How Much Management Do You Need to Dedicate to UEBA? [Part 5 - Blog Series]

Posted by Heather Howland on Nov 11, 2016 4:54:15 PM
Find me on:

In this final blog of the series “A Closer Look Inside UEBA: Top 5 FAQs,” we’re going to discuss what it takes to manage UEBA and how it can make security teams much more efficient and less overwhelmed. UEBA-Efficiency.png

In our last series we talked about how to get started with UEBA and some of the benefits and quick value it can deliver to IT security teams. But let’s get to the heart of what many IT security professionals are concerned about which is around the ongoing management. With too many threats and an increasingly complex security infrastructure, today’s security teams don’t have the time to take on complex projects that are costly from an operational perspective.

Fundamentally, advanced UEBA solutions, like the Behavioral Firewall, were actually built as just that. A solution. As we discussed in the last blog, they don’t sit on top of SIEM like log-based UEBA solutions. It was built for rapid implementation, ease of use, adaptive / continuous learning and automation of threat response and prevention.

Advanced UEBA’s innovation delivers ease in management and operational efficiency because of three key areas: Smart Insights, Integration and Automation.

Smart Insights
  • Learning user behavior used to be a complex endeavor, requiring big data. But as we have learned, more doesn’t mean better. There is more room for statistical mistakes which leads to more false positives. More innovative UEBA is much more effective and actionable with focused smart data that can provide smart insights.
  • With smart insights, must come simplicity. More innovative UEBA solutions focus on delivering insights in a way that is easy to understand, interpret and act upon making it easier for a busy security team to find ways to reduce their risk and improve security.
Integration
  • Integrations needn’t be complex either. With straight-forward API integrations a security team can enhance both behavioral analytics and related 3rd Party solutions. User behavior data can easily be enhanced with additional data sources using APIs to further fine tune a 360 degree degree view of the user. Additional value can also be be added to  to some of your existing SSO and Authentication solutions as well. For example if you’re using Clearpass, Okta, RSA, Duo, SecureAuth or others.
Automation
  • As we have discussed in previous blogs, advanced UEBA, like Behavioral Firewalls, will automate response to suspicious incidents. By reducing the amount of incidents and false positives sent to the security team for follow up, this time consuming manual task that drives up total cost of ownership is removed.
  • Out-of-the-box policies based on security best practices will deliver value to the security team on day one. Policies can be added or further customized if required to further enable the business. Over time, policies automatically adapt on a per user-basis to automatically integrate their changing behavior (like change in role, projects, location, etc.) all without the need of security analyst intervention.

With these three tenets as the foundation for advanced UEBA, it not only drives ease of management but also provides a huge benefit with reduced security overload and overhead. Newer solutions are focused on how to better enable security teams and get more value out of what they have. With more advanced solutions focused more on how to respond to threats, and not pushing more alerts to the SIEM, it truly does make a big impact on team productivity.

This is where an advanced UEBA “solution” like the Behavioral Firewall really shines. It’s not just another tool, it becomes a virtual part of the team.  Whenever it detects unusual or risky behavior it immediately steps into action to verify legitimate or illegitimate activities by users and then actively responds based on the results to respond, block, allow, isolate, and more. By giving time back to the security team, they can be more efficient and follow up on more important investigations.

Topics: CISO, Security Skills, ueba