep into the world of machine learning and explore some real-life examples of mitigating cyberthreats like account compromise, insider threats, data breaches, and more.

Play Now

Machine learning in SIEM

Data. Patterns. Algorithms. These three words may seem like answers to a cybersecurity crossword puzzle, but in IT, they're each essential components in solving cybersecurity threats.

Play Now

A quiz on UEBA

Think you're an expert on UEBA? Take this quiz to find out.

Take quiz now