Veriato Blog

Tag Results

  • What is User and Entity Behavior Analytics and why does it matter?

    by Dr. Christine Izuakor | Apr 22, 2019
    • user and entity behavior analytics
    • User Behavior Analytics
    • ueba
    • UBA
    The fundamental operating principle of UEBA is to create a picture of what normal user and organizational behavior looks like, in order to know what can be considered abnormal behavior. Once you have a baseline to compare against, you can begin to alert on suspicious user behavior.
    Full story
  • What Is an Insider Threat and the 5 Things You Should Know?

    by Veriato | Feb 22, 2019
    • Insider Threats
    • what is an insider threat
    • ueba
    • UBA
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Gone are the days when our greatest inklings of Insider Threats were employees who never wanted to take vacation and did everything to avoid letting others see the financial records they were maintaining. Today, Insider Threats come in a concerning variety of forms with consequences often exceeding millions of dollars. As time passes, more industries than ever before are feeling the sting of security incidents and breaches stemming from their very own trusted employees and partners.
    Full story
  • The Rise of User Behavior Analytics

    by Mike Tierney | Dec 15, 2015
    • Insider Threat
    • UBA
    • User Behavior Analytics
    • Veriato Recon
    • Behavior Analytics
    In August 2014, Gartner published the "Market Guide for User Behavior Analytics." The analysts did a great job defining what had beforehand been a largely undefined market.
    Full story
  • Read this. Pick yourself up off the floor. Then Trust, but Verify.

    by Mike Tierney | Aug 04, 2015
    • UBA
    • User Behavior Analytics
    • Behavior Analytics
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato Recon
    Working for a company that makes behavioral analytics software for insider threat detection and user activity monitoring software, I read a lot about specific insider attacks.
    Full story
  • Attack the problem before the problem attacks you

    by Mike Tierney | Jun 14, 2015
    • Behavior Analytics
    • User Behavior Analytics
    • UBA
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    • Veriato 360
    In our most recent post we identified that only a small number (21%) of organizations are continuously monitoring the behavior of their users.
    Full story

Search Blog Posts

Filter Blog Posts