Automated machine accounts are the ultimate wolf in sheep’s clothing for a hacker,” said Nir Polak, CEO of Exabeam. “These accounts have access to sensitive information, are almost never monitored, and are growing at an exponential rate. To handle this threat, we’ve created an entirely new architecture that adds scale-out flexibility to our patented stateful tracking.”
Just like humans, machines with credentials can be a source of threats but they also generate a lot of traffic, making it difficult to analyze their behavior. Machines can fall prey to threats such as DNS tunneling, attaching to Tor networks, or rogue authentication requests to directory services. Using these methods, a hacker could compromise a machine to allow them to bypass proxy servers, firewalls, and security scanning systems, or get more info on servers on the network such as names, users, and passwords. None of these machine or “entity” threats has a user attached to it. To find them, you need to analyze the network traffic.
Analyzing the behavior of devices for malicious threats requires an exponentially more scalable solution than human behavior analysis. Devices generate 300 percent more data than their human counterparts. For every human user in a company, there are typically 10 to 25 times the number of devices. McKinsey estimates the installed base of connected devices will grow from 10 billion in 2016 to 30 billion by 2020, approximately 3 billion new devices per year. Additionally, many devices are actively generating data 24 hours a day as opposed to the eight hours a day most human users are active.
Scalable, cloud-friendly architecture
Exabeam 3.0 is designed to ingest, store, and analyze exponentially larger volumes of behavioral data generated by humans and machines. The platform has been updated with a new scale-out or “elastic” architecture that allows additional Exabeam nodes to be added to a cluster, growing it to any size needed. The new architecture gracefully handles the massive amounts of data obtained from machines and processes, as well as their associated credentials. With this update, Exabeam is the only UEBA vendor to provide stateful tracking of behavior from any type of machine or person at scale.
Exabeam 3.0 has already proven itself in the field. At a customer site, Exabeam 3.0 was the only security solution that detected DNS tunneling, attaching to Tor networks, and rogue authentication requests to directory services even though the customer already had machine and network oriented security products installed. Exabeam behavioral analytics, combined with an architecture that can capture massive amounts of machine and network data, enabled detection of multiple threats that were invisible to all other products.
Exabeam 3.0 also allows companies to more easily leverage user behavior analytics in a cloud environment. Enterprises can deploy Exabeam into any cloud environment and scale-out as needed to support the growing amount of data and data sources business wish to analyze. Exabeam software can be deployed in clouds such as Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure, in managed security services providers (MSSPs), and in on-premise data centers.
Learn from your Peers. Please take the insideBIGDATA AI /Machine Learning/Deep Learning Survey and get a copy of the results. Take the survey now.