Malicious insiders: These attackers are people with authorized and even privileged access to the corporate network who are trying to stage a cyberattack. Data alone—such as log files or records of events—can’t always spot these people, but advanced analytics can. Because UEBA provides insights on specific users, as opposed to IP addresses, it can identify individual users violating security policies.
Compromised insiders: These attackers gain access to authorized users’ or devices’ credentials through phishing schemes, brute-force attacks or other means. Typical security tools might not find them because the use of legitimate, albeit stolen, credentials makes the attacker appear to be authorized. Once inside, these attackers engage in lateral movement, moving throughout the network and obtaining new credentials to escalate their privileges and reach more sensitive assets. While these attackers might be using legitimate credentials, UEBA can spot their anomalous behavior to help thwart the attack.
Compromised entities: Many organizations, particularly manufacturers and hospitals, use a significant number of connected devices, such as IoT devices, often with little to no security configurations. The lack of protection makes these entities a prime target for hackers, who might hijack these devices to access sensitive data sources, disrupt operations or stage distributed denial-of-service (DDoS) attacks. UEBA can help identify behaviors that indicate these entities have been compromised so threats can be addressed before they escalate.
Data exfiltration: Insider threats and malicious actors often seek to steal personal data, intellectual property or business strategy documents from compromised servers, computers or other devices. UEBA helps security teams spot data breaches in real time by alerting teams to unusual download and data access patterns.