SlideShare a Scribd company logo
Running head: USER ENTITY AND BEHAVIOR ANALYTICS 1
Even the most well-developed business continuity/disaster recovery (BC/DR) plan
contains hidden and/or unknown threats that can compromise an organization’s IT systems.
When threats strike, they can have a high-profile and sustained impact on an organization and
organizations are adopting IT security products to get on the offensive to detect and containing
the threats.
According to Gartner research director Eric Ahlm, many IT security teams have used
security information management (SIM) or security information and event management (SIEM)
technologies, which are able to collect and analyze data. (Paredes, 2015). Using rule-based
technology, SIEMs can provide real-time alerts whenever an abnormal event is detected. While
SIEM sounds like it would be the only threat detection tool needed, this is simply not the case.
According to Bussa, Kavanagh, and Rochford (2016), having
SIEM by itself will not improve threat detection rate or reduce
the window of discovery.
1
Moreover, SIEMs, are just one piece of the burgeoning
security analytics (SA) market. In their SA vendor analysis,
Forrester describes a security analytics ecosystem (depicted in
the graphic to the right) depicting a market of a variety of
technologies, some that of which can be used independently as a
platform, while others are complementary products
(Blankenship, et. al, November 15, 2016). The term security
analytics is often misused and it is important to note that not all
products in this market qualify as an SA platform.
(Blankenship, et. al, May 9, 2016). SAs use that use data science and machine learning instead of
rule-based technology that many SIMs or SIEMs use.
Some vendors in the market focus exclusively on the SA techniques, such as network
analysis and visibility (NAV) and security and user behavior analytics (SUBA) rather than the
standalone SA platform. According to Blankenship et. al (November 15, 2016). NAV provides
capabilities to study network forensics, malicious behavior detection, packet capture, and other
network-based situational awareness capabilities. SUBA collects user data from a variety of data
logs to set a user activity baseline, then using the baseline to detect threats, assess risk scores and
allow behavior anomalies to be studied in real time in real time. By using these advanced
analytic capabilities, SUBA make profiles of users and traffic patterns, creating a picture of
their behaviors and activities over time, and shaping the behaviors as new data sources are
provided. (Bussa, Kavanagh, and Rochford, 2016).
Expanding on SUBAs, IT security professionals are increasingly turning to User and
Entity Behavior Analytics (UEBA) as an analytical technique to discover some of these threats.
1
Illustration provided by Forrester in Blankenship, et al., November, 15, 2016
USER ENTITY AND BEHAVIOR ANALYTICS 2
In addition to user behavior, UEBA vendors, such as Fortscale, study entity behavior, studying
behavior at the application, device, and server levels.
Aside from security management, Litan (2015) identified several other use cases for
UEBA. Data exfiltration detection allows companies to monitor anomalies in data transfer;
identity access management can be used to monitor user and account behavior against access
rights; analyzing contextual behavior information in to assess malicious intent from an insider; as
a specialized security tool to manage Software as a Service (SaaS) usage (Litan, 2015).
So why are IT executives looking at UEBA? Both Gartner and Forrester describe in detail
of the difficulty to detect insider threats. Insider threats are often unexpected, and can emanate
from a variety of motivations and intentions. The National Counterintelligence and Security
Center states that the most damage U.S. counterintelligence failures over the last century were a
result of trusted insider with ulterior motives. At the government level, all federal agencies are
being required to institute a insider threat program in place by November 30, 2016 (Blankenship,
August 17 2016). On a global level, insider threats were responsible for 39% of all data breaches
in 2015 (Blankenship, August 17, 2016)
The UEBA market is expected to grown dramatically over the next few years, going from
$50 million in market revenue in September 2015 to about $200 million by the end of 2017
(Litan, 2015). Litan notes that may of the UEBA vendors have varying capabilities, and vendors
may offer different combinations of Litan’s UEBA functions. Some vendors in this space focus
exclusively on insider threats, like Lockheed Martin’s Insider Threat Identification (ITI) tool,
which combines unstructured and structured data, performing word searches and other analytics
to identify employee risk levels. (Litan, 2015).
Other vendors, like Bay Dynamics are more varied in their offerings. Bay Dynamics’
Risk Fabric product inputs from multiple data feeds and then provides alerts of anomalies in
privileged user access, vendor behavior, and security policies among others (Litan, 2015). E8
Security also studies anomalies in behavior through the use of multidimensional modeling, and
correlating behaviors and relationships (Cser & Blankenship, 2016). Some vendors, like
Fortscale and Niara even use unsupervised machine learning algorithms (Litan, 2015). Niara is
also somewhat unique in that they offer network forensic techniques like deep packet inspection.
Another key differentiator are employee monitoring capabilities. Dtex Systems and SpectorSoft
are both able to monitor employee desktop activity providing their client organization with
visibility into system activity (Litan, 2015)
UEBA vendors even have cloud capabilities. Rapid7’s agentless, SaaS-only, Insight IDR
allows companies to investigate security incidents and provide visibility into intruder activities.
Insight IDR is compatible with some of the cloud market leaders such as Office 365, Salesforce,
and Box (Cser & Blankenship, 2016). Gurucul, which has both cloud and on-premise solutions,
uses a cloud analytics engine and is also able to integrate to Office 365, Salesforce, and Box
(Cser & Blankenship, 2016). Speaking of Microsoft, they have their own UEBA product:
Advanced Threat Analytics, which provides deep packet inspection of Active Directory traffic
As an aside, this author is participating in a Business Continuity/Disaster Recovery
(BC/DR) course where he is creating a BC/DR plan for convenience food company Acme, Ltd.
USER ENTITY AND BEHAVIOR ANALYTICS 3
As part of the plan, UEBA functions would be a great resource for Acme to have. Since Acme is
a global company, user access is a concern, especially when it comes to deprovisioning users, so
UEBA can be used to check for rogue system or user access. Additionally, the data exfiltration
tools would be valuable to ensure that data is not leaving Acme unless authorized by the Office
of the CIO and the Security Committee. As with any company, Acme is susceptible to insider
threats, which can have devastating consequences for a corporation. According to Blankenship
(2016), insiders can use their access for financial gain, to steal intellectual property, or to cause
sabotage and destruction.
As powerful as the aforementioned capabilities are, UEBA has its limitations. According
to Litan (2015), the anomaly detection is not advanced enough to detect filter out suspicious
behavior from a user with privileged access. Insider threat detection has to go beyond the
technology. Blankenship (2016) states that treating the insider threat issue as a technology
problem ignores the human elements of motivation and behavior. . Most importantly, UEBA is
not a cure-all product, it needs to be part of a security analytics platform. For IT security
professionals exploring UEBA, make sure it can integrate with your existing SA platform.
References
Blankenship, J. (August 17, 2016) . Hunting insider threats. Forrester. Retrieved from
Northwestern University Library access to Forrester on November 18, 2016.
USER ENTITY AND BEHAVIOR ANALYTICS 4
Blankenship, J., Balaouras, S., Pollard, J., Kindervag, J., Blackborow, J. & Dostie, P. (May 9,
2016) . Counter cyberattacks with security analytics. Forrester. Retrieved from
Northwestern University Library access to Forrester on November 18, 2016.
Blankenship J., Balaouras, S., Cser, A., Kindervag, J., O’Malley, C., Barringham, B. & Dostie,
P. (November 15, 2016). Vendor analysis: Security analytics (SA). Forrester.
Retrieved from Northwestern University Library access to Forrester on
November 18, 2016.
Bussa, T., Kavanagh, K.M., and Rochford, O. (June 30, 2016). Use SIEM for targeted attack
detection. Gartner, G00308086. Retrieved from Northwestern University Library
access to Gartner.
Cser, A. & Blankenship, J. (September 2, 2016). Vendor landscape: Security user behavior
analytics (SUBA). Forrester. Retrieved from Northwestern University Library
access to Forrester on November 18, 2016.
Litan, A. (September 22, 2015). Market guide for user and entity behavior analytics. Gartner,
(G00276088). Retrieved from Northwestern University Library access to
Gartner.
Paredes, D. (2015) Gartner: Are security analytics key to breach detection - or just hype? CIO
(13284045). Retrieved from Northwestern University Library access to EBSCO
Academic Search Premier on November 4, 2016.(2015).
http://www.cio.co.nz/article/574166/gartner-security-analytics-key-breach-
detection-just-hype/
Sqrrl. User + entity behavior analytics (UEBA): The heart of next-generation threat-hunting
[eBook]. Retrieved from https://sqrrl.com/media/UEBA-
eBook.pdf?submissionGuid=3318e663-e39a-4a33-ba5b-64c7f3800dce on
November 4, 2016.
Sqrrl. User and entity behavior analytics. Retrieved from Sqrrl’s website on October 25, 2016.
URL: https://sqrrl.com/product/user-and-entity-behavior-analytics-ueba/

More Related Content

PPTX
User Behavior Analytics And The Benefits To Companies
PPTX
Sqrrl and IBM: Threat Hunting for QRadar Users
PDF
Enterprise Security featuring UBA
PPTX
Using Big Data for Cybersecurity
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PPTX
Gov Day Sacramento 2015 - User Behavior Analytics
PPTX
User and entity behavior analytics: building an effective solution
PPTX
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
User Behavior Analytics And The Benefits To Companies
Sqrrl and IBM: Threat Hunting for QRadar Users
Enterprise Security featuring UBA
Using Big Data for Cybersecurity
Big Data Analytics for Cyber Security: A Quick Overview
Gov Day Sacramento 2015 - User Behavior Analytics
User and entity behavior analytics: building an effective solution
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together

What's hot (20)

PPTX
Enterprise Sec + User Bahavior Analytics
PDF
Leverage Big Data for Security Intelligence
PDF
Addressing cyber security
PDF
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
PDF
Network Security‬ and Big ‪‎Data Analytics‬
PDF
Data Analytics in Cyber Security - Intellisys 2015 Keynote
PPTX
Cyber Threat Hunting with Phirelight
PDF
The Incident Response Playbook for Android and iOS
PDF
Jisheng Wang at AI Frontiers: Deep Learning in Security
PDF
CTI ANT: Hunting for Chinese Threat Intelligence
PDF
Big Data Analytics to Enhance Security
PDF
Leveraging Threat Intelligence to Guide Your Hunts
PPTX
Operational Security
PDF
Big Data Security Intelligence and Analytics for Advanced Threat Protection
PPTX
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PPTX
Cybersecurity: How to Use What We Already Know
PPTX
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
PPTX
Operationalizing Security Intelligence
PDF
How Machine Learning & AI Will Improve Cyber Security
Enterprise Sec + User Bahavior Analytics
Leverage Big Data for Security Intelligence
Addressing cyber security
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
Network Security‬ and Big ‪‎Data Analytics‬
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Cyber Threat Hunting with Phirelight
The Incident Response Playbook for Android and iOS
Jisheng Wang at AI Frontiers: Deep Learning in Security
CTI ANT: Hunting for Chinese Threat Intelligence
Big Data Analytics to Enhance Security
Leveraging Threat Intelligence to Guide Your Hunts
Operational Security
Big Data Security Intelligence and Analytics for Advanced Threat Protection
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Cybersecurity: How to Use What We Already Know
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Operationalizing Security Intelligence
How Machine Learning & AI Will Improve Cyber Security
Ad

Viewers also liked (20)

PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PPTX
DEFINING BEHAVIORAL ANALYTICS
PPTX
SplunkLive! Frankfurt 2017 - Markant
PPTX
Splunk Discovery Day Hamburg - Data Driven Insights
PDF
User behavior analytics
PPTX
Splunk Discovery Day Hamburg - Security Session
PPT
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
PDF
ツールを用いた脆弱性リスクの管理・低減
PPTX
Enterprise Security and User Behavior Analytics
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PPTX
SplunkLive! Frankfurt 2017 - Vodafone
PPTX
SplunkLive! Frankfurt 2017 - MediaMarktSaturn
PDF
E-Trident 高度なフィルタリング機能
PPTX
Gov & Education Day 2015 - User Behavior Analytics
PDF
SplunkLive! Frankfurt 2017 - DB Cargo
PPTX
R-CISC Summit 2016 Borderless Threat Intelligence
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PDF
UEBA – поведенческий анализ, а не то, что Вы подумали
PPTX
QRadar, ArcSight and Splunk
PPTX
Threat Hunting with Splunk Hands-on
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
DEFINING BEHAVIORAL ANALYTICS
SplunkLive! Frankfurt 2017 - Markant
Splunk Discovery Day Hamburg - Data Driven Insights
User behavior analytics
Splunk Discovery Day Hamburg - Security Session
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
ツールを用いた脆弱性リスクの管理・低減
Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
SplunkLive! Frankfurt 2017 - Vodafone
SplunkLive! Frankfurt 2017 - MediaMarktSaturn
E-Trident 高度なフィルタリング機能
Gov & Education Day 2015 - User Behavior Analytics
SplunkLive! Frankfurt 2017 - DB Cargo
R-CISC Summit 2016 Borderless Threat Intelligence
Orchestrate Your Security Defenses; Protect Against Insider Threats
UEBA – поведенческий анализ, а не то, что Вы подумали
QRadar, ArcSight and Splunk
Threat Hunting with Splunk Hands-on
Ad

Similar to UserEntityandBehaviorAnalyticsFriedman (20)

PDF
Big Data Security Challenges: An Overview and Application of User Behavior An...
PPTX
Footprinting Tasks using Advanced Tools and AI
DOCX
Southwestern Business Administration JournalVolume 16 Is.docx
PDF
Artificial intelligence andCyberSecurity_zhang2021.pdf
PDF
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
PDF
Interset-advanced threat detection wp
PDF
Aujas incident management webinar deck 08162016
PDF
Empowering Cloud-native Security: the Transformative Role of Artificial Intel...
PDF
Empowering Cloud-native Security: the Transformative Role of Artificial Intel...
PDF
Empowering Cloud-native Security: the Transformative Role of Artificial Intel...
PDF
Phishing Website Detection Based on Multidimensional Features Driven by Deep...
PDF
Knowledge brief securonix-ueba-market_2018-spark-matrix
DOCX
Find an article on the internet outline a security breach or cyb.docx
PDF
The Security Challenge: What's Next?
PDF
User and Entity Behaviour Analytics 11.pdf
PDF
Emerging Trends in Digital Forensics and Malware Analysis for Cybersecurity
PDF
Artificial Intelligence and Machine Learning Algorithms Are Used to Detect an...
PPTX
Big Data: 8 facts and 8 fictions
PPTX
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
PDF
IBM X Force threat intelligence quarterly 1Q 2014
Big Data Security Challenges: An Overview and Application of User Behavior An...
Footprinting Tasks using Advanced Tools and AI
Southwestern Business Administration JournalVolume 16 Is.docx
Artificial intelligence andCyberSecurity_zhang2021.pdf
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
Interset-advanced threat detection wp
Aujas incident management webinar deck 08162016
Empowering Cloud-native Security: the Transformative Role of Artificial Intel...
Empowering Cloud-native Security: the Transformative Role of Artificial Intel...
Empowering Cloud-native Security: the Transformative Role of Artificial Intel...
Phishing Website Detection Based on Multidimensional Features Driven by Deep...
Knowledge brief securonix-ueba-market_2018-spark-matrix
Find an article on the internet outline a security breach or cyb.docx
The Security Challenge: What's Next?
User and Entity Behaviour Analytics 11.pdf
Emerging Trends in Digital Forensics and Malware Analysis for Cybersecurity
Artificial Intelligence and Machine Learning Algorithms Are Used to Detect an...
Big Data: 8 facts and 8 fictions
2024 Most Influential Cyber Security Technologies_ A Detailed Recap.pptx
IBM X Force threat intelligence quarterly 1Q 2014

UserEntityandBehaviorAnalyticsFriedman

  • 1. Running head: USER ENTITY AND BEHAVIOR ANALYTICS 1 Even the most well-developed business continuity/disaster recovery (BC/DR) plan contains hidden and/or unknown threats that can compromise an organization’s IT systems. When threats strike, they can have a high-profile and sustained impact on an organization and organizations are adopting IT security products to get on the offensive to detect and containing the threats. According to Gartner research director Eric Ahlm, many IT security teams have used security information management (SIM) or security information and event management (SIEM) technologies, which are able to collect and analyze data. (Paredes, 2015). Using rule-based technology, SIEMs can provide real-time alerts whenever an abnormal event is detected. While SIEM sounds like it would be the only threat detection tool needed, this is simply not the case. According to Bussa, Kavanagh, and Rochford (2016), having SIEM by itself will not improve threat detection rate or reduce the window of discovery. 1 Moreover, SIEMs, are just one piece of the burgeoning security analytics (SA) market. In their SA vendor analysis, Forrester describes a security analytics ecosystem (depicted in the graphic to the right) depicting a market of a variety of technologies, some that of which can be used independently as a platform, while others are complementary products (Blankenship, et. al, November 15, 2016). The term security analytics is often misused and it is important to note that not all products in this market qualify as an SA platform. (Blankenship, et. al, May 9, 2016). SAs use that use data science and machine learning instead of rule-based technology that many SIMs or SIEMs use. Some vendors in the market focus exclusively on the SA techniques, such as network analysis and visibility (NAV) and security and user behavior analytics (SUBA) rather than the standalone SA platform. According to Blankenship et. al (November 15, 2016). NAV provides capabilities to study network forensics, malicious behavior detection, packet capture, and other network-based situational awareness capabilities. SUBA collects user data from a variety of data logs to set a user activity baseline, then using the baseline to detect threats, assess risk scores and allow behavior anomalies to be studied in real time in real time. By using these advanced analytic capabilities, SUBA make profiles of users and traffic patterns, creating a picture of their behaviors and activities over time, and shaping the behaviors as new data sources are provided. (Bussa, Kavanagh, and Rochford, 2016). Expanding on SUBAs, IT security professionals are increasingly turning to User and Entity Behavior Analytics (UEBA) as an analytical technique to discover some of these threats. 1 Illustration provided by Forrester in Blankenship, et al., November, 15, 2016
  • 2. USER ENTITY AND BEHAVIOR ANALYTICS 2 In addition to user behavior, UEBA vendors, such as Fortscale, study entity behavior, studying behavior at the application, device, and server levels. Aside from security management, Litan (2015) identified several other use cases for UEBA. Data exfiltration detection allows companies to monitor anomalies in data transfer; identity access management can be used to monitor user and account behavior against access rights; analyzing contextual behavior information in to assess malicious intent from an insider; as a specialized security tool to manage Software as a Service (SaaS) usage (Litan, 2015). So why are IT executives looking at UEBA? Both Gartner and Forrester describe in detail of the difficulty to detect insider threats. Insider threats are often unexpected, and can emanate from a variety of motivations and intentions. The National Counterintelligence and Security Center states that the most damage U.S. counterintelligence failures over the last century were a result of trusted insider with ulterior motives. At the government level, all federal agencies are being required to institute a insider threat program in place by November 30, 2016 (Blankenship, August 17 2016). On a global level, insider threats were responsible for 39% of all data breaches in 2015 (Blankenship, August 17, 2016) The UEBA market is expected to grown dramatically over the next few years, going from $50 million in market revenue in September 2015 to about $200 million by the end of 2017 (Litan, 2015). Litan notes that may of the UEBA vendors have varying capabilities, and vendors may offer different combinations of Litan’s UEBA functions. Some vendors in this space focus exclusively on insider threats, like Lockheed Martin’s Insider Threat Identification (ITI) tool, which combines unstructured and structured data, performing word searches and other analytics to identify employee risk levels. (Litan, 2015). Other vendors, like Bay Dynamics are more varied in their offerings. Bay Dynamics’ Risk Fabric product inputs from multiple data feeds and then provides alerts of anomalies in privileged user access, vendor behavior, and security policies among others (Litan, 2015). E8 Security also studies anomalies in behavior through the use of multidimensional modeling, and correlating behaviors and relationships (Cser & Blankenship, 2016). Some vendors, like Fortscale and Niara even use unsupervised machine learning algorithms (Litan, 2015). Niara is also somewhat unique in that they offer network forensic techniques like deep packet inspection. Another key differentiator are employee monitoring capabilities. Dtex Systems and SpectorSoft are both able to monitor employee desktop activity providing their client organization with visibility into system activity (Litan, 2015) UEBA vendors even have cloud capabilities. Rapid7’s agentless, SaaS-only, Insight IDR allows companies to investigate security incidents and provide visibility into intruder activities. Insight IDR is compatible with some of the cloud market leaders such as Office 365, Salesforce, and Box (Cser & Blankenship, 2016). Gurucul, which has both cloud and on-premise solutions, uses a cloud analytics engine and is also able to integrate to Office 365, Salesforce, and Box (Cser & Blankenship, 2016). Speaking of Microsoft, they have their own UEBA product: Advanced Threat Analytics, which provides deep packet inspection of Active Directory traffic As an aside, this author is participating in a Business Continuity/Disaster Recovery (BC/DR) course where he is creating a BC/DR plan for convenience food company Acme, Ltd.
  • 3. USER ENTITY AND BEHAVIOR ANALYTICS 3 As part of the plan, UEBA functions would be a great resource for Acme to have. Since Acme is a global company, user access is a concern, especially when it comes to deprovisioning users, so UEBA can be used to check for rogue system or user access. Additionally, the data exfiltration tools would be valuable to ensure that data is not leaving Acme unless authorized by the Office of the CIO and the Security Committee. As with any company, Acme is susceptible to insider threats, which can have devastating consequences for a corporation. According to Blankenship (2016), insiders can use their access for financial gain, to steal intellectual property, or to cause sabotage and destruction. As powerful as the aforementioned capabilities are, UEBA has its limitations. According to Litan (2015), the anomaly detection is not advanced enough to detect filter out suspicious behavior from a user with privileged access. Insider threat detection has to go beyond the technology. Blankenship (2016) states that treating the insider threat issue as a technology problem ignores the human elements of motivation and behavior. . Most importantly, UEBA is not a cure-all product, it needs to be part of a security analytics platform. For IT security professionals exploring UEBA, make sure it can integrate with your existing SA platform. References Blankenship, J. (August 17, 2016) . Hunting insider threats. Forrester. Retrieved from Northwestern University Library access to Forrester on November 18, 2016.
  • 4. USER ENTITY AND BEHAVIOR ANALYTICS 4 Blankenship, J., Balaouras, S., Pollard, J., Kindervag, J., Blackborow, J. & Dostie, P. (May 9, 2016) . Counter cyberattacks with security analytics. Forrester. Retrieved from Northwestern University Library access to Forrester on November 18, 2016. Blankenship J., Balaouras, S., Cser, A., Kindervag, J., O’Malley, C., Barringham, B. & Dostie, P. (November 15, 2016). Vendor analysis: Security analytics (SA). Forrester. Retrieved from Northwestern University Library access to Forrester on November 18, 2016. Bussa, T., Kavanagh, K.M., and Rochford, O. (June 30, 2016). Use SIEM for targeted attack detection. Gartner, G00308086. Retrieved from Northwestern University Library access to Gartner. Cser, A. & Blankenship, J. (September 2, 2016). Vendor landscape: Security user behavior analytics (SUBA). Forrester. Retrieved from Northwestern University Library access to Forrester on November 18, 2016. Litan, A. (September 22, 2015). Market guide for user and entity behavior analytics. Gartner, (G00276088). Retrieved from Northwestern University Library access to Gartner. Paredes, D. (2015) Gartner: Are security analytics key to breach detection - or just hype? CIO (13284045). Retrieved from Northwestern University Library access to EBSCO Academic Search Premier on November 4, 2016.(2015). http://www.cio.co.nz/article/574166/gartner-security-analytics-key-breach- detection-just-hype/ Sqrrl. User + entity behavior analytics (UEBA): The heart of next-generation threat-hunting [eBook]. Retrieved from https://sqrrl.com/media/UEBA- eBook.pdf?submissionGuid=3318e663-e39a-4a33-ba5b-64c7f3800dce on November 4, 2016. Sqrrl. User and entity behavior analytics. Retrieved from Sqrrl’s website on October 25, 2016. URL: https://sqrrl.com/product/user-and-entity-behavior-analytics-ueba/