SlideShare a Scribd company logo
USER ENTITY BEHAVIOR ANALYTICS: A
BOON FOR THE WORLD OF CYBER
SECURITY
CONTENT
• LTS Secure User Entity Behavior Analytics (UEBA)
• Benefits of User Entity Behavior Analytics (UEBA)
• Detection of hijacked accounts
• Reduced Attack Surface
• Privilege Abuse and Misuse
• Improved Operational Efficiency
• Data Exfiltration detection
LTS SECURE USER ENTITY BEHAVIOR
ANALYTICS (UEBA)
The world has seen an unabated rise in the number of cyber-attacks as the hackers
continue to target the vulnerabilities in the security system. Even a small loophole
in security system can serve as an entry point for the cyber attackers. Insider threats
pose significant risk to any organization and quite often it is very hard to detect.
The encouraging part is that we have UEBA to address these threats.
UEBA can be defined as a security solution that analyzes the behaviors of people
that are connected to an organization’s network and entities or end-points such as
servers, applications, etc. to figure out the anomalies in the security. UEBA uses
behavioral analysis to monitor the activities of the users and entities. It keeps a
track of where do people usually log in from and what applications or file servers
they use, what is their degree of access, etc. UEBA then correlates this information
to gauge if a certain activity performed by the users is different from their daily
tasks and establishes a baseline of what is usual behavior. If something unusual
happens that doesn’t comply with the baseline, UEBA detects it and sends alerts of
the probable threat.
This can be explained with an example, Let us say an employee accesses a
certain file named “A” daily, however he begins to send information from
file A to an unknown entity. In this case UEBA will analyze the activities
employee has been performing over a period of time to detect if there is any
indication of his entities being compromised. It will then use this
information to determine whether the employee’s behavior is malicious and
notify about the same.
Now the question is “Why is finding insider threat so difficult?” and “How
is UEBA different from other security systems?”
The answer lies in large volume of alerts generated by traditional security
systems like SIEM. It is very difficult to determine who, what, how and
why an insider attack took place because of the huge amount of data
generation. Most of the alerts given by tradition security solutions like
SIEM are false positives, and most of the threats go unnoticed. It mostly
concentrates on protecting abstractions like endpoints and perimeters. It is
defenseless when it comes to insider threats. UEBA solutions are designed
in such a way that they accurately detect activities that may otherwise go
unnoticed. It helps companies to secure access to the privileged accounts
used by the employees.
BENEFITS OF USER ENTITY BEHAVIOR
ANALYTICS (UEBA)
• Detection of hijacked accounts - Attackers who steal valid user credentials
behave differently than real users. UEBA uses real-time detection to ascertain if
something is out of norm and responds to the threat through various real-time
responses such as Block, Modify, Re-authenticate or Multi-factor authentication.
This ensures that the real threats are getting addressed before they try to harm
the system.
• Reduced Attack Surface - UEBA sends insights to the users and the security
teams through interactive analytics which allows them to know about the
loopholes or weak points before an incident happens. These insights help reduce
the attack surface which makes it difficult for the cyber attacker to breach the
network.
• Privilege Abuse and Misuse - In any organization the privileged users have
extensive access to the system, data and applications which is why they present
a higher risk to the organization. UEBA’s algorithms ensure that the access
rights are used appropriately and give an overview of what kind of privileges
individual users should have.
• Improved Operational Efficiency - It takes a lot of efforts to identify
threats manually through alerts. UEBA can manually identify and validate
threat without manual intervention through automation and security
intelligence. This level of automation allows security to focus on real threats
rather than alert chasing.
• Data Exfiltration detection - UEBA analytics help to detects potential data
exfiltration before it happens, thus allowing businesses time to prepare a
strategic plan to prevent data theft. It can even help identify Advanced
Persistent Threats (APT).
UEBA has proved itself to be an indispensible asset in the world of cyber
security. According to experts user and entity behavior analytics is a better
model for attack detection and maintain that it is going to enable more
accurate detection of cyber attackers threatening networks.
THANK
YOU

More Related Content

PDF
Security Testing for Test Professionals
PPTX
What is security testing and why it is so important?
PPTX
External Attacks Against Pivileged Accounts
PDF
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
PDF
Microsoft Advanced Threat Analytics - How it Works - Presented by Atidan
PPTX
What is penetration testing and why is it important for a business to invest ...
PPTX
Self protecteion in clustered distributed system new
PDF
Insider Threat Detection Recommendations
Security Testing for Test Professionals
What is security testing and why it is so important?
External Attacks Against Pivileged Accounts
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
Microsoft Advanced Threat Analytics - How it Works - Presented by Atidan
What is penetration testing and why is it important for a business to invest ...
Self protecteion in clustered distributed system new
Insider Threat Detection Recommendations

What's hot (20)

PPTX
Assessment and Threats: Protecting Your Company from Cyber Attacks
DOC
System Security Threats and Risks)
PPTX
System Security-Chapter 1
PPTX
Vulnerability Assessment
PPTX
Data base security and injection
PPT
Ethical hacking a licence to hack
PPTX
Ea sy presentation4
PPTX
System security
PPTX
Securing information system (Management Information System)
DOC
Analysis of field data on web security vulnerabilities
PPTX
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
PPT
Security testing
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
PPTX
Securing information system
PDF
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
PPTX
Ethical Hacking Services
PPTX
Network Security Risk
PPTX
information security (Audit mechanism, intrusion detection, password manageme...
PPTX
Is Antivirus (AV) Dead or Just Missing in Action
PDF
Detecting Unknown Attacks Using Big Data Analysis
Assessment and Threats: Protecting Your Company from Cyber Attacks
System Security Threats and Risks)
System Security-Chapter 1
Vulnerability Assessment
Data base security and injection
Ethical hacking a licence to hack
Ea sy presentation4
System security
Securing information system (Management Information System)
Analysis of field data on web security vulnerabilities
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
Security testing
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Securing information system
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
Ethical Hacking Services
Network Security Risk
information security (Audit mechanism, intrusion detection, password manageme...
Is Antivirus (AV) Dead or Just Missing in Action
Detecting Unknown Attacks Using Big Data Analysis
Ad

Similar to LTS Secure User Entity Behavior Analytics(ueba) boon to Cyber Security (20)

PDF
The Evolution of User and Entity Behavior Analytics (UEBA)_ From Reactive to ...
PDF
IRJET -User Behaviour Analysis
PDF
User and Entity Behavior Analytics (UEBA) 1.pdf
PDF
User and Entity Behaviour Analytics 11.pdf
PPTX
User and Entity Behavior Analytics (UEBA)
PPTX
Cyber security analytics for detect target attacks
PPTX
LTS Cyber Security Analytics
PDF
Knowledge brief securonix-ueba-market_2018-spark-matrix
DOCX
UserEntityandBehaviorAnalyticsFriedman
PDF
CASB Product | SIEM Security | Zero trust Security
PPTX
User and entity behavior analytics: building an effective solution
PDF
Jisheng Wang at AI Frontiers: Deep Learning in Security
PDF
Big Data Security Challenges: An Overview and Application of User Behavior An...
PPTX
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
PPTX
Effective Security Operation Center - present by Reza Adineh
PPTX
GDPR in practice
PDF
UBA 5.0 Data Sheet (September 2016)
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
PDF
Arbel Zinger | Microsoft Advanced Threat Analytics
The Evolution of User and Entity Behavior Analytics (UEBA)_ From Reactive to ...
IRJET -User Behaviour Analysis
User and Entity Behavior Analytics (UEBA) 1.pdf
User and Entity Behaviour Analytics 11.pdf
User and Entity Behavior Analytics (UEBA)
Cyber security analytics for detect target attacks
LTS Cyber Security Analytics
Knowledge brief securonix-ueba-market_2018-spark-matrix
UserEntityandBehaviorAnalyticsFriedman
CASB Product | SIEM Security | Zero trust Security
User and entity behavior analytics: building an effective solution
Jisheng Wang at AI Frontiers: Deep Learning in Security
Big Data Security Challenges: An Overview and Application of User Behavior An...
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Effective Security Operation Center - present by Reza Adineh
GDPR in practice
UBA 5.0 Data Sheet (September 2016)
Accelerating Enhanced Threat Identification and Incident Investigation
Arbel Zinger | Microsoft Advanced Threat Analytics
Ad

More from rver21 (13)

PPTX
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
PPTX
Priviledged identity management
PPTX
LTS Secure SOC as a Service
PPTX
Priviledged Identity Management
PPTX
Intelligence driven SOC as a Service
PPTX
Identity Management
PPTX
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
PPTX
Priviledged Identity Management
PPTX
LTS Secure offers PIM User Activity Monitoring
PDF
LTS Secure intelligence driven security operation center
PDF
LTS Secure Identity Management
PPTX
LTS Secure Identity Management
PDF
LTS Secure SIEM Features
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
Priviledged identity management
LTS Secure SOC as a Service
Priviledged Identity Management
Intelligence driven SOC as a Service
Identity Management
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
Priviledged Identity Management
LTS Secure offers PIM User Activity Monitoring
LTS Secure intelligence driven security operation center
LTS Secure Identity Management
LTS Secure Identity Management
LTS Secure SIEM Features

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Building Integrated photovoltaic BIPV_UPV.pdf

LTS Secure User Entity Behavior Analytics(ueba) boon to Cyber Security

  • 1. USER ENTITY BEHAVIOR ANALYTICS: A BOON FOR THE WORLD OF CYBER SECURITY
  • 2. CONTENT • LTS Secure User Entity Behavior Analytics (UEBA) • Benefits of User Entity Behavior Analytics (UEBA) • Detection of hijacked accounts • Reduced Attack Surface • Privilege Abuse and Misuse • Improved Operational Efficiency • Data Exfiltration detection
  • 3. LTS SECURE USER ENTITY BEHAVIOR ANALYTICS (UEBA) The world has seen an unabated rise in the number of cyber-attacks as the hackers continue to target the vulnerabilities in the security system. Even a small loophole in security system can serve as an entry point for the cyber attackers. Insider threats pose significant risk to any organization and quite often it is very hard to detect. The encouraging part is that we have UEBA to address these threats. UEBA can be defined as a security solution that analyzes the behaviors of people that are connected to an organization’s network and entities or end-points such as servers, applications, etc. to figure out the anomalies in the security. UEBA uses behavioral analysis to monitor the activities of the users and entities. It keeps a track of where do people usually log in from and what applications or file servers they use, what is their degree of access, etc. UEBA then correlates this information to gauge if a certain activity performed by the users is different from their daily tasks and establishes a baseline of what is usual behavior. If something unusual happens that doesn’t comply with the baseline, UEBA detects it and sends alerts of the probable threat.
  • 4. This can be explained with an example, Let us say an employee accesses a certain file named “A” daily, however he begins to send information from file A to an unknown entity. In this case UEBA will analyze the activities employee has been performing over a period of time to detect if there is any indication of his entities being compromised. It will then use this information to determine whether the employee’s behavior is malicious and notify about the same. Now the question is “Why is finding insider threat so difficult?” and “How is UEBA different from other security systems?” The answer lies in large volume of alerts generated by traditional security systems like SIEM. It is very difficult to determine who, what, how and why an insider attack took place because of the huge amount of data generation. Most of the alerts given by tradition security solutions like SIEM are false positives, and most of the threats go unnoticed. It mostly concentrates on protecting abstractions like endpoints and perimeters. It is defenseless when it comes to insider threats. UEBA solutions are designed in such a way that they accurately detect activities that may otherwise go unnoticed. It helps companies to secure access to the privileged accounts used by the employees.
  • 5. BENEFITS OF USER ENTITY BEHAVIOR ANALYTICS (UEBA) • Detection of hijacked accounts - Attackers who steal valid user credentials behave differently than real users. UEBA uses real-time detection to ascertain if something is out of norm and responds to the threat through various real-time responses such as Block, Modify, Re-authenticate or Multi-factor authentication. This ensures that the real threats are getting addressed before they try to harm the system. • Reduced Attack Surface - UEBA sends insights to the users and the security teams through interactive analytics which allows them to know about the loopholes or weak points before an incident happens. These insights help reduce the attack surface which makes it difficult for the cyber attacker to breach the network. • Privilege Abuse and Misuse - In any organization the privileged users have extensive access to the system, data and applications which is why they present a higher risk to the organization. UEBA’s algorithms ensure that the access rights are used appropriately and give an overview of what kind of privileges individual users should have.
  • 6. • Improved Operational Efficiency - It takes a lot of efforts to identify threats manually through alerts. UEBA can manually identify and validate threat without manual intervention through automation and security intelligence. This level of automation allows security to focus on real threats rather than alert chasing. • Data Exfiltration detection - UEBA analytics help to detects potential data exfiltration before it happens, thus allowing businesses time to prepare a strategic plan to prevent data theft. It can even help identify Advanced Persistent Threats (APT). UEBA has proved itself to be an indispensible asset in the world of cyber security. According to experts user and entity behavior analytics is a better model for attack detection and maintain that it is going to enable more accurate detection of cyber attackers threatening networks.