Using Advanced UEBA To Detect the ‘Imposter’ Within Your Network

Logo
Presented by

Leonardo Hutabarat, APJ Head of Solution Engineering

About this talk

Security analysts are playing an never-ending game of Mafia when it comes to insider threats. Except, unlike playing a game, failing to mitigate the threat in time will cause serious loss to the company. And there’s no reset button. With such high stakes, it’s crucial that your team is equipped with tools that can capture information to detect when a user is behaving ‘sus’. Join our APJ Head of Solution Engineering, Leonardo Hutabarat, as he guides you through the LogRhythm UEBA (formerly known as CloudAI) module, designed to help you do just that. He’ll go through: - What is UEBA, and why you need it - Use cases of LogRhythm UEBA - UEBA Best practices
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (257)
Subscribers (76939)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com