Executive Vice President,Global Head at a tech vendor with 10,001+ employees
Real User
Jul 29, 2022
Securonix UEBA is used for lateral movement detection, ransomware detection, multiple malware detections, user activity monitoring, and behavior analysis. We have completed a large number of additional use cases based on specific effects and commitment.
Lead Security Engineer at a tech services company with 1-10 employees
Reseller
Feb 4, 2022
We are using the solution for behavioral analysis of the users and behavioral analysis of network traffic. For example, if we know that there is an IP address that keeps reaching out, we confirm it with the client, put that in behavioral analysis and say, "Okay. This is a regular behavior." It's not going to trigger us if they reach out to a certain threshold. If that IP reaches out to over that threshold, then we are going to tell the client, "Something seems to be wrong over here. This machine does not go to that IP address a lot, but this is going on a lot today." From a behavioral analysis perspective, the use cases are data exportation by contractors, by determination, account accessing, removal of media. The version we are using is SNYPR.
Securonix UEBA delivers powerful user behavior analytics with intuitive dashboards and advanced threat detection algorithms.Securonix UEBA aggregates diverse use case data into organized dashboards, visualizing trends and enabling cross-organization comparisons. Advanced algorithms detect insider threats and anomalies, ensuring comprehensive user activity visibility. Continuous enhancements through new policies and custom rules support thorough monitoring and investigation, while cyber...
My primary use case for Securonix UEBA is user threat notification and user behavior analysis.
Securonix UEBA is used for lateral movement detection, ransomware detection, multiple malware detections, user activity monitoring, and behavior analysis. We have completed a large number of additional use cases based on specific effects and commitment.
We are using the solution for behavioral analysis of the users and behavioral analysis of network traffic. For example, if we know that there is an IP address that keeps reaching out, we confirm it with the client, put that in behavioral analysis and say, "Okay. This is a regular behavior." It's not going to trigger us if they reach out to a certain threshold. If that IP reaches out to over that threshold, then we are going to tell the client, "Something seems to be wrong over here. This machine does not go to that IP address a lot, but this is going on a lot today." From a behavioral analysis perspective, the use cases are data exportation by contractors, by determination, account accessing, removal of media. The version we are using is SNYPR.
We use it for insider threat detection. It's appliance-based in the data center.