User Behavior Analytics

Поділитися
Вставка
  • Опубліковано 30 січ 2023
  • UEBA: User and Entity Behavior Analytics: ibm.biz/User_Behavior_Analytics
    Security starts with your organization, but what if your company has 100, 1000, or even 100,000 users? Identifying suspicious user activity simply can’t be done manually; you need a strategy for finding the “bad guys” who may be undermining your organization from within. In this video, Jeff “The Security Guy” explains how analyzing user (and entity) behaviors with UBA/UEBA tools can help cut through the haze and identify potential threats to your IT security.
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
    #AI #Software #Dev #lightboard #IBM #UEBA

КОМЕНТАРІ • 12

  • @FreshWillBoy302
    @FreshWillBoy302 Рік тому +3

    This presentation was explained extremely well. Thank you!!!

  • @Untap101
    @Untap101 Рік тому +3

    I come from an ABA background, and a career in IT. This is the most fascinating thing I’ve heard in a long time. I want more content of this.

    • @jeffcrume
      @jeffcrume Рік тому

      Thanks for the great feedback, Untap101! Here’s a playlist with all my videos: ua-cam.com/play/PLdw2bVqUvsk2PnreCdr5uDZ1CjwvQScKe.html

    • @madebydade305ify
      @madebydade305ify 9 місяців тому

      I'm also in the ABA world looking to get into IT.

  • @atanjacket
    @atanjacket Рік тому

    I feel like you could make a comedy sketch from this:
    User downloads large log data history to make ML model => User trains new model from accessed data => User goes to upgrade algorithm by loading more data into model => Model notices user accessing more data than normal => User gets fired due to heightened security risk => Model never upgraded again.

  • @ServaneTellouck
    @ServaneTellouck Рік тому +1

    Great video, great content !

  • @BeSwee
    @BeSwee Рік тому +1

    Insightful

  • @leowhogoestothedojo8523
    @leowhogoestothedojo8523 Рік тому

    So, create decoy anomalies and get all that has to be done from entities which can function around those anomalies, so the attention will never be drawn to them. And everything appears to fit within the square box.

  • @litttlemooncream5049
    @litttlemooncream5049 Рік тому +1

    thanks! helped

  • @tyrojames9937
    @tyrojames9937 Рік тому +1

    YOU GOT ME!

  • @rb-os4cm
    @rb-os4cm Рік тому +2

    I think you shouldn't mention "rules" and "machine learning" together. then its not really machine learning, its the traditional rule based system.

    • @Morcap
      @Morcap 9 місяців тому +1

      Although you are correct from a Business Intelligence point of view, technically speaking there is still an initial core set of rules that defines the routine for the clustering of pathways - patterning and especially depatterning (spotting anomalies) -, soo the presenter is not entirely wrong (maybe he should've define what he meant by ''rules'').