The Veritas NetBackup Flex User Behavior Analytics App shows important events and analytics for Flex Appliance and NetBackup application instances. It assists security operation teams with detecting user based threats by identifying user activities on NetBackup and Flex appliances that are anomalous and risky. Leverage Veritas and Splunk to provide insights on user behavior in the Veritas NetBackup data protection. With Splunk User Behavior Analytics (UBA), security operations can monitor NetBackup user activity logs to detect actions or patterns that indicate account compromise, malicious insiders, or privileged account abuse. With the continuous monitoring of user activity, organizations can improve security and reliability of disaster and cyber recovery. It includes: • User Behavior Analytics (UBA) Focus: Highlighting risky user behaviors, enabling security teams to detect and respond to potential threats based on user activities and behaviors. • Noise Reduction from Non-critical Events: By filtering out non-critical syslog and application events, the plugin minimizes noise and focuses on actionable security alerts, enhancing operational efficiency. • Automated Monitoring and Response: Automatescritical events monitoring and incident response, empowering security teams to identify and mitigate security threats swiftly and effectively. • Ease of Use: Security administrators are relieved from the burden of learning eventwriting or SIEM rule setup processes, as the plugin offers intuitive configuration options for seamless implementation. • Automated APIs Orchestrations: With automated APIs orchestrations, the plugin facilitates centralized security posture management, enabling seamless coordination and control over security operations. •Security Dashboard: Customized widgets facilitate: • Detection of user-based threats arising from stolen credentials, privilege account abuse, or insider threat activities • Swift assessment of the breach’s impact during cyber recovery incidents • Aid in understanding the effects on the data protection infrastructure
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources