Exabeam Supported Use Cases Compromised Insiders Malicious Insiders External Threats Account ManipulationCloud Data ProtectionCompromised CredentialsData ExfiltrationEvasionLateral MovementPrivilege EscalationPrivileged Activity Abnormal Authentication & AccessAudit TamperingData AccessData LeakDestruction of DataPhysical SecurityPrivilege AbuseWorkforce Protection Brute Force AttackCryptominingMalwarePhishingRansomware