Exabeam has announced security posture benchmarking for proactive security within Exabeam Nova, a core agentic AI component of the New-Scale Security Operations Platform.
For the first time, security leaders can anonymously compare their security posture against similar organizations based on configurable parameters like industry, region, and company size.
Powered by the Exabeam Nova Advisor Agent in Outcomes Navigator, the embedded benchmarking capability analyzes threat detection telemetry and configuration data to assess coverage across MITRE ATT&CK techniques and real-world use cases. It then compares performance against peer organisations to deliver continuously updated scores that reflect security operations maturity. This allows SOC teams to identify coverage gaps, prioritize where to improve detection coverage, and assist with assembling leadership-ready updates.
“Security teams are done playing defense. With this release, we’re giving them the tools to go on offense,” says Steve Wilson, chief AI and product officer at Exabeam. “We’ve turned benchmarking into operational data that drives smarter decisions, tighter attack and use case coverage, and faster action. In just six months, we’ve moved from launch to delivering capabilities others are still sketching on whiteboards. This is proactive security in motion.”
Chris O’Malley, CEO of Exabeam, adds: “This release reflects our unbridled commitment to innovation that delivers real, measurable value for our customers. We’re not innovating for the sake of headlines — we’re building capabilities that solve the hardest challenges security leaders face.
“With benchmarking now embedded into Exabeam Nova, we’re empowering our customers to lead with data, drive strategic outcomes, and operate with clarity and confidence. It’s a redefining moment for Exabeam, and for the future of security operations committed to continuous improvement.”
The release also introduces business-aware risk scoring, enabling SOC teams to prioritise threats based on real organizational impact. By customising detection rule severity — low, medium, high, or critical — security teams can reduce alert fatigue, improve triage accuracy, and focus analyst attention where it matters most.