Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Adopting a User Behavior Analytics (UBA) Solution
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Analytics > Predictive Analytics > Adopting a User Behavior Analytics (UBA) Solution
Big DataPredictive AnalyticsRisk ManagementSecurity

Adopting a User Behavior Analytics (UBA) Solution

Idan Tendler
Idan Tendler
6 Min Read
SHARE

Most large organizations have made a significant investment in trying to prevent cyberattacks from taking place. They have installed numerous detection, monitoring and collection solutions to prevent malicious insiders and external hackers from being able to steal sensitive customer data and valuable corporate IP. What they are now beginning to realize, is that their existing big data repositories are concealing valuable information on potential sophisticated attacks and other security threats.

Most large organizations have made a significant investment in trying to prevent cyberattacks from taking place. They have installed numerous detection, monitoring and collection solutions to prevent malicious insiders and external hackers from being able to steal sensitive customer data and valuable corporate IP. What they are now beginning to realize, is that their existing big data repositories are concealing valuable information on potential sophisticated attacks and other security threats. More specifically, as companies turn their attention from prevention to “detection and response,” they realize that if they can unlock the information stored in their user-related data repositories, they can offer security analysts the much needed context to better understand the alerts and threats they face on a daily basis.

User Behavior Analytics (UBA) is rocking this year’s security conferences. Rather than trying to build an ever stronger perimeter, the discussion has changed substantially.  Security professionals are investing more resources than ever before into collecting and analyzing vast amounts of user-specific event and access logs which holds the promise of major security benefits including the opportunity to:

  • Quickly identify anomalous user behaviors.
  • Investigate a prioritized list of potential threats.
  • Leverage machine learning techniques to isolate evolving threats.
  • Minimize reliance on pre-defined rules or heuristics.
  • Detect and respond to Insider Threats much faster.

The future of UBA is promising, however, with significant interest and hype surrounding the benefits of UBA for both enterprises and large organizations, how can someone begin to incorporate UBA into their existing security infrastructure? Here are three simple steps to get you started:

More Read

How to Begin Analyzing Social Media
How The Museum of Modern Art is Online
Role of Business Intelligence in Process Improvement
IBM Supercomputers Help Law Enforcement Gather, Analyze and Manage Crime Data
Predictive Analytics Presents: A Typical Day in 2020

DEFINING THE PROBLEM

The first step is to define the problem.While every organization suffers from the ongoing threat of an external attack or rogue insider usage, few organizations take the time to identify their unique organizational security characteristics. For example, an organization that has created a “crown jewel” proprietary application that is a critical resource required for their business operations must be sure to capture the behavior of employees who use this application. Determining what are the most important company assets up front, helps ensure that their UBA solution will safeguard the company’s most important resources.

Many UBA prospectors are hoping that after deploying a UBA platform, all of their unanswered questions will miraculously appear as high-rated security alerts. The truth is that UBA works as well as we plan it to work. Planning and defining the problem means that by forming an exact array of questions we plan our UBA to answer, we create a more powerful and precise threat mitigation machine.

IDENTIFICATION

The second step is to identifythe groups of users and the types of information you want monitored. That’s why organizations with well-deployed and defined SIEM appliances are finding UBA a natural fit. Combining a SIEM’s ability to gather all data in one place, and then leveraging UBA to correlate, cross-reference and enrich that data, improves chances of gaining swifter results.

 

IMPLEMENTATION

The third and final step is implementation. There are numerous ways to utilize the collected data into valuable security insights:

  1. Visualization – You will need a range of graphic tools to gain quick insight into the anomalies the numbers are hiding. A simple bar chart might be the best way to visualize employee access attempts and see which accounts are the victim of brute force login attempts. For more complex challenges,  link graphs are often used to identify abnormal relations between users and machines. In most cases, a picture is worth a 1000 words.
  2. Drill-Down – Create a linear investigation process, enabling analysts to ‘grab’ a lead and search pre-defined locations for more relevant data. Defining several investigation processes that yield useful security insights can then develop into a routine monitoring practice.
  3. Aggregate – Achieve even better results by forming summarized data schemes. For example, group security events by different user identities, different time frames and different usage patterns to learn how, when and where users are accessing their data.
  4. Profile – Though requiring more meaningful development and computational resources, profiling is the first step at automating detection and investigation. A functioning profiling engine could save hours in manual investigation and dramatically reduce the number of leads requiring manual inspection.

UBA is not simply something that you set and forget like an appliance, it’s an entirely different way to view and analyze security data. Think of your problem, collect the appropriate data, and establish the relevant tools to gain visibility to the unseen threats lurking inside your network.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

image fx (2)
Monitoring Data Without Turning into Big Brother
Big Data Exclusive
image fx (71)
The Power of AI for Personalization in Email
Artificial Intelligence Exclusive Marketing
image fx (67)
Improving LinkedIn Ad Strategies with Data Analytics
Analytics Big Data Exclusive Software
big data and remote work
Data Helps Speech-Language Pathologists Deliver Better Results
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Clementine is dead, long live PASW Modeller

1 Min Read
AI helps with the growth of OCR technology
Big Data

Data-Driven Companies Leverage OCR for Optimal Data Quality

8 Min Read

Big Data Analytics: Think Differently To Maximize Value

7 Min Read
niche data tactics for business success
Big Data

Niche Data Tactics to Take Your Business to the Next Level

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence
ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?