User Entity Behavior Analytics (UEBA)
Gain Full Visibility and Control Across Your Environment
Unify logs, network traffic, endpoint telemetry, and cloud signals in a single, correlated view. Eliminate data silos, accelerate threat detection, and streamline investigation by bringing all your security telemetry nto one AI-powered interface — so your team can see more, respond faster, and reduce risk across IT and OT environments.
Automatically DiscoverNew Assets, Profile Users, Identify Their Behavior & Risk
Comprehensive Asset Inventory and Advanced User Analytics:
Dynamically discover assets across networks, endpoints and cloud environments through open extended detection and response Open XDR.
Constantly discover assets from a variety of sources – sensors, logs, host information or 3rd party applications.
Uniquely identify assets with either host names, MAC addresses or IP addresses.
Automatically collect and fuse user-relevant data from multiple data sources across security infrastructure, delivering on the idea of Open XDR.
Enable sophisticated behavioral analytics through machine learning.
Detect bad behaviors without any rules or signatures.
Discover and provide asset/user relationships
Complement the detections with other security capabilities on the platform
Entity Analytics
Beyond SIEM Security
- Assigns a rist score based on observed security events and asset risk profile
- Provides a centralized risk-level view of all assets-network security, cloud secutity and IT security
- Correlates asset information with user, threat, location and vulnerability data through Open XDR
- Provides a kill chain view of security events for each asset
- Offers a panoramic view of lateral movement of attacks around an asset across security infrastructure
- Enables flexible searching or filtering of assets in various ways such as CVEs
- Tags each security event with asset ID
User Centric View
Key Features
Detect User Anomaly Behaviors That SIEM Tools Miss
The UEBA App in Stellar Cyber’s Open XDR platform collects and fuses user-relevant data from a variety of data sources across security infrastructure such as SIEM tools, network traffic, Active Directory logs, and applications like Office 365. It applies sophisticated behavioral security analysis through machine learning. It baselines users’ typical behaviors in order to detect their anomalous activities. It can rapidly detect bad behaviors without the need to write any rules or signatures. Combined with other relevant security events detected with many tightly-integrated security applications such as malware detection, the UBA App can quickly detect malicious users or compromised users
Advanced Asset Management Beyond SIEM Security Thinking
Drive a holistic view and bring together IT security, network security and cloud security. Stellar Cyber’s UEBA automatically and continually discovers and inventories all assets across networks, clients and cloud environments by collecting information from many different sources such as network traffic, logs, endpoints, vulnerability scan results, etc. It provides a unified view of all assets by host name, user, location, device type, manufacturer and many more identifiers. It allows the user to prioritize assets by assigning value to assets, and to group assets by assigning tags. It identifies and alerts analysts to unauthorized assets in a network.
Response at Your
Discretion
Stellar Cyber’s NDR application supports both automatic and manual responses. It can directly block attacks by dropping suspicious traffic on NGFW, disabling affected users on Active Directory, containing compromised endpoints via EDR, or any actions through Restful APIs or flexible scripts. Stellar Cyber’s NDR also supports integration with other SOARs like Phantom, Demisto, Swimlane and more. Powerful Google-like search can quickly nail down the security event. The rich context of the assets allows the asset under investigation to be quickly identified and located.
See Critical Events Through User
Behavior Analysis
UEBA provides a holistic view of all users activities, abnormal behaviors, security events and the associated security risk. Rather than focusing on malware delivery events or data ex-filtration events, for example, the UEBA capability provides a global view of user activity. And, as an integrated security toolkit and by fusing data from variety of sources, the Stellar Cyber platform works with other apps to easily enable analysts to cross-check events to elevate a given user’s risk score.
Jon Oltsik
Senior Principal Analyst and ESG Fellow
Erwin Eimers
CISO of Sumitomo Chemical
Gartner Peer Insights
Director of IT
4.8
Todd Willoughby
Director of Security & Privacy at RSM US
Rik Turner
Principal Analyst, Security and Technology
Central IT Department
University of Zurich