Don’t call it a SIEM – How USM Anywhere does threat detection and response differently

August 10, 2020 | Rakesh Shah
Rakesh Shah

Rakesh Shah

Rakesh Shah leads product management for the USM products in AT&T Cybersecurity. Previously, he lead product management for insider threat, behavioral analytics, and security orchestration products at Forcepoint, a Raytheon company, and he also spent over 15 years at Arbor Networks in a variety of roles in product management, marketing, and engineering leadership roles. He holds a M.Eng. degree from Cornell University and a B.S. degree from University of Illinois at Urbana-Champaign, both in Electrical and Computer Engineering.

August 10, 2020 | Rakesh Shah

Don’t call it a SIEM – How USM Anywhere does threat detection and response differently

Security Information and Event Management (SIEM) solutions have been the foundation of enterprises’ security operations and threat detection & response.  Even though USM Anywhere has many key SIEM features, it is much more than a SIEM. Why?  To perform threat detection, SIEMs and purpose-built threat consoles collect data from security devices. These include network firewalls, endpoint devices, …