SlideShare a Scribd company logo
1 of 4
Download to read offline
Data sheet
As the security landscape expands and evolves, enterprise security professionals continue to be
challenged by threats that are more severe and complex. Insider threats, in particular, are a growing
concern. Because it is difficult to detect malicious users or entities that have legitimate credentials,
rogue or compromised accounts can install malware that can go undetected for months as it steals
sensitive information and devastates critical assets. To effectively reduce breach impact, security
teams must detect, investigate, and respond to those threats with speed and accuracy. However,
enterprises today are increasingly finding that traditional security solutions are no longer adequate
for combatting advanced persistent threats.
While rule-based tools like security information and event management (SIEM) platforms still
serve a purpose, they often fail against modern threats. According to a recent Verizon security
study, 82 percent of all breaches investigated showed evidence of the attacker activity was
available and contained in security log files.1
Traditional tools alert enterprises to suspicious
activities, but by the time security teams are made aware of the breach, investigate the event,
assess its validity, and respond with a context-relevant solution, the adversaries have inflicted
serious damage. Even more, security professionals must comb through these vast quantities of
log data all while meeting changing regulatory requirements and controlling costs.
HPE Security ArcSight User Behavior Analytics (UBA) enables security analysts to minimize
the risk and impact of cyberattacks in real time. Instead of solely focusing on events and log
data, HPE ArcSight UBA detects unknown threats through purpose-built security analytics by
creating a baseline of normal user and entity behavior and identifying anomalies associated
with users and entities as they occur. By aggregating activities and multiple indicators of
compromise for users, entities, and their peer groups, HPE ArcSight UBA delivers insight into
the highest risk users and entities—even when credentials are legitimate.
Highlights
•	 Delivers enhanced visibility into attacks
with real-time alerts on suspicious user
and entity activities and behaviors
•	 Displays an intuitive workbench that
delivers immediate insight into security
risks, streamlines investigations, and
increases productivity
•	 Prioritizes the most suspicious and
abnormal activities across users and
entities to present risk-ranked threats
•	 Detects cyberattacks and insider threats,
even if legitimate credentials are being
used, thereby spotting adversaries faster
and before significant damage occurs
•	 Provides hundreds of supported use
cases to target intelligence activities to
various threat situations
HPE Security ArcSight
User Behavior Analytics
Figure 1: HPE ArcSight UBA enables detection of advanced user- and entity-based threats in real time
1
Ross, Joan. (2016, August 25). Making the Most of
Limited Security Resources (Web blog post). Retrieved
from securityblog.verizonenterprise.com/?p=7578
Page 2Data sheet
HPE ArcSight UBA enables detection of advanced user- and entity-based threats, and when used in
conjunction with the installation of HPE Security ArcSight SIEM, can leverage the same operational
teams, data feeds, and incident response processes already in place. This in turn drives investigation
efficiency and operational savings.
Better advanced threat detection through user behavior and
entity analysis
By coupling the latest advances in machine-learning and advanced anomaly detection techniques
and algorithms, HPE ArcSight UBA rapidly detects known and unknown threats—without solely
relying on signatures, policies, or rules. HPE ArcSight UBA performs peer group analysis to
identify unusual behaviors and unprecedented events. By comparing groups of users and entities,
HPE ArcSight UBA can compare behaviors and spot activities that are out of baselines, even if they
occur only once. By correlating anomalous user and entity behaviors with context-rich intelligence,
HPE ArcSight UBA can reduce false positives, enabling security teams to concentrate on real,
high-risk threats to the organization, including network-related scenarios such as malware beaconing
detection, and abnormal volumes and counts of traffic to suspicious sites. HPE ArcSight UBA can
help organizations identify high-risk data exfiltration, misuse of privileged and service accounts, and
detection of advanced, persistent threats.
More proactive adversary hunting to reduce breach impact
By combining user identity management and access information with database, file, and user-centric
activity, HPE ArcSight UBA can actively monitor the actions of privileged users for risky or unusual
activity, lowering the risk and impact of cyberattacks by detecting unusual behavior sooner. It
includes advanced and targeted attack identification, identity correlation, insider threat identification
and investigation, and privileged account misuse. This information is visualized in a useful way for the
organization to find the bad guys faster.
Faster, more accurate investigation and decision-making
The streamlined user interface enables more efficient investigation and effective decision-making.
A revamped multi-entity investigation workbench enables distillation of massive amounts of data
collected from disparate sources and prioritization of security information in a business-relevant
context. Dashboards, violation timelines, point-and-click filtering, and search capabilities enable
analysts to immediately refine data and logs down to the most relevant information, such as host
name, IP address, and risk scores, and identify real threats. Risk boosting and dashboard actions
ensure cyber defense centers maintain a human element.
82%
Page 3Data sheet
Greater situational awareness to respond to threats more
intelligently
HPE ArcSight UBA Threat Library gives organizations access to hundreds of sophisticated use
cases that can be configured to meet individual enterprise needs. HPE ArcSight UBA Threat Library
enables cyber defense centers to target their activities to various threat situations including user and
entity behavior analytics, data loss prevention, enterprise and cloud applications, and cyber threats
against devices. Hundreds of supported use cases translate to more accurate threat identification
and not just anomaly identification or false positives.
Efficient and effective event resolution
Achieve faster event resolution with purpose-built security analytics and intelligence that mines,
enriches, and transforms your SIEM information to produce actionable intelligence on known and
unknown threats against the entire IT environment by providing detailed visibility into users and
entities, mitigating threats before they occur.
Move from IP address to user mapping
Many logs for important systems like proxies do not record user behavior information but only
IP addresses. Investigating user activity on those systems requires knowing which IP address the
user had at a given time. UBA solves this problem by using identity correlation—a process that
correlates data between addressing systems to attribute unauthenticated activity to individual users.
About HPE Security
Hewlett Packard Enterprise is a leading provider of enterprise security and compliance solutions for
the modern enterprise that wants to mitigate risk in their hybrid environment and defend against
advanced threats. Based on market-leading products from HPE Security ArcSight, HPE Security
Fortify, and HPE Security—Data Security, the HPE Security Intelligence Platform uniquely delivers
the advanced log and event correlation, application protection, and network defenses to protect
today’s hybrid IT infrastructure from sophisticated cyber threats.
Learn more at
hpe.com/software/userbehavioranalytics
of all breaches investigated show evidence
of attacker activity was available and
contained in security log files.
– Verizon Security Blog, 20162
2
Ross, Joan. (2016, August 25). Making the Most of
Limited Security Resources (Web blog post). Retrieved
from securityblog.verizonenterprise.com/?p=7578
Sign up for updates
Data sheet
© Copyright 2015–2016 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without
notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
4AA5-8223ENW, September 2016, Rev. 3

More Related Content

What's hot

Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBASplunk
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesSpectorsoft
 
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...Christian Buckley
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanAaron Friedman
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Studyjoepanora
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure SentinelMighty Guides, Inc.
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Chris Ross
 

What's hot (20)

Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
 
Security management
Security managementSecurity management
Security management
 
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...
Securing SharePoint -- 5 SharePoint Security Essentials You Cannot Afford to ...
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
McAfee CDCR Case Study
McAfee CDCR Case StudyMcAfee CDCR Case Study
McAfee CDCR Case Study
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
 

Similar to UBA 5.0 Data Sheet (September 2016)

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_securityGreg Hanchin
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixPrachi Joshi
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Matt Soseman
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax Technology
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infoghuynhvanphuc
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfforladies
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackAujas
 

Similar to UBA 5.0 Data Sheet (September 2016) (20)

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrix
 
UEBA
UEBAUEBA
UEBA
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Haystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network ServicesHaystax - Analytic Products and Enterprise Network Services
Haystax - Analytic Products and Enterprise Network Services
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infog
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 

UBA 5.0 Data Sheet (September 2016)

  • 1. Data sheet As the security landscape expands and evolves, enterprise security professionals continue to be challenged by threats that are more severe and complex. Insider threats, in particular, are a growing concern. Because it is difficult to detect malicious users or entities that have legitimate credentials, rogue or compromised accounts can install malware that can go undetected for months as it steals sensitive information and devastates critical assets. To effectively reduce breach impact, security teams must detect, investigate, and respond to those threats with speed and accuracy. However, enterprises today are increasingly finding that traditional security solutions are no longer adequate for combatting advanced persistent threats. While rule-based tools like security information and event management (SIEM) platforms still serve a purpose, they often fail against modern threats. According to a recent Verizon security study, 82 percent of all breaches investigated showed evidence of the attacker activity was available and contained in security log files.1 Traditional tools alert enterprises to suspicious activities, but by the time security teams are made aware of the breach, investigate the event, assess its validity, and respond with a context-relevant solution, the adversaries have inflicted serious damage. Even more, security professionals must comb through these vast quantities of log data all while meeting changing regulatory requirements and controlling costs. HPE Security ArcSight User Behavior Analytics (UBA) enables security analysts to minimize the risk and impact of cyberattacks in real time. Instead of solely focusing on events and log data, HPE ArcSight UBA detects unknown threats through purpose-built security analytics by creating a baseline of normal user and entity behavior and identifying anomalies associated with users and entities as they occur. By aggregating activities and multiple indicators of compromise for users, entities, and their peer groups, HPE ArcSight UBA delivers insight into the highest risk users and entities—even when credentials are legitimate. Highlights • Delivers enhanced visibility into attacks with real-time alerts on suspicious user and entity activities and behaviors • Displays an intuitive workbench that delivers immediate insight into security risks, streamlines investigations, and increases productivity • Prioritizes the most suspicious and abnormal activities across users and entities to present risk-ranked threats • Detects cyberattacks and insider threats, even if legitimate credentials are being used, thereby spotting adversaries faster and before significant damage occurs • Provides hundreds of supported use cases to target intelligence activities to various threat situations HPE Security ArcSight User Behavior Analytics Figure 1: HPE ArcSight UBA enables detection of advanced user- and entity-based threats in real time 1 Ross, Joan. (2016, August 25). Making the Most of Limited Security Resources (Web blog post). Retrieved from securityblog.verizonenterprise.com/?p=7578
  • 2. Page 2Data sheet HPE ArcSight UBA enables detection of advanced user- and entity-based threats, and when used in conjunction with the installation of HPE Security ArcSight SIEM, can leverage the same operational teams, data feeds, and incident response processes already in place. This in turn drives investigation efficiency and operational savings. Better advanced threat detection through user behavior and entity analysis By coupling the latest advances in machine-learning and advanced anomaly detection techniques and algorithms, HPE ArcSight UBA rapidly detects known and unknown threats—without solely relying on signatures, policies, or rules. HPE ArcSight UBA performs peer group analysis to identify unusual behaviors and unprecedented events. By comparing groups of users and entities, HPE ArcSight UBA can compare behaviors and spot activities that are out of baselines, even if they occur only once. By correlating anomalous user and entity behaviors with context-rich intelligence, HPE ArcSight UBA can reduce false positives, enabling security teams to concentrate on real, high-risk threats to the organization, including network-related scenarios such as malware beaconing detection, and abnormal volumes and counts of traffic to suspicious sites. HPE ArcSight UBA can help organizations identify high-risk data exfiltration, misuse of privileged and service accounts, and detection of advanced, persistent threats. More proactive adversary hunting to reduce breach impact By combining user identity management and access information with database, file, and user-centric activity, HPE ArcSight UBA can actively monitor the actions of privileged users for risky or unusual activity, lowering the risk and impact of cyberattacks by detecting unusual behavior sooner. It includes advanced and targeted attack identification, identity correlation, insider threat identification and investigation, and privileged account misuse. This information is visualized in a useful way for the organization to find the bad guys faster. Faster, more accurate investigation and decision-making The streamlined user interface enables more efficient investigation and effective decision-making. A revamped multi-entity investigation workbench enables distillation of massive amounts of data collected from disparate sources and prioritization of security information in a business-relevant context. Dashboards, violation timelines, point-and-click filtering, and search capabilities enable analysts to immediately refine data and logs down to the most relevant information, such as host name, IP address, and risk scores, and identify real threats. Risk boosting and dashboard actions ensure cyber defense centers maintain a human element.
  • 3. 82% Page 3Data sheet Greater situational awareness to respond to threats more intelligently HPE ArcSight UBA Threat Library gives organizations access to hundreds of sophisticated use cases that can be configured to meet individual enterprise needs. HPE ArcSight UBA Threat Library enables cyber defense centers to target their activities to various threat situations including user and entity behavior analytics, data loss prevention, enterprise and cloud applications, and cyber threats against devices. Hundreds of supported use cases translate to more accurate threat identification and not just anomaly identification or false positives. Efficient and effective event resolution Achieve faster event resolution with purpose-built security analytics and intelligence that mines, enriches, and transforms your SIEM information to produce actionable intelligence on known and unknown threats against the entire IT environment by providing detailed visibility into users and entities, mitigating threats before they occur. Move from IP address to user mapping Many logs for important systems like proxies do not record user behavior information but only IP addresses. Investigating user activity on those systems requires knowing which IP address the user had at a given time. UBA solves this problem by using identity correlation—a process that correlates data between addressing systems to attribute unauthenticated activity to individual users. About HPE Security Hewlett Packard Enterprise is a leading provider of enterprise security and compliance solutions for the modern enterprise that wants to mitigate risk in their hybrid environment and defend against advanced threats. Based on market-leading products from HPE Security ArcSight, HPE Security Fortify, and HPE Security—Data Security, the HPE Security Intelligence Platform uniquely delivers the advanced log and event correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats. Learn more at hpe.com/software/userbehavioranalytics of all breaches investigated show evidence of attacker activity was available and contained in security log files. – Verizon Security Blog, 20162 2 Ross, Joan. (2016, August 25). Making the Most of Limited Security Resources (Web blog post). Retrieved from securityblog.verizonenterprise.com/?p=7578
  • 4. Sign up for updates Data sheet © Copyright 2015–2016 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. 4AA5-8223ENW, September 2016, Rev. 3