Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE

Terminate threats with UBA 6.1

charles.clawson Respected Contributor.
Respected Contributor.
0 0 1,629

In “The Terminator” movies, Sarah Connor was targeted by an extremely advanced cyborg assassin from the year 2029. As we come up on 2019, just 10 years shy of that post-apocalyptic future, how are we beginning to leverage artificial intelligence and machine learning to eliminate our adversaries?

Terminate threats with UBA 6.1.jpgGranted, making any kind of comparison to Arnold Schwarzenegger’s character is a huge stretch, but still, advances in cyber security have come a long way. And perhaps no solution has benefited as much from advanced analytics as those focused on the patterns of human behavior and detection of insider threats known as User and Entity Behavior Analytics (UEBA), or UBA for short, when user-specific.

Addressing one of the biggest security challenges facing organizations today—that of identifying rogue users, privilege misuse and compromised accounts—Micro Focus ArcSight is announcing our next iteration of UBA in version 6.1. Through its user-centric analytics approach, UBA 6.1 can identify not only unintended compromising actions done by users, but also the misuse of legitimate credentials as intruders seek to move laterally across an organization or exfiltrate sensitive data. Regardless of whether you are running Splunk, QRadar or even better, ArcSight ESM, adding this UBA solution will supercharge your SIEM and take it to then next level.

As one of your most important security tools, benefits include:

  • Faster investigations and automated incident response
  • Threat identification with minimal noise
  • Real-time context enrichment for real-time results, and
  • Clear visibility into your cloud environments with built in APIs

“Moving from 5.0 to 6 was a huge leap forward in the underlying technology supporting the UBA analytics. It now leverages leading big data technologies such as Hadoop, Kafka, Solr and Redis, not only making the compute time lower and more efficient, but also allowing our data sets to be much greater in size as well,” says Steve Forsyth, the UBA product manager at Micro Focus. UBA 6 also supports complete integration with automated response tools like Demisto, Phantom or ServiceNow, further increasing the efficiencies of security operations.

Get a Closer Look!
If you feel as if your attackers have offensive tools that are more advanced than your own, take a look at Micro Focus UBA 6.1 and see what harnessing the power of user behavior analytics can do to improve your security posture... or before the Cyberdyne Systems Series T-800 Resistance Infiltrator (Terminator) has you as its next target. And if you’re in the Washington, DC area from September 25-27, come meet us at the Micro Focus Cybersecurity Summit where we’ll talk more about UBA and the state of threat behavior analytics with experts and peers!

Follow Micro Focus Security on Twitter and use the hashtag #MicroFocusCyberSummit to stay up to date on the Cybersecurity Summit.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.