dcsimg

20 Top UEBA Vendors

SHARE
Share it on Twitter  
Share it on Facebook  
Share it on Linked in  
Email  

Organizations that want to add advanced analytics or machine learning capabilities to their IT security arsenal have a relatively new option: User and entity behavior analytics (UEBA).

UEBA solutions identify patterns in typical user behavior and then pinpoint anomalous activities that do not match those patterns and could correspond with security incidents. UEBA solutions typically do their work after other security solutions have failed, detecting threats inside the network.

Although UEBA solutions have only been around for a few years, they are quickly becoming popular among large enterprises. According to Gartner, sales of standalone UEBA solutions are doubling each year and could top $200 million this year. In addition, many vendors are incorporating UEBA capabilities into other security tools, such as security information and event management (SIEM), network traffic analysis, identity and access management (IAM), endpoint security, data loss prevention or employee monitoring tools. Gartner analyst Avivah Litan predicts that within five years, the standalone UEBA products that survive will evolve into next-generation SIEM solutions, while other UEBA offerings will find their way into other security technologies.

Jump ahead to the product feature comparison chart.

Minimum features of UEBA products

What should a UEBA solution offer? This buying guide includes only standalone UEBA products. It is not comprehensive, but does include the majority of the best-known UEBA products currently on the market.

In order to be included in the buying guide, the UEBA solutions had to provide the following capabilities:

  • Monitor and analyze the behavior of users and other entities
  • Detect anomalous behavior that could indicate an insider attack or compromise of user credentials
  • Use advanced analytics to detect multiple kinds of threats
  • Offer the ability to correlate multiple anomalous activities that could be related to a single security incident
  • Provide real time or near-real time performance

Top UEBA solutions

Solutions are arranged in alphabetical order, along with features we were able to obtain from vendor information. At the bottom of this article is a chart breaking down some of the features of these top UEBA products.

Aruba Introspect

From Aruba (a Hewlett Packard Enterprise company), IntroSpect is an integrated UEBA and Network Traffic Analysis (NTA) solution that uses machine learning to detect, prioritize, investigate and respond to stealthy inside attacks that have evaded traditional perimeter-based security defenses.

Additional Features:

  • Collects and analyzes everything from packets and flows to logs and alerts
  • Detects gestating attacks from malicious, negligent or compromised users, IoT devices, and systems
  • Machine learning models tuned for attack families such as ransomware
  • Stops attacks by integrating with Aruba ClearPass NAC to automatically take policy-based enforcement actions (quarantine, port block, etc.)

Markets and use cases: Large organizations in healthcare, education, finance, legal, oil & gas, government, technology and retail

How Delivered: Appliance and software-only versions

Scalability: No limit

Throughput/Bandwidth restrictions: None, scales horizontally

Pricing: Based on number of entities monitored

READ USER REVIEWS

Dtex Enterprise

Launched in Australia in 2000, Dtex Systems now makes its home in San Jose. It has raised $15 million in funding from Norwest Venture Partners and Wing Venture Capital. Its UEBA platform is its primary product offering.

Additional features:

  • Visualizations
  • Dashboards
  • Forensic audit trail
  • Expert tuning
  • Alert review
  • Integration with third-party solutions available in Platinum edition

Markets and use cases: Corporate security operations teams

Delivery: On-premises software

Endpoints: Unlimited

Throughput/bandwidth limits: None; the Dtex collector sends around 1-2 MB per user to the server per day.

Pricing: The Dtex Signal product, which only provides visibility into user behavior, starts at $2 per user per month. The Enterprise and Platinum versions, which incorporate analytics, have quotes available on request.

READ USER REVIEWS

Exabeam Advanced Analytics

Now four years old, Exabeam offers a SIEM platform that integrates with its standalone products for log management, UEBA, incident response, querying and cloud integration. Headquartered in San Mateo, Calif., it has raised $65 million in funding, including a $30 million round that closed earlier this year. The company's lead investors include Lightspeed Venture Partners and Cisco Investments. According to the firm, Exabeam Advanced Analytics is "the world’s most deployed behavioral analytics platform."

Additional features:

  • Integrates with other Exabeam products and most SIEM products
  • Accepts data from hundreds of different sources
  • Patented session data model
  • Risk scoring
  • Ransomware detection and prevention
  • Session timelines
  • Alert prioritization

Markets and use cases: Any large organization. Exabeam has a special advisory board and programs for federal government agencies.

Delivery: Physical appliance or cloud-ready virtual machine

Endpoints: Unlimited

Throughput/bandwidth limits: None; scales horizontally

Pricing: Quotes available on request

READ USER REVIEWS

Forcepoint Insider Threat

Forcepoint claims that its user behavior monitoring technology has been protecting governments and other organizations for more than 15 years. It was previously known as Websense, which was founded in 1994. It was renamed Forcepoint in 2016 after Raytheon bought the company for $1.9 billion and combined it with the Raytheon Cyber Products and Stonesoft organizations. Forcepoint currently claims more than twenty thousand customers.

Additional features:

  • Distributed architecture
  • Daily consolidated risk scores for individuals
  • Risk prioritization
  • Customizable policies
  • Visualizations
  • Video replay of users' screens
  • Timelines
  • Forensics
  • Agent-based

Markets and use cases: Corporate security operations teams

Delivery: On-premises software

Endpoints: Unlimited

Throughput/bandwidth limits: None

Pricing: Quotes available on request

READ USER REVIEWS

Fortinet FortiInsight

Fortinet's UEBA technology protects organizations from insider threats by continuously monitoring users and endpoints with automated detection and response capabilities. Leveraging machine learning and advanced analytics, FortiInsight identifies non-compliant, suspicious, or anomalous behavior and rapidly alerts any compromised user accounts.

Fortinet acquired ZoneFox, which was covered in an earlier UEBA guide, and that technology is an integral part of FortiInsight. When integrated with FortiSIEM as part of the Fortinet Security Fabric, it provides visibility into data activity and reduces the risk of insider threats or to compliance issues with the likes of GDPR and HIPAA. It includes endpoint behavioral monitoring of devices even when they are off the corporate network and any resources accessed. A rule-based engine identifies policy violations, unauthorized data access, data exfiltration, whether data is being moved to the cloud or onto a local USB device, and compromised accounts.

Additional features:

  • Data streamed securely from the endpoint to the Fortinet data store
  • 5-factor data identification model
  • Lightweight Agent Based Protection
  • Windows OS support
  • Native file system drivers
  • Forensics
  • Network monitoring
  • Federated security

Key markets and use cases: Security operations teams, especially banks, manufacturers and game developers.

Delivery: Hosted solution

Endpoints: Scales well: In 15 days inside one organization, it recorded 130,000 events, 6.4 million user actions, and detected three cloud services used by 16 users, five tools associated with hacking and 14 high-risk users making use of removable storage.

Throughput/bandwidth limits: Consumes less than 0.5% of CPU, 20 MB of RAM memory and 5 KB/s of network traffic.

Pricing: Licensed based on number of endpoints protected, whether the endpoint is a server, desktop, laptop, database server or SharePoint server.

READ USER REVIEWS

Fortscale

Fortscale specializes in user behavior analytics, specifically at analytics designed to counter insider threats. It offers two products: Fortscale UEBA for SOC, which is designed for companies to deploy in their security operations centers, and Fortscale Presidio, a UEBA engine that other security vendors can embed in their products. Founded in 2012 in Tel Aviv, Israel, it has raised $39 million in funding, including a $7 million round that closed in February 2017. Key investors include Blumberg Capital, CME Ventures, Evolution Equity Partners, Intel Capital and Valor Capital Group

Additional features:

  • Integration with DLP and other security solutions
  • Multivariate risk scoring
  • Smart alerts
  • One-click investigation capabilities
  • Alert forwarding
  • Hadoop-based
  • Darknet analysis
  • Agentless

Markets and use cases: Security vendors, organizations of all sizes

Delivery: On-premises software (runs on Linux only) or embedded in other security solutions

Pricing:Quotes available on request

READ USER REVIEWS

Gurucul Risk Analytics (GRA)

Gurucul offers three different types of security analytics: UEBA, identity analytics and cloud security analytics. All are based on its Predictive Identity Based Behavior Anomaly Engine (PIBAE). Details about the company's financials are difficult to come by, but it was founded in 2009 by security veterans who had worked for identity management vendor Vaau, which was acquired by Sun Microsystems and then by Oracle. Its headquarters are in Los Angeles.

Additional features:

  • Large library of machine learning algorithms
  • Fuzzy logic-based link analysis
  • Granular, self-tuning risk modeling
  • Signature-less
  • Modular architecture
  • Transaction scoring
  • Risk-ranked timelines
  • Hybrid behavior analytics that incorporates UEBA and identity analytics
  • Hadoop-based

Markets and use cases: Corporate security operations

Delivery: Appliance, virtual machine, cloud or bare metal

Pricing: Quotes available on request

READ USER REVIEWS

Haystax Technology Constellation Analytics Platform

Headquartered in McLean, Va., Haystax counts employees at many federal government agencies and financial institutions among its 50 million users. According to its website, it also "helped secure the last seven Super Bowls." Founded in 2012, it has raised just $4 million in funding, but it has already made three acquisitions: Digital Sandbox in April 2013, FlexPoint Technology in May 2013, and NetCentrics Corporation in August 2014.

Additional features:

  • Integrated view of insider trustworthiness
  • Bayesian analysis
  • Low rate of false positives
  • Collaborative visualization
  • Threat alerting
  • Asset cataloging
  • Event monitoring
  • Incident reporting
  • Agentless

Markets and use cases: Federal government, financial industry, corporate IT security, public safety

Delivery: Software or cloud-based

Endpoints: Unlimited

Throughput/bandwidth limits: None

Pricing: Quotes available on request

READ USER REVIEWS

Interset

Based in Ottawa, Canada, Interset was previously known as FileTrek and offered cloud-based software for sharing and tracking enterprise content. Over time, the company developed big data analytics and security capabilities, and in 2014, it launched its Behavioral Analytics Platform. Today, the company is solely focused on security analytics and UEBA. It received $10 million in investment funding as Interset and $10 million when it was still known as FileTrek.

Additional features:

  • Scalable to more than 250,000 users
  • Used by multiple U.S. intelligence agencies
  • Flexible, extensible analytics engine
  • More than 200 machine learning models
  • Integrates with most SIEM systems
  • Hadoop-based
  • Optional agent

Markets and use cases: Corporate security operations teams

Delivery: On-premises or cloud

Endpoints: Unlimited

Throughput/bandwidth limits: None (Bandwidth usage is very light)

Pricing: Available on request

READ USER REVIEWS

LogRhythm

LogRhythm UEBA detects known and unknown user-based threats via analytics, applying machine learning and scenario analytics to surface and prioritize critical events. This augments organizational security environments, functioning either as a standalone UEBA product or as an add-on to existing SIEM or log management solutions.

Additional features:

  • Evidence-based starting points for investigation
  • Scoring and prioritizing of risk associated with anomalous user behavior
  • LogRhythm TrueIdentity builds comprehensive behavior profiles
  • Automated user baselining and risk analysis
  • Embedded security orchestration, automation, and response

Markets and use cases: Detection of insider threats, compromised accounts, privilege abuse and misuse, brute-force attacks, new privilege accounts, and unauthorized data access and exfiltration, especially in banking and finance, energy and utilities, healthcare, the federal sector, retail and hospitality.

Delivery: Appliance, software, cloud

Number of Endpoints: Up to millions of endpoints

Throughput/bandwidth limits: Can analyze hundreds of thousands of evidence points per second and store petabytes of data

Pricing: Begins at $115/Identity per year

READ USER REVIEWS

Microsoft Advanced Threat Analytics

In November 2014, Microsoft announced its acquisition of Aorato, a security intelligence startup based in Israel. Before its acquisition, Aorato had received $11 million in equity funding. In 2015, Microsoft added Advanced Threat Analytics to its Enterprise Mobility Suite and also made it available as a standalone product. Somewhat confusingly, Microsoft considers Advanced Threat Analytics part of its Cloud Platform, but the product is available only for on-premises deployment.

Additional features:

  • SIEM integration
  • Attack timelines
  • Mobility support
  • Organizational security graph
  • Email alerts
  • Deep packet inspection
  • Agentless

Markets and use cases: Small businesses

Delivery: On-premises software

Endpoints: Hundreds of thousands supported

Throughput/bandwidth limits: None

Pricing: Quotes available on request and negotiable under various licensing strategies. Estimated price for a standalone license is $80 per user, $61.50 per operating system per year.

READ USER REVIEWS

One Identity Safeguard for Privileged Analytics

One Identity delivers identity governance, access management, and privileged account management solutions. One Identity Safeguard for Privileged Analytics identifies high-risk privileged users, monitors questionable behaviors and uncovers threats using user behavior analytics technology. It provides full visibility into privileged account users and their activities. Organizations can identify risky users, keep a constant lookout for new internal and external threats, and detect unusual privileged behavior. If suspicious activity is discovered, Safeguard enables IT security managers to take immediate action and be well positioned to prevent potential data breaches.

Additional features:

  • Detect threats in real time
  • Pattern-free operation
  • Screen content analysis
  • Behavioral biometrics
  • Reduce Alert Noise
  • Automated Response

Markets and use cases: Organizations having their privileged accounts targeted such as financial services, healthcare, utilities and government

Delivery: Appliance

Endpoints: The focus is on safeguarding a small number of privileged accounts rather than all endpoints.

Throughput/bandwidth limits: Each node can support thousands of hosts.

Pricing: Sold by number of users or number of systems.

READ USER REVIEWS

Palo Alto Cortex XDR

Palo Alto Networks developed Cortex XDR as a detection, investigation and response app that natively integrates network, endpoint and cloud data. It uncovers threats using behavioral analytics, accelerates investigations with automation, and stops attacks before damage is done through tight integration with existing enforcement points.

Additional Features:

  • Targeted attack detection
  • Malware and fileless attack detection
  • Insider threat detection
  • Risky user behavior analysis
  • Malware, ransomware, and exploit prevention
  • Automated alert investigation with root cause analysis
  • Supervised and unsupervised machine learning
  • Custom rule-based detection of attack behaviors
  • Incident response and recovery
  • Post-incident impact analysis
  • Threat hunting
  • IoC and threat intelligence searches

Markets and use cases: Security operations teams

Delivery: Cloud

Endpoints: Can scale to support a virtually unlimited number of endpoints

Throughput/bandwidth limits: Virtually unlimited throughput and bandwidth

Pricing: Based on the amount of data stored for 30 days

READ USER REVIEWS

Preempt

Although founded in 2014, Preempt only emerged from stealth in the summer of 2016. It refers to its UEBA product as a "behavioral firewall," and it also offers an authentication solution and a free password health inspector. The company has raised $10 million in funding.

Additional features:

  • Automated responses to alerts
  • User risk scoring
  • Multi-factor authentication capabilities
  • Event triage and prioritization
  • Incident response
  • Forensic analysis
  • Reduced alerts
  • Integration with other security solutions

Markets and use cases: Corporate security operations teams

Delivery: On-premises software

Pricing: Quotes available on request

RSA NetWitness UEBA

RSA NetWitness UEBA is a purpose-built, big-data driven, user and entity behavior analytics solution integrated as a central part of the RSA NetWitness Platform. By leveraging unsupervised statistical anomaly detection and machine learning, it provides detection for unknown threats based on behavior, without the need for analyst tuning.

Additional Features:

  • Leverages user, network and endpoint behavior profiling
  • Detects abuse and misuse of privileged accounts, brute force attacks, account manipulation and other malicious activities
  • Requires no customization, ongoing care, or rule authoring, creation or adjustment

Markets and use cases:

  • Key markets include financial, retail, local and federal government, higher education and critical infrastructure
  • Use cases include insider threat, brute force, account takeover, compromised account, privilege account abuse and misuse, elevated privileges, snooping user, data exfiltration, abnormal system access, lateral movement, malware activity and suspicious behaviors.

Delivery: Appliance and virtual formats

Endpoints: 100,000 users per server

Throughput/bandwidth limits: As above

Pricing: Based on the total number of employees that have corporate network access. For example, 1,000 to 2,500 users are licensed at $1.50 per user per month, with pricing dropping to a fifth of that for large deployments.

READ USER REVIEWS

Securonix Bolt

Securonix's most recent product, its SNYPR Security Analytics Platform, incorporates SIEM, UEBA and fraud detection capabilities. However, the company also offers a standalone UEBA solution called Bolt. The company was founded in 2008, and has offices in Addison, Texas; San Francisco; Jersey City, N.J.; Los Angeles; Atlanta, Georgia; Vienna, Va.; the UK and India. Securonix says one-third of the Fortune 500 companies use its products.

Additional features:

  • More than 1,000 one-click deploy threat models
  • 350 connectors
  • Visualizations
  • Investigation and response capabilities
  • Fraud reporting
  • Trade surveillance
  • Patient data analytics
  • Threat Model Exchange library
  • Predictive and adaptive learning
  • Integrates with SNYPR Security Analytics Platform
  • Agentless

Markets and use cases: Corporate security operations teams, especially very large enterprises

Delivery: On-premises software or cloud-based

Pricing: Quotes available on request

READ USER REVIEWS

Splunk User Behavior Analytics

Although best known for its log monitoring and analytics solution, Splunk also offers a Hadoop-based UBA solution. Founded in 2003 to support the open source Splunk software, the company now claims more than 13,000 customers, including 85 of the Fortune 100. It is publicly traded under the NASDAQ symbol SPLK, and in 2016 it reported $950 million in revenue. Splunk employs more than 2,700 people and has its headquarters in San Francisco.

Additional features:

  • Security dashboard
  • Hadoop-based
  • Multi-dimensional behavior baseline
  • Integration with Splunk Enterprise and Splunk Enterprise Security
  • Anomaly exploration
  • Agentless

Markets and use cases: Corporate security operations teams

Delivery: On-premises software or as an AWS service

Endpoints:500,000 on a single node (additional scaling possible with additional nodes)

Throughput/bandwidth limits:None

Pricing: Quotes available on request

READ USER REVIEWS

Varonis DatAlert

Founded in 2005, Varonis offers a variety of data management, governance and security products, including its UBA offering called DatAlert. Its focus is primarily on securing companies against insider threats. In its startup days, Varonis raised $28.79 million from equity firms before going public in 2014. Its stock is now traded on the NASDAQ market under the symbol VRNS. In 2016, it reported $164.5 million in revenue. The company headquarters is in New York.

Additional features:

  • Predictive threat models
  • Security time machine
  • Integration with other security solutions
  • Web-based dashboards
  • Alert scoring and prioritization
  • Custom alert criteria
  • Agents for some platforms, agentless for others

Markets and use cases: Corporate security operations teams

Delivery: On-premises software

Endpoints: Not applicable; UEBA occurs on servers rather than endpoints

Throughput/bandwidth limits: None

Pricing: Quotes available on request

READ USER REVIEWS

Veriato Recon

Headquartered in Palm Beach Gardens, Fla., Veriato specializes in employee monitoring solutions, including Recon, its UEBA product. Founded in 1998, the company was formerly known as Spectorsoft. It boasts more than 50,000 customers in more than 100 countries.

Additional features:

  • Simple tuning
  • Behavioral groups
  • Alerting
  • Integration with SIEM and other security solutions
  • Psycholinguistic analysis
  • Screen snapshots
  • Keystroke recording
  • Agent-based

Markets and use cases: Corporate security operations teams and HR departments

Delivery: On-premises software

Endpoints: 200,000 with a single instance

Throughput/bandwidth limits: None

Pricing: Quotes available on request

READ USER REVIEWS

VMware Workspace One

VMware Workspace ONE is an intelligence-driven digital workspace platform that securely delivers and manages any app on any device. By integrating access control, application management and multi-platform endpoint management, Workspace ONE connects siloed tools and teams to improve security of data, apps and devices. Additionally, it helps IT provide a seamless experience for employees who want instant access to all their apps – cloud, native, web and virtual – from anywhere on any device.

Additional features:

  • Unified management for all endpoints
  • Mobile device and app management
  • Modern PC lifecycle management
  • Device-aware access management
  • Simple access to Win32 apps
  • Engaging productivity apps

Markets and use cases:

  • Unified Endpoint Management
  • Simplified Access Management
  • Modern Windows Management
  • Intelligence and Predictive Security Across the Digital Workspace
  • Virtual Desktops & Apps
  • Especially popular with existing VMware users

Delivery: Cloud or on-premises

Endpoints: No limits

Throughput/bandwidth limits: None

Pricing: Starting at $3.78 per device and $6.52 per user

READ USER REVIEWS

UEBA product features comparison

Below is a chart comparing the 20 UEBA vendor solutions:

Top UEBA Vendors
UEBA VendorUse CasesSpecial FeaturesDelivery
ArubaHigh-risk and regulated industriesIntegrated network traffic analysisAppliance and software
DtexSecurity operations teamsForensic audit trailOn-premises software
ExabeamLarge organizations, federal agenciesRansomware detection and preventionPhysical appliance or cloud-ready virtual machine
ForcepointSecurity operations teamsConsolidated risk scores for individuals; video replays of users' screensOn-premises software
FortinetBanks, manufacturers and game developersMonitors endpoints even when off networkHosted solution
FortscaleOrganizations of all sizes; security vendorsDarknet analysis; DLP integrationOn-premises software or embedded in other security solutions
GuruculCorporate security operationsLarge library of machine learning algorithms; fuzzy logic-based link analysisAppliance, virtual machine, cloud or bare metal
HaystaxFederal government, financial industry, corporate IT security, public safetyIntegrated view of insider trustworthiness; low rate of false positivesSoftware or cloud-based
IntersetSecurity operations teamsUsed by multiple U.S. intelligence agencies; more than 200 machine learning modelsOn-premises or cloud
LogRhythmHigh-risk and highly regulated industriesEmbedded orchestration, automation and responseAppliance, software and cloud
MicrosoftSmall businessesMobility support; deep packet inspectionOn-premises software
One IdentityAimed at high-risk privileged accountsReal-time threat detection, behavioral biometricsAppliance
Palo AltoSecurity operations teams seeking broad protectionsAutomated alert investigation, impact analysis, threat huntingCloud
PreemptSecurity operations teamsUser risk scoring; forensics; reduced alertsOn-premises software
RSASecurity operations teams seeking automationUnsupervised anomaly detection and machine learningAppliance and virtual formats
SecuronixSecurity operations teams, especially in very large enterprisesFraud reporting; trade surveillance; patient data analyticsOn-premises software or cloud-based
SplunkSecurity operations teamsMulti-dimensional behavior baseline; anomaly explorationOn-premises software or AWS service
VaronisSecurity operations teams"Security Time Machine" analyzes past data; ransomware detectionOn-premises software
VeriatoSecurity operations teams and HR departmentsPsycholinguistic analysis; screen snapshots; keystroke recordingOn-premises software
VMwareSecurity operations teams seeking broader app and device managementIntegrates access control, application management and endpoint managementCloud or on-premises