User Behavior Analytics

UEBA: User and Entity Behavior Analytics: ibm.biz/User_Behavior_Analytics
Security starts with your organization, but what if your company has 100, 1000, or even 100,000 users? Identifying suspicious user activity simply can’t be done manually; you need a strategy for finding the “bad guys” who may be undermining your organization from within. In this video, Jeff “The Security Guy” explains how analyzing user (and entity) behaviors with UBA/UEBA tools can help cut through the haze and identify potential threats to your IT security.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #Dev #lightboard #IBM #UEBA

Пікірлер: 12

  • @FreshWillBoy302
    @FreshWillBoy302 Жыл бұрын

    This presentation was explained extremely well. Thank you!!!

  • @ServaneTellouck
    @ServaneTellouck Жыл бұрын

    Great video, great content !

  • @Untap101
    @Untap101 Жыл бұрын

    I come from an ABA background, and a career in IT. This is the most fascinating thing I’ve heard in a long time. I want more content of this.

  • @jeffcrume

    @jeffcrume

    Жыл бұрын

    Thanks for the great feedback, Untap101! Here’s a playlist with all my videos: kzread.info/head/PLdw2bVqUvsk2PnreCdr5uDZ1CjwvQScKe

  • @madebydade305ify

    @madebydade305ify

    10 ай бұрын

    I'm also in the ABA world looking to get into IT.

  • @BeSwee
    @BeSwee Жыл бұрын

    Insightful

  • @litttlemooncream5049
    @litttlemooncream5049 Жыл бұрын

    thanks! helped

  • @atanjacket
    @atanjacket Жыл бұрын

    I feel like you could make a comedy sketch from this: User downloads large log data history to make ML model => User trains new model from accessed data => User goes to upgrade algorithm by loading more data into model => Model notices user accessing more data than normal => User gets fired due to heightened security risk => Model never upgraded again.

  • @tyrojames9937
    @tyrojames9937 Жыл бұрын

    YOU GOT ME!

  • @leowhogoestothedojo8523
    @leowhogoestothedojo8523 Жыл бұрын

    So, create decoy anomalies and get all that has to be done from entities which can function around those anomalies, so the attention will never be drawn to them. And everything appears to fit within the square box.

  • @rb-os4cm
    @rb-os4cm Жыл бұрын

    I think you shouldn't mention "rules" and "machine learning" together. then its not really machine learning, its the traditional rule based system.

  • @Morcap

    @Morcap

    10 ай бұрын

    Although you are correct from a Business Intelligence point of view, technically speaking there is still an initial core set of rules that defines the routine for the clustering of pathways - patterning and especially depatterning (spotting anomalies) -, soo the presenter is not entirely wrong (maybe he should've define what he meant by ''rules'').