Written By Josh Linder And Presented By Ziften CEO Charles Leaver
The marketplace for enterprise behavioral analytics is developing – once again – to support the security use case. In the current Gartner User and Entity Behavior (UEBA) Trends Report, Ziften is thrilled to be listed as a “Vendor to Watch.” Our company believe that our recognized relationships with risk intelligence feeds and visualization tools shows our addition within this research study note.
In the UEBA Market Report, Analysts Eric Ahlm and Avivah Litan describe that there is a prospective convergence in the advanced threat and analytics markets. The idea of UEBA – which extends user behavioral analytics to now include companies, business processes, and autonomous devices such as the Internet of Things – needs deep understanding and the capability to react rapidly and efficiently.
At Ziften our recognized relationships with threat intelligence feeds and visualization tools reflects our inclusion within this research study note. Our platform provides threat detection across different behavior vectors, rather than taking a look at a single-threaded signature feed. With integrations to orchestration and response systems, Ziften uniquely couples signature-based and behavioral analysis, while bridging the gap from securing the endpoint to safeguarding the entity. Constant tracking from the endpoint – consisting of network flow – is crucial to understanding the complete risk landscape and important for a holistic security architecture.
We applaud Gartner on identifying four areas for security and analytic vendors to concentrate on: User Behavior, Host/App Habits, Network Behavior, and External Communications Habits. We are the only endpoint supplier – today – to monitor both network habits and external interactions habits. Ziften’s ZFLow ™ utilizes network telemetry to surpass the basic IPFIX flow data, and augment with Layer 4 and Layer 5 operating system and user behavior. Our threat intelligence integration – with Blue Coat, iSIGHT Partners, AlienVault and the National Vulnerability Database – is second to none. Furthermore, our unique relationship with ReversingLabs supplies binary analysis directly within the Ziften administration console.
Eventually, our continuous endpoint visibility service is pivotal in assisting to discover behavioral risks that are hard to correlate without making use of innovative analytics.
6 extra technology trend takeaways which Gartner readers should think about:
– Application of Analytics to Finding Breaches Differs
– Data Science for Analytics Technologies Still Emerging
– The Required for Extended Telemetry Drives Analytics Market Convergence
– Merging Between Analytics-Based Detection Suppliers and Orchestration/Response Vendors Likely
– SIEM Technologies Positioned to Be Central to Consolidation for Analytics Detection
– Advanced Behavioral Analytics Providers Extending Their Reach to Security Buyers
Gartner does not back any supplier, product or service illustrated in its research publications, and does not encourage technology users to pick just those suppliers with the greatest rankings or other classification. Gartner research study publications consist of the viewpoints of Gartner’s research company and should not be interpreted as declarations of fact. Gartner disclaims all guarantees, revealed or indicated, with respect to this research study, consisting of any warranties of merchantability or fitness for a particular purpose.