Automatically organize huge volumes of logs into a timeline! ~What is the best way to operate security using UEBA?~
Preventing security incidents and protecting the information assets of the company and its stakeholders is the mission of a company's information security. In recent years, as threats have evolved and become more complex, measures are required on the assumption that threats will invade and even that incidents will occur. On the other hand, the number of security sensors has increased, and as a result, there is a tendency for alert detection, investigation targets, and operational labor to also increase. In this situation, there are not many companies that have established a system that can comprehensively, immediately, and accurately identify and respond to the cause when an incident occurs. In this session, we will introduce how to realize the security operations that companies will require in the future by using log analysis using machine learning and the timeline of patented technology.