Logrhythm CISOs Investigate User Behavior Analytics Whitepaper 2016
TABLE OF CONTENTS
Table of Contents
INTRODUCTION.......................................................................................................................................................................................................4
A CISO LOOKS AT THE HISTORY OF UBA.....................................................................................................................................................................5
TECHNOLOGY OVERVIEW...............................................................................................................................................................................................8
UBA Core Features...........................................................................................................................................................................................8
A Deeper Dive into UBA..................................................................................................................................................................................9
Key Considerations..........................................................................................................................................................................................9
To Deploy or Not to Deploy.........................................................................................................................................................................10
SELLING TO THE C-SUITE..............................................................................................................................................................................................11
Reducing Potential Losses from a Breach.............................................................................................................................................12
UBA’s Role in the Defense-in-Depth Approach ...................................................................................................................................12
Maintaining Compliance through UBA....................................................................................................................................................13
Staffing Implications.....................................................................................................................................................................................15
When UBA May Have Stopped Real World Breaches............................................................................................................................16
Beyond Security: Other Business Cases for UBA................................................................................................................................17
MARKET ASSESSMENT...................................................................................................................................................................................................19
KEY TAKEAWAYS...............................................................................................................................................................................................................23
First Takeaway – A Win-Win for CISOs.......................................................................................................................................................23
Second Takeaway – Effective Across Industries.....................................................................................................................................25
Third Takeaway – A Natural Fit for Risk-based Security....................................................................................................................26
SUSTAINABILITY........................................................................................................................................................................................................................27
WHEN UBA DOESN’T WORK.........................................................................................................................................................................................29
S U M M A R Y ..................................................................................................................................................................................30
CISO CONTRIBUTIONS...................................................................................................................................................................................................31
Actian Corporation........................................................................................................................................................................................31
A e t n a ................................................................................................................................................................................33
B a r c l a y s ..................................................................................................................................................................................36
I B M ...........................................................................................................................................................................................37
Levi Strauss & Company.............................................................................................................................................................................39
MIAX Options...................................................................................................................................................................................................42
Oppenheimer & Co.........................................................................................................................................................................................44
RWJBarnabas Health......................................................................................................................................................................................47
S u r e s c r i p t s ...................................................................................................................................................................................50
APPENDIX A – COMPLIANCE.......................................................................................................................................................................................53
APPENDIX B – SUPPLEMENTAL INFORMATION & RESOURCES.....................................................................................................................59
APPENDIX C – VENDOR RFIs....................................................................................................
Please complete the form to gain access to this content