skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

Behavioral analytics, including the next-generation capabilities gathered under the user behavior analytics (UBA) and user and entity behavior analytics (UEBA) banners, offers facilities that analyze patterns of cybersecurity threat activity (human and device/machine).

Highlights

  • To meet enterprise threat detection/protection requirements, behavioral analytics tools must deliver more advanced and automated profiling and exception monitoring capabilities than the previous generation of threat protection tools they currently need to work alongside and will ultimately replace.

Features and Benefits

  • Understand that organizations will benefit from behavior analytics technology that can detect, monitor, and assess threat activity.
  • Understand that organizations will also gain value from behavior analytics solutions that can addresses both external attacks and insider threats.

Key questions answered

  • How will organizations benefit from behavior analytics technology that can detect, monitor, and assess threat activity?
  • How will organizations gain value from behavior analytics solutions that can addresses both external attacks and insider threats?

Table of contents

Summary

  • Catalyst
  • Ovum view
  • Key messages

Recommendations

  • Recommendations for enterprises
  • Recommendations for vendors

Behavior analytics helps detect, monitor, and assess threat activity

  • Real-time threat detection is needed to improve on historic security intelligence failures
  • Previous approaches have mainly focused on analyzing log data

Behavior analytics brings together the use of automated intelligence and machine learning

  • The behavior analytics challenge is to detect and deal with the most pernicious forms of malware
  • Malware never sleeps, nor should real-time threat defenses
  • UBA/UEBA technology is driving the threat detection market forward

Behavior analytics addresses both external attacks and insider threats

  • External attacks start with exploration to find their targets and identify vulnerable machines
  • Data breach timelines and loss needs closer evaluation

The behavioral analytics market is evolving to meet security market demands

  • Standalone behavioral analytics solutions no longer meet the protection needs of the cybersecurity market
  • Progress will involve integration and/or extensions to advanced protection tools and their capabilities
  • Delivering on the promise of end-to-end protection is driving the behavioral analytics market forward

Appendix

  • Further reading
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now