Change Auditor Threat Detection
Forum - Thread List
By reply count
By view count
All recent questions and discussions
Unread questions and discussions
Questions and discussions you've participated in
Questions and discussions you've started
Unanswered questions and discussions
Answered questions and discussions
Questions with suggested answers
There are no posts to show. This could be because there are no posts in this forum or due to a filter.
Blog - Post List
By view count
By comment count
6 Mar 2018
Understanding User Threat Detection With Wine
how pattern-based UEBA models user behavior and reduces false positives and noise in the environment
23 Feb 2018
The benefits of embedded user behavior analytics (UEBA)
Harness the power of user behavior analytics and avoid pitfalls inherent to UEBA solutions. Learn how with Change Auditor Threat Detection.
7 Feb 2018
Modeling User Behavior to Identify Insider Threats
A pattern-based threat detection strategy will drastically reduce the number of false positives and offers a manageable number of actionable alerts. Learn more.
19 Jan 2018
Using Pattern-Based Threat Detection to Identify Suspicious User Activity
Detect suspicious user activity, hackers, intruders, malware, disgruntled employees, rogue users and other insider threats early, save money and time. Learn more.
18 Sep 2017
Detecting Active Directory breaches: How to Focus on the Needles and Not the Haystacks
One thing is for certain – security has never been so scrutinized and publicized as it has these last few years. IT security spending is the highest it has ever been and yet cyberattacks, and the stolen company and customer data that follows, continues to dominate headlines. Just this month as many as 143 million customers were affected by the breach at credit reporting agency Equifax. The worldwide economic impact...
27 Jul 2015
Recovery and Remediation After an Insider Attack A Job for Ben Grimm.
After an insider attack, you need superhuman strength for recovery and remediation. Most of your counterparts say it can take up to a week to bring things back into order, and there's no easy or Fantastic Four way to do it according to the 2015 Insider Threat Spotlight Report. Read the report and see what 500+ of your counterparts say about recovery and remediation from insider attacks and data breaches.