A war is coming!! A war where not everybody will survive [which is, I guess, the whole point of having a war, eh? :-)] Indeed, I see a high chance of a dramatic SIEM vs UEBA / UBA confrontation in the next 1-2 years – and it will be fun to watch!
The essence of this war is obvious from this visual (sourced from this presentation):
Specifically:
- A better SIEM vendors have acquired (one example), partnerered (two examples) or are building (three or more examples) UEBA capabilities. SIEM MQ nonwithstanding, there are only 3-5 SIEM vendors today that truly matter and all of them are aggressively working on UBA / UEBA projects. So, SIEM is doing [some] UEBA!
- Some UEBA vendors (example, example – there are others) are building SIEM platform features (collection, normalization, storage, etc) and report a growing number of SIEM-less deployments. So, UEBA is doing [some] SIEM!
But Anton, some of you may say, what war? Don’t SIEM vendors partner with UEBA providers? Suuuuure, they do, and some SIEMs treat their UEBA partners as “weird younger brothers” … Still, I hope neither side will be shocked when the other side’s marines land on their shores … and definitely not to “partner” 🙂
Who will win? Well….
Related blog posts about security analytics:
- Next Research: Back to Security Analytics and UBA/UEBA
- Sad Hilarity of Predictive Analytics in Security?
- Security Analytics Webinar Questions – Answered
- On Unknown Operational Effectiveness of Security Analytics Tooling
- My “Demystifying Security Analytics: Sources, Methods and Use Cases” Paper Publishes
- Now That We Have All That Data What Do We Do, Revisited
- Killed by AI Much? A Rise of Non-deterministic Security!
- Those Pesky Users: How To Catch Bad Usage of Good Accounts
- Security Analytics Lessons Learned — and Ignored!
- Security Analytics: Projects vs Boxes (Build vs Buy)?
- Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?
- Security Analytics – Finally Emerging For Real?
- Why No Security Analytics Market? <- important read for VCs and investors!
- More On Big Data Security Analytics Readiness
- 9 Reasons Why Building A Big Data Security Analytics Tool Is Like Building a Flying Car
- “Big Analytics” for Security: A Harbinger or An Outlier?
The Gartner Blog Network provides an opportunity for Gartner analysts to test ideas and move research forward. Because the content posted by Gartner analysts on this site does not undergo our standard editorial review, all comments or opinions expressed hereunder are those of the individual contributors and do not represent the views of Gartner, Inc. or its management.
Comments are closed
6 Comments
Actually i believe most understand that you need both and one may lead to another. It makes sense creating a rule after analytics has discovered an anomali, i think it’s an expantion of the “detection by exploration” capability.
Dario, thanks for the comment. Indeed, you are 100% correct – for now many orgs do use both, but this situation appears unstable and some re-balancing will happen as per this post.
Capitalism and 2nd law of thermo dynamics.
Adapt or die.
Eventually everything is a commodity.
Eventually IDaaS will eat CASB for dinner.
SIEM is only interesting if it integrates with CASB and IDaaS to provide visibility of user activity from a single pane of glass.
Thanks for the comment. This comment (say re: SIEM being interesting) implies a cloud-only world… and it sure isn’t this one 🙂
Anton,
Hasn’t the basic UBA/anomaly detection (not AI based) been present in popular SIEM products for years?
An excellent point indeed. Most SIEM vendors do have some statistics-based detection (some had it for 10+ years), but UEBA seeks to do more sophisticated math and data science (hopefully) and so we will try to understand how to separate it…