Security Operations Platform with Threat Center and Copilot

Security Operations Platform with Threat Center and Copilot - Image by Vilius Kukanauskas on Pixabay
Advertising

Share post

Exabeam's Security Operations Platform gets two new key cybersecurity features: Threat Center and Copilot. The solution combines threat management, investigation tools and automation with a generative AI model.

Threat Center is the first combination in the market to provide a unified threat detection, investigation and response (TDIR) workbench that simplifies and centralizes security analyst workflows. The Copilot feature uses generative AI to help analysts quickly understand active threats and provide best practices for rapid response. These innovations significantly shorten security analysts' learning curve and accelerate their productivity in the SOC. The new features will be available from March 2024.

Advertising

Details from Threat Center and Exabeam Copilot

Threat Center brings together threat management, investigation tools, and automation to investigate and respond to threats faster and more efficiently. Powered by an advanced security-trained generative AI model, Exabeam Copilot improves security analyst research. Using Threat Center with Exabeam Copilot, analysts can

  • Detect when multiple alerts are related to a single threat and uncover everything that is happening.
  • Perform complex, powerful searches in simple, natural language.
  • Understand a threat and respond appropriately using generative AI explanations for clear communication across organizations.
  • Automate routine tasks, uncover hidden threats and significantly reduce response times.
  • Prioritize alerts and cases with contextual risk ranking.
  • Reduce the number of alarms to investigate by grouping detections related to related entities and events.
  • Optimize SOC team collaboration through peer engagement, case escalation, and shared notes.
  • Visualize evidence with interactive threat timelines and instant access to relative data - including behavioral models, users and endpoints.
  • Create automation rules that are critical to SOC workflows, such as: E.g. escalating specific alarms to cases or queues via APIs or webhooks.
  • Use pre-built playbooks that can be viewed, disabled, or cloned for easy customization.

More security for Microsoft Sentinel users

In addition to the new features, Exabeam announced that customers can now add Exabeam's TDIR capabilities to Microsoft Sentinel. This allows Sentinel users to see new threats with more comprehensive insights and automate workflows, as well as ingest data from a wide range of security products and accelerate the TDIR capabilities of their SIEM deployment. The Collector for Microsoft Sentinel joins the list of supported SIEM products such as Splunk and IBM QRadar.

Advertising

Subscribe to our newsletter now

Read the best news from B2B CYBER SECURITY once a month



By clicking on "Register" I agree to the processing and use of my data in accordance with the declaration of consent (please open for details). I can find more information in our Privacy Policy. After registering, you will first receive a confirmation email so that no other person can order something you don't want.
Expand for details on your consent
It goes without saying that we handle your personal data responsibly. If we collect personal data from you, we process it in compliance with the applicable data protection regulations. Detailed information can be found in our Privacy Policy. You can unsubscribe from the newsletter at any time. You will find a corresponding link in the newsletter. After you have unsubscribed, your data will be deleted as soon as possible. Recovery is not possible. If you would like to receive the newsletter again, simply order it again. Do the same if you want to use a different email address for your newsletter. If you would like to receive the newsletter offered on the website, we need an e-mail address from you as well as information that allows us to verify that you are the owner of the e-mail address provided and that you agree to receive the newsletter. Further data is not collected or only collected on a voluntary basis. We use newsletter service providers, which are described below, to process the newsletter.

CleverReach

This website uses CleverReach to send newsletters. The provider is CleverReach GmbH & Co. KG, Schafjückenweg 2, 26180 Rastede, Germany (hereinafter “CleverReach”). CleverReach is a service that can be used to organize and analyze the sending of newsletters. The data you enter for the purpose of subscribing to the newsletter (e.g. email address) will be stored on the CleverReach servers in Germany or Ireland. Our newsletters sent with CleverReach enable us to analyze the behavior of the newsletter recipients. This can include It is analyzed how many recipients have opened the newsletter message and how often which link in the newsletter was clicked. With the help of so-called conversion tracking, it can also be analyzed whether a previously defined action (e.g. purchase of a product on this website) took place after clicking on the link in the newsletter. Further information on data analysis by CleverReach newsletter is available at: https://www.cleverreach.com/de/funktionen/reporting-und-tracking/. The data processing takes place on the basis of your consent (Art. 6 Para. 1 lit. a DSGVO). You can revoke this consent at any time by unsubscribing from the newsletter. The legality of the data processing operations that have already taken place remains unaffected by the revocation. If you do not want an analysis by CleverReach, you must unsubscribe from the newsletter. For this purpose, we provide a corresponding link in every newsletter message. The data you have stored with us for the purpose of subscribing to the newsletter will be stored by us or the newsletter service provider until you unsubscribe from the newsletter and deleted from the newsletter distribution list after you have canceled the newsletter. Data stored by us for other purposes remain unaffected. After you have been removed from the newsletter distribution list, your e-mail address may be stored by us or the newsletter service provider in a blacklist if this is necessary to prevent future mailings. The data from the blacklist is only used for this purpose and is not merged with other data. This serves both your interest and our interest in complying with the legal requirements when sending newsletters (legitimate interest within the meaning of Art. 6 Para. 1 lit. f GDPR). Storage in the blacklist is not limited in time. You may object to the storage if your interests outweigh our legitimate interest. For more information, see the privacy policy of CleverReach at: https://www.cleverreach.com/de/datenschutz/.

Data processing

We have concluded a data processing agreement (DPA) for the use of the above-mentioned service. This is a contract mandated by data privacy laws that guarantees that they process personal data of our website visitors only based on our instructions and in compliance with the GDPR.

“We built Threat Center with Exabeam Copilot to provide security analysts with a simple, centralized interface to run their core TDIR functions, automate routine tasks, and accelerate investigations for analysts of all skill levels,” said Steve Wilson, Chief Product Officer at Exam beam.

“These new capabilities increase the value of our AI-driven security operations platform and take analyst productivity, efficiency and effectiveness to new levels. Threat Center helps security analysts address one of the biggest challenges we've heard from them - dealing with too many fragmented interfaces in their environments. By combining Threat Center with Exabeam Copilot, we not only improve security analysts’ workflows, but also make their jobs easier.”

More at Exabeam.com

 


About Exabeam

Exabeam stands for Smarter SIEM ™. Exabeam enables companies to more efficiently detect, investigate, and respond to cyberattacks so their security and insider threat teams can operate more efficiently. Security organizations no longer have to live with inflated prices, missed distributed attacks and unknown threats or manual investigations and countermeasures. With the Exabeam Security Management Platform, security analysts can collect unlimited log data, use behavioral analysis to detect attacks and automate the response to incidents, both on site and in the cloud. Exabeam Smart Timelines, sequences of user and entity behavior created through machine learning, further reduce the time and specialization required to identify attacker tactics, techniques and procedures. Exabeam is privately funded by Aspect Ventures, Cisco Investments, Icon Ventures, Lightspeed Venture Partners, Norwest Venture Partners, Sapphire Ventures and well-known security investor Shlomo Kramer. More information is available at www.exabeam.com. Follow Exabeam on Facebook, Twitter, YouTube or LinkedIn.


 

Matching articles on the topic

Zero-Trust Architecture – Opportunities & Risks

Trust is good, control is better: The Zero Trust architecture turns traditional security models on their head by checking every access – ➡ Read more

DeepSeek and Qwen are the tools of hackers

Criminals are increasingly exploiting DeepSeek and Qwen, using jailbreaking techniques to create their malicious content to commit financial and information theft. ➡ Read more

Passkeys: Efficient management supports CISOs

New security passkey management solution supports organizations with secure authentication, offering IT complete control over the entire lifecycle ➡ Read more

These are the most important security vulnerabilities and attack techniques

The number of reported security vulnerabilities increased by 2024 percent in 38. With the increasing dependence on software systems, the ➡ Read more

DORA: How financial companies are meeting the challenges

The Digital Operational Resilience Act (DORA) was passed to address the increasing cyber threats in the financial industry and to ➡ Read more

NIS-2 has failed – waiting is still not an option

While other EU countries have long since established clear guidelines for NIS-2, implementation in Germany has failed for the time being. This means that parts ➡ Read more

Policy compliance: Risk assessment is the first step

The implementation of national and European cybersecurity directives can be burdensome for companies and thus affect compliance. ➡ Read more

AI features to predict and prevent IT problems

The manufacturer of an AI-powered observability platform announced an extension of its AI engine Davis AI, which will help companies go beyond reactive AIOps ➡ Read more