The Tug of War Between UBA and SIEM

The Tug of War Between UBA and SIEM


The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics.


Security platforms like data loss prevention, endpoint security and cloud access security brokers (CASBs) will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.


In this issue of Information Security magazine, our experts uncover:

  • The dynamics around UBA and strategies for CISOs going forward
  • What the future holds for standalone UBA tools
  • Key value and use cases to  help you sift through the UBA noise
  • Cloud security data revealed from a recent SANs report
  • Q&A’s with John Germain, Duck Creek CISO and security research expert, Blaine Burnham

And more

01 Dec 2017
01 Dec 2017
26 Page(s)
Already a Bitpipe member? Login here

Download this Ezine!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.