@precedent ATA is an abnormal behavior detection product. UEBA
ATA technology detects multiple suspicious activities, focusing on several phases of the cyber-attack kill chain including:
Reconnaissance, during which attackers gather information on how the environment is built, what the different assets are, and which entities exist. Typically, this is where attackers build plans for their next phases of attack.
Lateral movement cycle, during which an attacker invests time and effort in spreading their attack surface inside your network.
Domain dominance (persistence), during which an attacker captures the information that allows them to resume their campaign using various sets of entry points, credentials, and techniques.