Exabeam Security Management Platform Reviews & Product Details

Exabeam Security Management Platform Overview

What is Exabeam Security Management Platform?

Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.

Exabeam Security Management Platform Details
Languages Supported
English, Japanese
Product Description

The Exabeam Security Management Platform provides organizations of all sizes with comprehensive, end-to-end detection, analytics, and response capabilities from a single security management and operations platform.

Seller Details
Company Website
4,693 Twitter followers

Overview Provided by:
Show More

Exabeam Security Management Platform Videos

Exabeam Security Management Platform Screenshots

Answer a few questions to help the Exabeam Security Management Platform community
Have you used Exabeam Security Management Platform before?

Exabeam Security Management Platform Reviews

Write a Review
Filter reviews
Showing 3 Exabeam Security Management Platform reviews
Showing 3 reviews
Filter Reviews
Filter Reviews
Sort by
Company Size
User Role
For Category
All Industries
Already have Exabeam Security Management Platform?
Write a Review
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Invitation from G2 on behalf of the seller
What do you like best?

Exabeam a several things going for it. First it is by far the most cost effective platform out there, second the UI is extremely clean and well thought out. Everything you need is usually 1-2 clicks away at max, third Exabeam provides community content. You don't need to spend a fortune if you don't have in-house skills, they constantly release more content for use as part of your subscription. Review collected by and hosted on G2.com.

What do you dislike?

High availability has been an issue for a number of versions. The vendor continues to improve in this area but it's something to examine. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Insider threat is the primary use case, however it works well as a general purpose behavior analytics tool. It's relatively easy to customize for any anomaly detection need you may have. Review collected by and hosted on G2.com.

Show More
Show Less
Validated Reviewer
Review source: G2 Gives Campaign
What do you like best?

Data Lake search language is simple to use. Data Lake hardware is sized properly for fast search results. Analytics engine does a good job of creating a story for each user when investigating. Review collected by and hosted on G2.com.

What do you dislike?

Slow support resolution for parsers without Cloud Connectors. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Purchase Cloud Connectors if you are leveraging SaaS environments as part of your overall IT strategy. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

We are able to leverage the Data Lake as a true repository for security event data without sacrificing search performance with large amounts of data. We are able to leverage the visualizations to enhance OEM reports or supplement the lack of OEM reporting maturity in other tools that are feeding data into the Data Lake Review collected by and hosted on G2.com.

Show More
Show Less
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: G2 Gives Campaign
What do you like best?

Exabeam takes a unique approach for detecting malicious activity. Rules are written so that they apply a score to a user or asset timeline, when these scores reach a certain threshold an analyst should take a deeper look. This approach decreases the amount of meaningless alerts that analysts sift through, and allows detection engineers to write rules that may not indicate malicious activity themselves, but when added together should be investigated. Review collected by and hosted on G2.com.

What do you dislike?

Some of the out-of-the box UEBA rules cause scores for users and assets to soar. This can make it difficult to distinguish real malicious events. This issue is fixed by tuning the out of the box rules to meet what is normal for an organization. Much like other SIEMs/UEBA products don't expect something that you can setup and forget. Exabeam will require your attention to use it to the fullest, however when tuned properly Exabeam is an excellent tool for defenders. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

We are using Exabeam for log aggregation and UEBA. Additionally, we use Exabeam to empower threat hunting activities. Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Exabeam Security Management Platform for G2 to provide buying insight. Below are some alternatives with more reviews:

Sumo Logic Logo
Sumo Logic
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
IBM Security QRadar Logo
IBM Security QRadar
IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solution then uniquely connects the end-to-end chain of activity associated with a single potential incident, and provides prioritized alerts based on severity, helping quickly uncover critical threats while reducing false positives.
Datadog Logo
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
Splunk Enterprise Security Logo
Splunk Enterprise Security
Splunk Enterprise Security (ES) is a SIEM software that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information to enables security teams to quickly detect and respond to internal and external attacks to simplify threat management while minimizing risk and safeguarding business
ActivTrak Logo
ActivTrak is a single-agent, cloud-native behavior analysis solution used to increase productivity, streamline operational efficiency, and harden security. Our software is affordable, easy-to-use, and quick to install.
LogRhythm NextGen SIEM Platform Logo
LogRhythm NextGen SIEM Platform
LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats
Graylog Logo
Graylog is an open source, centralized log management alternative to Splunk. Graylog captures, stores, and enables real-time search and analysis against terabytes of machine data from any component in the IT infrastructure.
Logz.io Logo
Logz.io is a cloud observability platform that enables engineers to use the best open-source monitoring tools in the market without the complexity of operating and managing them at scale. Logz.io offers three products, Log Management built on ELK, Infrastructure Monitoring based on Grafana, and an ELK-based Cloud SIEM. These are offered as fully managed, developer-centric cloud services designed to help engineers monitor, troubleshoot and secure their distributed cloud workloads more effectively.
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
CyberArk Idaptive Logo
CyberArk Idaptive
Today’s new reality requires a new kind of access platform. Built on Zero Trust, Idaptive is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
Show More