The HPE IMC User Behavior Auditor (UBA) Software provides network administrators the ability to audit the behavior of internal users to solve security challenges. In conjunction with the HPE IMC Access Manager (UAM) Software, the IMC UBA Software is built to adapt to network environment changes.
Among the features especially helpful for network administrators are comprehensive log collections and audit functions which digest information from HTTP, FTP, and SMTP packets.
- Provides user data that enhances network security.
- Comprehensive log collection from devices creates safer networks.
- Ability to export and audit log files to examine for threats.
Greater Control Over Internal Threats Creates a More Robust Network
The HPE IMC User Behavior Auditor (UBA) Software audits internal devices and users to protect the network from security threats.
IMC UBA Software analyzes user actions to provide data such as websites visited, applications used, bandwidth consumed on a per device basis.
Analyzes a variety of logs containing information on device vendor, OS, and type, forwarded by devices on the network to better detect device threats.
Handle Uncertainty with Powerful Filtering and Probe Strategies
The HPE IMC User Behavior Auditor (UBA) Software utilizes probes to analyze incompatible network data.
Overcome uncertainty by filtering log packets and matching them against set criteria to determine anomalies to check overall network security.