Posts tagged User Behavior Analytics

Top Challenges for Security Analytics and Operations, and How a Cloud-Based SIEM Can Help

Detection and Response

Top Challenges for Security Analytics and Operations, and How a Cloud-Based SIEM Can Help

Margaret Wei's avatar

Margaret Wei

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Detection and Response

[Q&A] Why Every Threat Detection Strategy Needs User Behavior Analytics

Christie Ott's avatar

Christie Ott

Universal Event Formats in InsightIDR: A Step-by-Step NXLog Guide

Detection and Response

Universal Event Formats in InsightIDR: A Step-by-Step NXLog Guide

Teresa Copple's avatar

Teresa Copple

Universal Event Formats Q&A: Apply User Behavior Analytics to More of Your Data

Detection and Response

Universal Event Formats Q&A: Apply User Behavior Analytics to More of Your Data

Alex Teng's avatar

Alex Teng

Deception Technology in InsightIDR: Setting Up Honey Users

Detection and Response

Deception Technology in InsightIDR: Setting Up Honey Users

Matthew Graham's avatar

Matthew Graham

2017 Gartner Magic Quadrant for SIEM: Rapid7 Named a Visionary

Detection and Response

2017 Gartner Magic Quadrant for SIEM: Rapid7 Named a Visionary

Eric Sun's avatar

Eric Sun

SIEM Market Evolution And The Future of SIEM Tools

Detection and Response

SIEM Market Evolution And The Future of SIEM Tools

Matt Hathaway's avatar

Matt Hathaway

Want to Try InsightIDR in Your Environment? Free Trial Now Available

Detection and Response

Want to Try InsightIDR in Your Environment? Free Trial Now Available

Eric Sun's avatar

Eric Sun

SIEM Tools Aren't Dead, They're Just Shedding Some Extra Pounds

Detection and Response

SIEM Tools Aren't Dead, They're Just Shedding Some Extra Pounds

Eric Sun's avatar

Eric Sun

User Behavior Analytics and Privacy: It's All About Respect

Products and Tools

User Behavior Analytics and Privacy: It's All About Respect

Joseph Busch's avatar

Joseph Busch

Warning: This Blog Post Contains Multiple Hoorays! #sorrynotsorry

Detection and Response

Warning: This Blog Post Contains Multiple Hoorays! #sorrynotsorry

Sam Humphries's avatar

Sam Humphries

Detect Corporate Identity Theft with a New Intruder Trap: Honey Credentials

Detection and Response

Detect Corporate Identity Theft with a New Intruder Trap: Honey Credentials

Eric Sun's avatar

Eric Sun

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Detection and Response

SANS Review of Rapid7 UserInsight (now InsightUBA) for User Behavior Analytics and Incident Response

Christian Kirsch's avatar

Christian Kirsch

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Detection and Response

Calling Your Bluff: Behavior Analytics in Poker and Incident Detection

Eric Sun's avatar

Eric Sun

Understanding User Behavior Analytics

Detection and Response

Understanding User Behavior Analytics

Tod Beardsley's avatar

Tod Beardsley

Detecting Compromised Amazon Web Services (AWS) Accounts

Detection and Response

Detecting Compromised Amazon Web Services (AWS) Accounts

Christian Kirsch's avatar

Christian Kirsch

R7-2014-01, R7-2014-02, R7-2014-03 Disclosures: Exposure of Critical Information Via SNMP Public Community String

Vulnerabilities and Exploits

R7-2014-01, R7-2014-02, R7-2014-03 Disclosures: Exposure of Critical Information Via SNMP Public Community String

Deral Heiland's avatar

Deral Heiland