Traditional UEBA vs Behavioral Firewall for Breach and Insider Threat Prevention [Part 2 - Blog Series]

Posted by Heather Howland on Sep 29, 2016 11:55:37 AM

In our Part 1 Series we talked about User and Entity Behavior Analytics (UEBA) and its benefits for better detecting possible breaches and insider threats through user and entity behavior and risk scoring.  Now let’s talk about the differences between traditional UEBA vs the newer UEBA solution, the Behavioral Firewall, which integrates adaptive responses to prevent threats.

Read More

Topics: ueba, Behavioral Firewall, User and Entity Behavior Analytics, Threat Mitigation, Identity Verification

Solving Important IT Security Problems with the Preempt Behavioral Firewall

Posted by Ajit Sancheti on Jun 13, 2016 8:27:00 AM

“Being the founder of a startup is a very unnatural thing to do.”

Those were the words of a board member from my previous company. Most people would rather work in a more established company solving problems they deem challenging, without having to worry about customers, finances, employees, etc.

Read More

Topics: Threat Mitigation, User Behavior, CISO, Behavioral Firewall, Adaptive Response

Threat is Relative. 5 Easy Actions to Mitigate Threats at Work and Play.

Posted by Eran Cohen on Jun 10, 2016 10:30:00 AM

Just recently,  I was talking to a tourist who told me how safe my city was. I nodded and agreed. It took me few more minutes to understand which parts of the city he considered "safe".

Read More

Topics: Threat Mitigation