Global cybersecurity leader that delivers AI-driven security operations and has been recognized as a Leader in the Gartner Magic Quadrant

Exabeam, a leading global entity in AI-driven security operations, today announced its designation as a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM), marking the company’s fifth acknowledgment by Gartner (2018, 2020, 2021, 2022, 2024). To download a complimentary copy of the full 2024 Gartner Magic Quadrant for SIEM report, click here.

“Being recognized in the Gartner Magic Quadrant for SIEM for the fifth time is an outstanding accomplishment for us and we believe it is a testament to our team’s relentless focus on delivering innovative security operations advancements,” said Adam Geller, CEO, Exabeam. “The AI-driven Exabeam Security Operations Platform gives our customers the ability to automate, simplify, and accelerate their threat detection, investigation, and response (TDIR) capabilities to stay ahead of attackers and successfully defend their organizations. We are proud to maintain our leadership position in the SIEM market with a differentiated, highly-scalable, cloud-native platform that delivers on what organizations demand today and into the future.”

Per Gartner, “Leaders provide products that are a strong functional match for the market’s general requirements. These vendors have been the most successful at building an installed base and revenue stream in the SIEM market. In addition to providing technology that is a good match for current customer requirements, Leaders show evidence of superior vision and execution for emerging and anticipated requirements. They typically have a relatively high market share and/or strong revenue growth and receive positive customer feedback about their SIEM capabilities and related service and support.”

“Without question, the results of Exabeam’s AI-powered innovation are enhanced by our security-centric expertise and persona-driven approach to TDIR,” said Steve Wilson, Chief Product Officer, Exabeam. “We remain focused on delivering value with AI and helping organizations realize the full potential of their existing security investments. To be recognized again as a Leader in Gartner Magic Quadrant for SIEM remains a very exciting honor to us.”

The Exabeam Security Operations Platform applies AI and automation to security operations workflows for a holistic approach to combating cyberthreats, delivering the most effective threat detection, investigation, and response (TDIR). Since appearing as a leader in the last Gartner Magic Quadrant for SIEM, 2022, Exabeam launched and has continued to innovate on its all-new cloud-native platform. In the past year alone, the company has added more than 400 new product features including Outcomes Navigator, Log Stream, the API developer experience, Threat Center and Exabeam Copilot — a unified workbench for security analysts with generative AI assistance — and much more.

For more information on the AI-driven Exabeam Security Operations Platform, please visit: https://www.exabeam.com/product/.

Source: Gartner, Magic Quadrant for Security Information and Event Management, 8 May 2024.

Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

About Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations. The company was the first to put AI and machine learning in its products to deliver behavioral analytics on top of security information and event management (SIEM). Today, the Exabeam Security Operations Platform includes cloud-scale security log management and SIEM, powerful behavioral analytics, and automated threat detection, investigation and response (TDIR). Its cloud-native product portfolio helps organizations detect threats, defend against cyberattacks, and defeat adversaries. Exabeam learns normal behavior and automatically detects risky or suspicious activity so security teams can take action for faster, more complete response and repeatable security outcomes.

Detect. Defend. Defeat.™ Learn how at www.exabeam.com.

Exabeam, the Exabeam logo, New-Scale SIEM, Detect. Defend. Defeat., Exabeam Fusion, Smart Timelines, Security Operations Platform, and XDR Alliance are service marks, trademarks, or registered marks of Exabeam, Inc. in the United States and/or other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2024 Exabeam, Inc. All rights reserved.

Allyson Stinchfield

Exabeam

ally@exabeam.com

Touchdown PR for Exabeam

exabeamus@touchdownpr.com

The post Exabeam Recognized as a Leader in the 2024 Gartner® Magic Quadrant™ for SIEM, for the Fifth Year appeared first on Cybersecurity Insiders.

In a newly released study from International Data Corporation (IDC) and cybersecurity company Exabeam, research shows companies globally are struggling with visibility when it comes to defending against cyberattacks.

Fifty-seven percent of surveyed companies experienced significant security incidents in the last year that required extra resources to remediate — shining a glaring light on program gaps caused by dedicated but overburdened teams lacking key, automated threat detection, investigation, and response (TDIR) resources. North America experienced the highest rate of security incidents (66%), closely followed by Western Europe (65%), then Asia Pacific and Japan (APJ) (34%). Research for the Exabeam report, The State of Threat Detection, Investigation and Response, November 2023, was conducted by IDC on behalf of Exabeam and includes insights from 1,155 security and IT professionals spanning these three regions.

The findings reveal a significant gap between self-reported security measures and reality. Despite 57% of interviewed organizations reporting significant security incidents, over 70% of organizations reported better performance on cybersecurity key performance indicators (KPIs), such as mean time to detect, investigate, respond, and remediate in 2023 as compared to 2022, and the overwhelming majority of organizations (over 90%) believe they have good or excellent ability to detect cyberthreats. Seventy-eight percent also believe that their organizations have a very effective process to investigate and mitigate threats. These inflated confidence levels are creating a false sense of security and likely putting organizations at risk. A continued lack of full visibility and complete TDIR automation capabilities, which survey respondents also reported, may explain the discrepancy.

“While we aren’t surprised by the contradictions in the data, our study in partnership with IDC further opened our eyes to the fact that most security operations teams still do not have the visibility needed for overall security operations success. Despite the varied TDIR investments they have in place, they are struggling to thoroughly conduct comprehensive analysis and response activities,” said Steve Moore, Exabeam Chief Security Strategist and Co-founder of the Exabeam TEN18 cybersecurity research and insights group. “Looking at the lack of automation and inconsistencies in many TDIR workflows, it makes sense that even when security teams feel they have what they need, there is still room to improve efficiency and velocity of defense operations.”

Secure Operations Are In A Visibility Crisis

Organizations globally report that they can “see” or monitor only 66% of their IT environments, leaving ample room for blindspots, including those in the cloud. While no organization is immune from adversarial advances, the lack of full visibility means that organizations are potentially blind to any advances in those unseen environments.

“Despite having the lowest number of security incidents, APJ reports the lowest visibility of all regions at 62%, signaling that these teams may be missing and failing to report incidents as a result,” noted Samantha Humphries, Senior Director of International Security Strategy, Exabeam. “With business transformation initiatives moving operations to the cloud and an ever-increasing number of edge connections, lack of visibility will likely continue to be a major risk point for security teams in the year ahead.”

TDIR Automation Lags

With TDIR representing the prevailing workflow of security operations teams, more than half (53%) of global organizations have automated 50% or less of their TDIR workflow, contributing to the amount of time spent on TDIR (57%). Unsurprisingly, respondents continue to want a strong TDIR platform that includes investigation and remediation automation, yet hesitation to automate remains.

“As attackers increase their pace, enterprises will have to overcome their reluctance to automate remediation, which often stems from concern over what might happen without a human approving the process,” said Michelle Abraham, Research Director for IDC’s Security and Trust Group. “Organizations should embrace all the helpful expertise they can find, including automation.”

2024 and Beyond’s Greatest TDIR Needs

When organizations were asked about the TDIR management areas where they require the most help, 36% of organizations expressed the need for third-party assistance in managing their threat detection and response, citing the challenge of handling it entirely on their own. This highlights a growing opportunity for the integration of automation and AI-driven security tools. The second most identified need, at 35%, was a desire for an improved understanding of normal user, entity, and peer group behavior within their organization, demonstrating a demand for TDIR solutions equipped with user and entity behavior analytics (UEBA) capabilities. These solutions should ideally minimize the need for extensive customization while offering automated timelines and threat prioritization.

“As organizations continue to improve their TDIR processes, their security program metrics will likely look worse before they get better. But the tools exist to put them back on the front foot,” continued Moore. “Because AI-driven automation can aid in improving metrics and team morale, we’re already seeing increased demand to build even more AI-powered features. We expect the market demand for security solutions that leverage AI to continue in 2024 and beyond.”

The organizations surveyed for the report represent North America (Canada, Mexico, and the United States), Western Europe (UK and Germany), and APJ (Australia, New Zealand, and Japan), across multiple world industries.

The State of Threat Detection, Investigation, and Response 2023 report can be found here.

The post New Study Shows Over Half of Organizations Experienced Significant Security Incidents in The Last Year appeared first on Cybersecurity Insiders.

by Steve Povolny, Director, Security Research at Exabeam

Artificial intelligence, or AI, as it’s commonly known, is all the rage these days. The widespread availability of free generative AI tools like ChatGPT has allowed the technology to be embraced by the average person for many purposes, ranging from responding to emails to updating a résumé, writing code, or even developing movie scripts. While it may seem novel to some, AI has actually been around since the mid-1950s. In the nearly 70 years since then, AI is now rapidly transforming the world – and the security industry is no exception.

Leading this cybersecurity evolution are generative AI and natural language processing (NLP). For security professionals in the SOC, generative AI can create consequential and actionable security content conclusions. NLP, for its part, can greatly improve the user experience for searching, dashboarding, event correlation, and more. There are features of AI that provide benefits to various roles inside the SOC, and the prospect of streamlining or augmenting human capabilities to increase security throughout the enterprise is exciting.

However, there is a dark side to this innovation. Having generative AI search engines so accessible means that many of your employees and customers could be sharing sensitive data into these functions. What many people haven’t considered is, like any other software, AI search engines can be compromised. If and when this happens, it can lead to a major headache for your organization due to the rise in risk – which can be accelerated by insider threats. In this article, we’ll explore generative AI’s role in insider threats, as well as what organizations can do to protect against the dangers.

Same problems, evolving applications

Phishing attacks have plagued organizations since the early aughts when cybercriminals became more organized around the technique of using email to deceive users into clicking malicious links and providing sensitive information or credentials to accounts. Unfortunately, generative AI can make this routinely successful cyberattack even more effective by producing persuasive missives, rendering them nearly imperceptible as fraudulent, and allowing criminals to dramatically improve their rate of success.

Of course, there is great irony in using generative AI in social engineering attacks, too. Typically social engineering relies on human interaction to be carried out, but generative AI can take the human out of the loop, making it harder for unsuspecting victims to determine if they are dealing with a legitimate user who can be trusted. Generative AI has already led to widespread misinformation and the creation of fake profiles on social media. Specifically, deepfake technology, which generates realistic images, videos, or audio content impersonating a trusted individual, can easily manipulate other users, resulting in unauthorized access to information or the transfer of sensitive information that leads to theft or extortion.

We know from experience that threat actors do not lie in wait – they are working quickly to find new schemes and novel ways to compromise people using AI. The best defense is knowledge. Train your staff on being a critical defense layer to your organization. Regard all new employees as vulnerabilities until they are fully trained and aware of policies for proper AI usage in the workplace. Teach them to report suspicions of deep fakes or phishing to security teams immediately, and deploy stronger authentication methods, so that it is more difficult for cybercriminals to impersonate staff. Regarding devices and systems, implementing a rapid and effective patching policy and inventory management systems can provide the awareness and responsiveness needed to deal with modern threats.

Don’t hate the player. Hate the game.

Another issue that we must consider with generative AI is its ability to compromise computing systems through the use of generated artificial data. “Adversarial” generated content can be weaponized to manipulate system behavior, fool advanced classification systems, or launch attacks on systems, leaving an organization vulnerable to a breach, data leak, and other harmful security risks.

Consider, for example, how impactful this situation becomes when combined with faux identities. A generated fake identity, such as an image, video, or social media account could be leveraged to access sensitive information and bypass identity-based security measures.

Taking this a step further, machine learning can be used for progressive evasion of security systems and pose a significant threat, especially when it comes to launching AI-driven malware. AI-generated malware can change swiftly, based on a target or environment – which is exactly what makes it much harder to detect and defend against.

The weaponization of AI works both ways

The good news is that, just as criminals are embracing AI, so are defenders. There are many benefits to using AI for each role within an organization, including security engineers, SOC analysts, and even the CISO. One of those benefits is automation, which empowers security teams by freeing them so they can then focus on more complex tasks, like designing and implementing new security measures.

AI can also identify security incidents more quickly and accurately, making a security analyst’s job easier by eliminating some of the noise associated with false positives. Because of this, an analyst can respond to incidents more effectively and reduce the risk of successful attacks.

Threat hunters can use AI outputs to achieve higher fidelity detections, improve search capabilities and experience, and natural language processing (NLP) can simplify the explanation of complex threats, improving hunting capabilities. SOC managers will understand threats more easily, and use natural language to search, develop playbooks, and generate and interpret dashboards.

Finally, CISOs taking advantage of AI can gain a better understanding of their organization’s security posture and make more informed decisions about where resources are needed to address security incidents and vulnerabilities.

For those of us working in cybersecurity, the growth of attacks using generative AI might be novel – but the constant need to adjust our protection methods in an ever-evolving threat landscape is not. We are accustomed to adapting our approach, improving the technologies, and evolving our defenses to protect from the newest menace. This is what we must do now to address the growing threats of AI-driven attacks. We must invest in research, collaborate with policymakers and other cybersecurity experts, and develop new tools that neutralize malicious uses of AI.

The post Generative AI: The Unseen Insider Threat appeared first on Cybersecurity Insiders.

By Andy Skrei, Sr. Director of Product Management, Exabeam

A recent survey from the World Economic Forum found that 59% of organizations would have difficulty responding to a cyberincident due to shortage of skills. The cybersecurity workforce gap also increased by 26.2% in 2022 compared to 2021 at a time when adversaries are working faster than ever.

Graduation season is almost upon us. As a fresh new batch of cybersecurity graduates enter the workforce, I’d like to offer a few bits of advice.

While it’s not the only way into a career in cyber, it is good to major in relevant fields. The common majors include computer science, computer programming, network administration, cloud computing, information technology management, information security and assurance, computer forensics, and machine learning. Each of these programs provide candidates with insights into what it takes to work in security operations — but it’s not the only route to a successful career in the industry. Some of the best cybersecurity professionals I have worked with do not have specific degrees or certifications, but have a thirst for knowledge and want to defend against adversaries.

I also encourage individuals to look at free resources for learning available online. Websites such as Bugcrowd University, Hack the Box, and Try Hack Me can help budding cybersecurity professionals learn more about the field and put their skills to the test by solving test scenarios.

Meaningful internships are also great to see on resumes. Younger candidates who have worked at technology, cybersecurity, and data-driven companies will typically take preference but it’s never too late to seek out your first internship in cybersecurity. Companies need and want to train you!

Going Beyond Technical Credentials

What distinguishes candidates who will fare well in the high-stress, continually evolving cybersecurity industry? Teams are always tasked with identifying and mitigating threats before they result in issues that harm network, application and data security, and performance – or worse yet, become major breaches that end up in the news.

In addition to technical skills, leading candidates should possess soft skills that will help them adapt and grow in a fast-changing cybersecurity and technology environment, including:

  • Solid communications skills – Cybersecurity professionals need to be able to communicate very technical, and sometimes abstract, concepts to leadership in order to make the right decisions. How one effectively communicates not just what the problem is, but also its impact, can influence the steps an organization takes to mitigate issues and ensure continuity in the future.

  • Demonstrating curiosity – Leading candidates will show a passion for the industry, which will likely manifest in tough coursework, targeted internships, networking and more. Truly motivated candidates may have taken the time to pursue industry certifications during college, such as the Cisco Certified Network Associate (CCNA), Microsoft Certified Systems Engineer (MSCE), Certified Information Systems Security Professional (CISSP), CompTIA Security+. These certifications provide students with exposure to new technology, processes, and enterprise support needs that can give them a jump-start on working in industry. Recruiters will know to target these individuals immediately as high-priority candidates, as gaining these certifications evinces not just technical expertise, but candidates’ determination and commitment to accelerate their growth.

  • Growing analytical skills – Cybersecurity analysts need to be able to think both horizontally and vertically. They must know how threat patterns are changing and affecting their industry, company, and networks. Delving deeper, they must be able to understand the nuances of threat behavior, and what that says about attackers’ motivations, targets, and changing strategies.

  • Fostering teamwork and collaboration – Cybersecurity is a team sport. Individuals who can work well with others will fare the best in fast-growing companies. Recruiters look for candidates who are able to ask questions, consider and synthesize others’ perspectives, work collegially on projects, and enjoy teamwork.

  • Possessing grit and a long view – The cybersecurity industry is incredibly challenging. New hires will probably work long hours, handle expanding responsibilities, and train even greener recruits. Those who flourish in this environment will view the ebb and flow of workers as an opportunity to gain skills and experiences faster than would ordinarily be possible. They’ll be able to build their talent stack, mastering such areas as threat intelligence, incident handling, penetration testing, forensics, and more. Many will also get early leadership opportunities, due to their ability to lean in, take charge of their careers, and build the skill sets needed for cybersecurity management. To screen for grit and a long view, recruiters will ask questions about candidates’ long-term goals and how they went about achieving them. Recruiters can also ask job candidates probing questions to ask if they’ve tackled tough challenges willingly to get desired experience. In this area, non-traditional candidates can often shine, sharing stories of working full-time while gaining a college degree or spending late nights doing online training to bridge the gap with college coursework.

The 2023 graduating class deserves congratulations for successfully navigating not just challenging coursework, but also an ongoing pandemic that strained learning, social relationships, and mental health. As graduates begin to look towards the future, my final piece of advice is to lean into the cybersecurity mission and go all in — doing so might just make you the next best cybersecurity leader.

The post Advice for the Graduating Class of 2023: Qualities of a Modern Day Cybersecurity Professional appeared first on Cybersecurity Insiders.

Exabeam, a global cybersecurity leader and creator of New-Scale SIEM for advancing security operations, announced a groundbreaking cloud-native portfolio of products that enables security teams everywhere to Detect the Undetectable™.

New-Scale SIEM is a powerful combination of cloud-scale security log management, industry-leading behavioral analytics, and an automated investigation experience. Built on the cloud-native Exabeam Security Operations Platform, the New-Scale SIEM product portfolio gives worldwide security teams the greatest fighting chance at defeating adversaries with advanced threat detection, investigation, and response (TDIR). The new product portfolio is generally available (GA) today.

“Security operations teams have faced difficulty defending against complex threats and evolving adversarial behavior because technology innovation has not kept up in the realm where big data meets cybersecurity,” said Michael DeCesare, CEO and President Exabeam. “Exabeam is known for having the best behavioral analytics product on the market — it’s why so many of the world’s largest organizations count on Exabeam every day to help stop adversaries, including the majority now utilizing valid credentials. We are marrying behavior analytics with the world’s most modern, hyperscale, cloud-native data lake to ingest, parse, store, and search data in real time from anywhere. The SIEM industry has been ripe for evolution for some time and New-Scale SIEM represents that evolution.”

Unmatched Performance

Significantly more affordable than competitive offerings, the new Exabeam cloud-native product portfolio is built on an open platform that integrates with more than 500 different third-party products and includes nearly 8,000 pre-built parsers, greatly reducing onboarding, deployment, and run times. An industry-first, security teams can now search query responses across petabytes of hot, warm, and cold data in seconds. Organizations can now also process logs at sustained speeds of over one million events per second.

“The Exabeam Security Operations Platform and portfolio of products are designed like no other on the market. We deliver the single solution security operations analysts can count on to conduct accelerated, thorough threat detection, investigation, and response (TDIR) with the most consistent and successful outcomes,” said Adam Geller, Chief Product Officer, Exabeam. “We provide security teams with a holistic picture of their environment –– data from core security products, IT infrastructure, and business applications joined with critical user and device context and timely threat intelligence data –– to detect what competitive SIEMs simply can’t. In addition to our industry-leading behavioral analytics, we’re proud to deliver world-class security log management and new modular SIEM solutions for organizations at all stages of their data growth and security journey.”

Understanding Normal Behavior to Detect and Prioritize Anomalies

Organizations can use Exabeam to defend against the rising threat of external and internal attacks that in today’s world are more often than not leveraging compromised credentials.

More than 750 behavioral models power 1,200 anomaly detection rules in Exabeam to baseline normal behavior for every user and device. This is beyond anything a legacy SIEM can possibly create with correlation rules. For example, for an organization with basic logging, 20,000 users, and 50,000 assets, Exabeam can dynamically build and update 50 million unique detection rules.

According to the 2022 Verizon DBIR, over 90% of breaches are rooted in compromised credentials. Whether it’s phishing, ransomware, malware, or other external threats, valid credentials have emerged as the adversaries’ primary target. This combined with explosive amounts of data demands a shift in investment from legacy on-premises, rule-based detections to cloud-native SIEM platforms that uniquely understand normal behavior, even as normal keeps changing.

“It’s all about the credentials. Today’s announcement takes Exabeam, our customers, partners, and the SIEM market into an entirely new stratosphere,” said Ralph Pisani, President, Exabeam. “Detecting stolen or misused credentials –– and the abnormal behavior that follows –– is not possible without understanding normal behavior. If you don’t know normal behavior for every single user and device in your environment, understanding abnormal behavior in your organization is a near impossible undertaking –– this is a fundamental capability that only Exabeam can deliver on at scale.”

Whether replacing a legacy product with New-Scale SIEM, or complementing an ineffective third-party SIEM solution by adding the industry’s most powerful behavioral analytics and automation to it, Exabeam can help organizations achieve security operations success.

Exabeam customers are migrating and experiencing the benefits of New-Scale SIEM.

“Exabeam is our holistic security operations platform that provides and coordinates automated visibility, detection, analytics, investigation, and response across our key operating environments,” said Jerry Larsen, IT Security Manager, Patrick Industries. “We have several ERP systems that all need to be protected and Exabeam does the job better than any legacy SIEM we looked at –– we’re excited to be an Exabeam customer and part of their innovation machine.”

“At NEC Australia, securing our data, users, devices and infrastructure are paramount to how we operate as a technology company. Having broad and accurate visibility of our IT environment as well as the ability to recognise what’s normal behavior for our users and entities is key,” said Peter Fröchtenicht, National Service Manager – Security and Compliance, NEC Australia. “Deploying Exabeam’s SIEM has enabled our team to effectively prioritize security alerts, which has freed up time for our analysts to focus on other security tasks, whilst also having a greater understanding of our attack surface and how all our employees interact with our resources.”

New Exabeam products include:

  • Exabeam Security Log Management – Cloud-scale security log management to ingest, parse, store, and search log data with powerful dashboarding and correlation.

  • Exabeam SIEM – Cloud-native SIEM at hyperscale with fast, modern search, and powerful correlation, reporting, dashboarding, and case management.

  • Exabeam Fusion – New-Scale SIEM™, powered by modern, scalable security log management, powerful behavioral analytics, and automated TDIR.

  • Exabeam Security Analytics – Automated threat detection powered by user and entity behavior analytics with correlation and threat intelligence.

  • Exabeam Security Investigation – TDIR powered by user and entity behavior analytics, correlation rules, and threat intelligence, supported by alerting, incident management, automated triage, and response workflows.

Exabeam architected its new security operations platform and New-Scale SIEM product portfolio on Google Cloud (NASDAQ: GOOGL).

“We are delighted that Exabeam has built its platform and portfolio of products on Google Cloud to help more companies securely leverage their data at cloud scale,” said Gerrit Kazmaier, Vice President and General Manager, Data Analytics and Business Intelligence at Google Cloud. “The combination of Exabeam cybersecurity products with Google’s Data Cloud capabilities removes limits on security team productivity, storage, and speed to fully optimize security operations.”

To learn more about the new Exabeam product portfolio, visit the Exabeam website.

About Exabeam 

Exabeam is a global cybersecurity leader that created New-Scale SIEMTM for advancing security operations. Built for security people by security people, we reduce business risk and elevate human performance. The powerful combination of our cloud-scale security log management, behavioral analytics, and automated investigation experience gives security operations an unprecedented advantage over adversaries including insider threats, nation states, and other cyber criminals. We Detect the UndetectableTM by understanding normal behavior, even as normal keeps changing – giving security operations teams a holistic view of incidents for faster, more complete response. Learn more at www.exabeam.com.

Exabeam, the Exabeam logo, New-Scale SIEM, Detect the Undetectable, Exabeam Fusion, Smart Timelines, Exabeam Security Operations Platform, and XDR Alliance are service marks, trademarks, or registered marks of Exabeam, Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2022 Exabeam, Inc. All rights reserved.

The post Exabeam Introduces New-Scale SIEM™ appeared first on Cybersecurity Insiders.