Security Information and Event Management Futures

Size: px
Start display at page:

Download "Security Information and Event Management Futures"

Transcription

1 G Security Information and Event Management Futures Published: 18 May 2012 Analyst(s): Anton Chuvakin, Ramon Krikken Security information and event management (SIEM) is the principal technology used for security monitoring by enterprises today. This assessment predicts the directions for this technology in the next two to three years and highlights five primary trends that will define the SIEM tools of the near future. Table of Contents Summary of Findings...2 Analysis...4 Introduction... 4 Scope... 6 Drivers, Requirements and Use Cases for SIEM... 6 SIEM Challenges Today...8 SIEM Futures: Basic Extrapolations SIEM Futures: The Big Five...13 Expanded Context Data Collection and Analysis...13 Shared, Distributed Intelligence...18 Emerging Environment Monitoring New and Expanded Algorithms for Historical and Real-Time Analysis Application Security Monitoring Using Logs, Context and Other Data SIEM Futures: Wild Cards...31 Strengths...33 Weaknesses...33 Recommendations Recommended Reading...35 Notes... 37

2 List of Tables Table 1. Basic and Advanced SIEM Use-Case Examples... 8 Table 2. Sources of Context Data...15 Table 3. Context Analysis Evolution Table 4. Shared, Distributed Intelligence in SIEM Table 5. SIEM Analysis Algorithm Usage...24 Table 6. SIEM Data Analysis Evolution...26 Table 7. SIEM for Application Monitoring List of Figures Figure 1. Log Maturity Curve Summary of Findings Bottom Line: Enterprise architects have to plan for IT deployments of ever-increasing complexity and deal with increasing threats and risks. These and other trends create the need to expand security visibility throughout the entire stack of IT tools and technologies. Security information and event management (SIEM) is a pivotal technology that currently provides security visibility, and it is likely to hold the same role for the next two to three years. SIEM faces opportunities for growth in five core areas: new types of log and context data, shared intelligence, novel analytic algorithms, monitoring of emerging environments, and application security monitoring. Context: Organizations today use a large set of technologies for protecting, assessing and monitoring their environments. SIEM rises above the rest of the technology that promises to aggregate and unify distinct data feeds and information flows about the state of security. SIEM technology has evolved over the last 15 years, but its future will be determined both by its history and by the currently rapid pace of technological changes. Take-Aways: SIEM tools have been, and are expected to remain, a central point for security monitoring within enterprises. Almost all SIEM deployments are driven by information security and regulatory compliance, with a reported 70% of projects motivated by compliance mandates. Many compliance-driven deployments later evolve to encompass both regulatory issues and security issues that the organization deems important. This situation is expected to persist. It is likely that SIEM will evolve down two separate paths: Enterprise SIEM for more advanced users (and more advanced uses) will evolve separately from a "mainstream" SIEM for the organizations that are lower on the maturity scale and have simpler requirements. Page 2 of 38 Gartner, Inc. G

3 SIEM is a security technology, but it is also a data management technology. In addition to being a data management technology, SIEM is inherently a data analysis technology. This will continue to drive its evolution. Some of the basic extrapolations will continue; these include more log data, more log sources and more types of log data; more environments covered by SIEM; expansion of SIEM use cases; and more SIEM users, both in number and of different types. Five major trends that will define SIEM for the next two to three years are: Expanded context data collection and analysis Shared, distributed intelligence Emerging environment monitoring: virtual, cloud and mobile New and expanded algorithms for historical and real-time analysis Application security monitoring using logs, context and other data Recommendations: Integrate context data into SIEM analytics today to prepare for the future. Organizations should integrate asset and user information and identify use cases where SIEM value can be enhanced by adding such information. At the very least, integrate asset and vulnerability information into your SIEM tool so that internal Internet Protocol (IP) addresses can be mapped to actual computing resources and their security weaknesses. Evaluate your current SIEM product ability to use and share global intelligence, and integrate some of the open-source blacklists into the dynamic watch lists on your SIEM. At a minimum, enable correlation rules and alerts to trigger for any of your systems that are initiating connections to known compromised systems and botnet control servers. Before evaluating and deploying capabilities of SIEM tools and other monitoring solutions, organizations need to realize that newly emerging IT environments must be covered by security monitoring. The need assessment in this case has to come before the tools are ready and can be operationalized. After establishing the base level of SIEM utilization, focus on exploring the data collected and looking for valuable security insights. Use algorithms provided by the vendors and assess their efficiency. If your organization outgrows those algorithms, then look at building capabilities that go beyond what the vendor offers other leading organizations are taking this approach. Realize that analysis of stored data will be required for detecting advanced attacks; simply running reports and queries will not suffice. At least look for the characteristics of normal user and system behavior over time and then slowly move to alerting based on deviations from such behavior, starting from tightly controlled networks (such as the demilitarized zone [DMZ] network segment). Gartner, Inc. G Page 3 of 38

4 Expand your SIEM deployment from infrastructure to application security monitoring. Try using your SIEM capabilities before moving to dedicated monitoring products. Still, be aware that SIEM technology today is not ready to take over all application security monitoring tasks, so application- or domain-specific monitoring tools will likely be needed for some tasks. Conclusion: Despite its success, SIEM technology must continue to evolve to stay relevant in the near future. Organizations need to prepare their own security monitoring projects for future requirements and challenges and build a lasting security monitoring architecture. Analysis SIEM tools have been, and are expected to remain, a central point for enterprise security monitoring. Preventative security controls such as intrusion prevention systems (IPSs) and Web application firewalls (WAFs) actually block attacks and protect data. But today's enterprise security is increasingly ineffective without visibility across systems, networks, applications, users and security controls. To gain visibility into environments, channel-specific monitoring technologies such as data loss prevention (DLP) and Database Audit and Protection (DAP) are increasingly deployed alongside common preventative controls. Still, SIEM and related log management tools should often serve as both the primary visibility mechanism for security monitoring and a reporting hub for the organization. Introduction Gartner defines SIEM technology as a unification of two broad capabilities: 1. Log management and compliance reporting 2. Real-time monitoring and incident management for security-related events In particular, the first: provides log management i.e., the collection, reporting and analysis of log data (primarily from host systems and applications, and secondarily from network and security devices) to support regulatory compliance reporting, internal threat management and resource access monitoring. [It also] supports the privileged user and resource access monitoring activities of the IT security organization, as well as the reporting needs of the internal audit and compliance organizations. 1 On the other hand, the other side of SIEM: Page 4 of 38 Gartner, Inc. G

5 processes log and event data from security devices, network devices, systems and applications in real time to provide security monitoring, event correlation and incident response. [It also] supports the external and internal threat monitoring activities of the IT security organization, and improves incident management capabilities. 1 These components may be delivered as a single product or as a suite of products with various degrees of integration. Nearly all current SIEM vendors deliver both types of capabilities. Some vendors' strengths are in the real-time monitoring domain; others excel in log management and historical analysis. For additional coverage of SIEM vendors, see the Gartner documents listed in the Recommended Reading section. SIEM technology first appeared in the late 1990s and was driven by the need to suppress "false positive" alerts in intrusion detection systems (IDSs). Many years prior to that (starting with the very dawn of computer age), technical professionals already analyzed logs for security purposes. Simple scripts and tools that helped make use of log data existed in the 1980s, and some even predate syslog logging mechanisms. SIEM tools have evolved over the last 15 years to achieve the "top of the pyramid" status for security monitoring; they have even started dabbling with security management and automated response. A notable boost to SIEM evolution came from the regulatory frenzy of the early 2000s. Sarbanes- Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA) and Payment Card Industry Data Security Standard (PCI DSS) have made SIEM one of the most common compliance technologies, and they now drive a large percentage of all deployments. This was the time when the distinction between security event management (SEM, which focused on real-time monitoring) and security information management (SIM, which focused on reporting) was relevant; it is increasingly less relevant today. In parallel, SIEM started as a technology applicable only inside the security operations center (SOC) of the global enterprise, and it has evolved (with some degree of success) to become useful to companies that are lower on the security maturity scale. Currently, greater complexity of IT environments and regulatory pressure increase the scope of log data collection from network security devices to a much broader set of log sources. In addition, many types of context information have been absorbed in SIEM. SIEM has adapted to such increasing complexity by becoming more complex itself, and additional monitoring technologies have appeared. Gartner, Inc. G Page 5 of 38

6 Scope The scope of this assessment is the following: SIEM technology The time frame of two to three years and up to five years in specific areas The current state of SIEM is not covered in this assessment (see the Recommended Reading section for documents that discuss this). This assessment focuses on the technological evolution, not the evolution of the SIEM market. Similarly, this assessment is not about the future of all security monitoring technologies (see "Security Monitoring" for broad coverage of other monitoring technologies). Drivers, Requirements and Use Cases for SIEM Before analyzing and predicting SIEM futures, it makes sense to briefly assess its present state. Almost all current SIEM deployments are driven by information security and regulatory compliance, and Gartner research indicates that nearly 70% of deployments are funded due to compliance mandates. As a result, most SIEM use cases concentrate around the following domains: Threat management and other security issues such as security monitoring of users, systems, applications and data (either within the bounds of an SOC or not and either in real time or via periodic activity review and reporting) Regulatory and policy compliance, activity review, log data retention and reporting Many compliance-driven deployments evolve to encompass both regulatory issues and security issues that are deemed important by an organization but not prescribed by any external guidance. As such, many organizations end up utilizing both historical reporting and real-time analysis functionality, although in many compliance deployments, log management and reporting remains the dominant feature, and real-time monitoring functionality is used sparingly. A distant third driver is IT operations in the form of unified monitoring of security, performance and availability issues. Select vendors, such as Splunk and SumoLogic, focus on operational log management use cases, which in essence makes them concentrate on log management for operations personnel. However, an entirely separate class of products called IT Event Correlation and Analysis exists in parallel to SIEM's real-time correlation on the operational monitoring side. A brief discussion on a possible convergence of security-focused and operations-focused monitoring tools can be found in the SIEM Futures: Wild Cards section. As of today, these tools exist in separate silos with scarce data exchange in either direction. At a high level, threat management and compliance use-case categories are expected to persist in the two- to three-year timeline and likely much longer. In 2011, Gartner defined six critical SIEM capabilities: SEM: This capability provides real-time monitoring and analysis of threats and other security events, and it is important for threat management. Page 6 of 38 Gartner, Inc. G

7 User monitoring: User activity monitoring is needed for targeted attack discovery and compliance reporting. The inclusion of user context in event analysis is a prerequisite for exception monitoring. Data monitoring: Data access monitoring and the inclusion of data context are needed for targeted attack discovery and compliance reporting. Application monitoring: Application activity monitoring, when combined with user context, is needed to support fraud detection use cases and compliance monitoring in some industry verticals. Log management and reporting: Log management has become part of the standard of due care for many regulations. Compliance-oriented deployments are simplified when the SIEM product provides a library of regulation-specific and customizable predefined reports. Securityoriented deployments require exception reports for user and resource access. Deployment and support simplicity: The majority of enterprises that deploy SIEM technology have project and support capability constraints that favor ease of deployment and support. These capabilities are expected to define the core of SIEM tools for the next two to three years. SIEM platforms will continue to become simpler so that the technology can be deployed and managed by smaller, less skilled security teams. Also, SIEM will have to continue to expand the log source integrations to better cover DLP, DAP, file integrity monitoring (FIM) and other security technologies. At the same time, SIEM has to become smarter to better handle advanced threats, including application-level threats configuring SIEM rules for anything exceeding the most basic of threats is already a challenge. Furthermore, the technology will have to handle an ever-increasing volume of data, which will create additional requirements for the SIEM platform's compute and storage infrastructure. Gartner, Inc. G Page 7 of 38

8 Table 1. Basic and Advanced SIEM Use-Case Examples Compliance Use-Case Types Threat Management Use-Case Types Niche Use-Case Types Basic Use Cases Collect and retain log data as prescribed by a regulation Run canned reports and review them occasionally Enable vendor-prescribed correlation rules mapped to a regulation Enable vendor-recommended correlation rules for common threats Use correlation rules to look for compromised login accounts Establish a response process using a built-in case management module Run reports weekly and review them for malicious activities Perform searches across raw data for suspicious IP addresses N/A Advanced Use Cases Create correlation rules for local policy violations and regulatory issues Define reports for each regulation as well as for cross-regulatory control and distribute to all stakeholders using a SIEM tool Establish daily log review procedures and practices to comply with regulations Use pattern discovery tools and visualization tools to look for hidden threats Profile user behavior using log data and look for anomalies by comparing user behavior with others Define models for common attack traces and test them on historical data Correlate log data with flow data and asset context data to find compromised assets Include global threat feeds and create correlation rules for relevant events using global data Analyze application transactions to find fraud and suspicious transactions Correlate physical access control systems and location context information with IT data to find insider abuse and unauthorized access Monitor industrial control systems for anomalies Source: Gartner (May 2012) Additional capabilities might evolve from being a niche capability to being a core capability in the near future. For example, Gartner predicts that, in the future, SIEM tools will enable better security information sharing across the community, which is a niche capability today. In addition, SIEM will likely evolve down two separate paths: Enterprise SIEM for more advanced users (and more advanced uses) will probably evolve separately from a mainstream SIEM for the less demanding or less mature organizations. Finally, although it is impossible to list all future SIEM requirements given the rapidly evolving IT landscape, this assessment will outline key trends and directions for SIEM evolution in order to prepare security professionals for continued effective SIEM deployment and operation. SIEM Challenges Today Security information and event management evolution will be in part driven by the challenges it faces today. Page 8 of 38 Gartner, Inc. G

9 The primary challenge with SIEM today is its complexity. This results in some organizations becoming stuck in the initial phases of deployment or even failing outright. Reaching full SIEM potential even when measured against individual organizations' SIEM goals is a difficult task. This SIEM complexity has three aspects: Deployment complexity Administration complexity Operations complexity Some of this complexity is inherent to SIEM and connected to its technology mission. After all, SIEM has to connect to many enterprise systems, and many of these systems are themselves complex. In addition to the mere connection, SIEM must often also implement event correlation rules and analyze the data across the data feeds from these systems, which increases the challenge. Complexity of managing and administering SIEM (and not just monitoring it 24/7) has led many organizations to outsource their security monitoring to a managed security service provider (MSSP) or to choose managed SIEM options. When deploying IT resources in public cloud environments, organizations that favor outsourcing might even choose a cloud services provider (CSP) that is also an MSSP and thus have the same organization host and monitor its systems (see "Security Monitoring of Public Cloud Assets"). SIEM is a security technology, but it is also a data management technology for a specific type of data. The amount of data that organizations handle is increasing and this applies to security data as much as it does to business data. Many of the architectural decisions made by the SIEM vendors in the late 1990s (such as heavy reliance on relational databases for event retention or assuming that the customer already runs an SOC with analysts watching the screens 24/7) are hampering progress. These decisions affect SIEM technology today by limiting the amount of data SIEM can handle in a cost-effective manner and steering customers toward workflows that they cannot handle. Furthermore, many legacy SIEM systems are also optimized for real-time analysis and do not perform well for long-term historical reporting and other data analytics. But some of the security challenges of advanced attacks today call for a wider analysis window not hours but days, and not days but weeks and months in specific cases. Emerging attention to "big data" will likely influence SIEM in the near future, and it will particularly affect architectures related to data collection, normalization, storage, processing, retrieval, and even presentation and analytics. The data management aspects of SIEM cover multiple types of data not only timed records (logs), but also many types of context data, which today is mostly utilized for improving the analysis of log data. Thus, SIEM is also a data integration technology that is supposed to tie multiple types of data together to provide a better, more actionable picture of IT reality. DAP and DLP tools will need to feed the results of their analyses into a SIEM system. See "Enhancing Security and Gartner, Inc. G Page 9 of 38

10 Compliance With Database Audit and Protection" for DAP details and "Data Loss Prevention" for DLP details. In addition to being a data management technology, SIEM is also a data analysis technology. Network management tools have long been used to perform real-time correlation of network events; business intelligence and data-mining tools have also been known for a long time. SIEM technology combines the features of some of these technologies. Today's tools vary in the degree of "intelligence" built into them: Some vendors will unabashedly call an ability to run SQL queries an intelligence feature, whereas others will deliver advanced pattern discovery algorithms. Still, today's SIEM tools are challenged to provide immediately usable, actionable signals without extensive customization, tuning and in-depth IT environment knowledge. SIEM also started as a near real-time technology, often marketed as real-time analysis of security data or even "real-time security awareness." Many an organization's journey to SIEM started from an attempt to perform real-time security event analysis before taking care of simple log collection. As of today, more organizations are following a logical maturity curve: Start from collection, next run reports, and eventually migrate up to real-time alerting. At the same time, recent advanced threats have led to increased pressure for historical data analysis. Real-time event correlation and other event stream analytics need to be enhanced by the ability to analyze historical data for actionable information and bring this discovered information to the attention of the analysts. Such a "morning after" monitoring model is a vast improvement over breach discovery by a third party months after an incident. Therefore, SIEM tools need more algorithms for historical data analysis that focus on discovering actionable insights from stored data. Figure 1 shows an example of a maturity curve. Page 10 of 38 Gartner, Inc. G

11 Figure 1. Log Maturity Curve Log Monitoring: Security information is monitored in near real time. Log Review: Logs are collected and reviewed daily (delayed monitoring). Log Reporting: Logs are collected, and reports are reviewed every month. Log Investigation: Logs are collected and looked at in case of an incident. Log Collection: Logs are collected and stored, but never looked at. Log Ignorance: Logs are neither collected nor reviewed. Source: Gartner (May 2012) As IT is affected by trends such as virtualization, cloud computing and consumerization, SIEM has to evolve to keep its relevance as the key technology for resource monitoring. Each of the newly emerging environments brings up its own challenges with security monitoring (see "Security Monitoring of Public Cloud Assets"). Finally, SIEM technology promised the proverbial "single pane of glass" for security monitoring. In most organizations that are utilizing SIEM tools, this promise has not been realized, and it is unlikely to be realized in two, three or even five years. Yes, SIEM can integrate many types of data, but clearly, other tools will be needed to perform additional, focused analysis for specific domains. For example, network flow analysis tools will not offload their highly specialized analytics of flows and packets into SIEM (even though some SIEM tools do their own flow analysis), but they will keep providing the analysis results up to the SIEM console (see "Network Behavior Analysis: Moving Beyond Signatures" for details on network anomaly detection). In addition, security investigators will continue digging into other types of data stores raw network traffic, memory contents, disk images and virtual machine snapshots in search for answers. Gartner, Inc. G Page 11 of 38

12 SIEM Futures: Basic Extrapolations Before highlighting the five major driving trends that will determine SIEM's future over the next two to three years, it is worthwhile to highlight some of the basic extrapolations that will be in place in the future, just as they were in the last five years or so. These extrapolations are: More log data, more log sources and more types of log data collected by SIEM tools More networks and environments covered by SIEM Expansion of SIEM use cases More SIEM users, both in number and in type "More log data, more log sources and more types of log data going into SIEMs" is an easy prediction to make: Volume and diversity of data are both on the track for higher increases. Unfortunately for many of the SIEM vendors, most of the common log sources (sometimes called "devices," even though many are software-only log sources) are already integrated, and what remains is a "long tail" of log source support with "the next 10,000" instead of "the next 10" log sources to integrate. In addition, new types of logs such as runtime software traces may start coming into SIEM tools. In general, organizations that found early success with SIEM tools will expand coverage to more networks: from DMZ to inside and from critical to less critical networks. This will result in increasing log flows, higher volumes of context data and an increase in the number of nodes reporting into SIEM. "Expansion of SIEM use cases" is also a likely extrapolation: More organizations will be expanding from compliance to a combination of compliance and threat management. Some of the niche use cases (such as fraud) may start expanding into broader populations of organizations. See Table 1 for additional examples. Another prediction is an increased population of SIEM users, in terms of both number and types. SIEM has expanded beyond its original use by security analysts to broader audiences, which range from system administrators to (in rare cases) auditors and chief security officers. SIEM technology delivered as a service or via managed or hosted models will further increase the number of SIEM users. As a result, SIEM vendors will have their hands full solving the challenges of yesterday and today while adapting the tools to changing IT realities, all while the amount of log data increases. To make this challenge even more difficult, all this has to be achieved in a manner that is consumable by less mature users and buyers. This is why there may be no other choice but for the SIEM tools to evolve in two directions: advanced tools that grow more advanced in analytics capabilities and basic tools that grow mostly in ease of use. Page 12 of 38 Gartner, Inc. G

13 SIEM Futures: The Big Five The following five principal trends will drive the evolution of security information and event management in the next two to three years, and possibly up to five years: Expanded context data collection and analysis Shared, distributed intelligence Emerging environment monitoring: virtual, cloud and mobile New and expanded algorithms for historical and real-time analysis Application security monitoring using logs, context and other data The next five sections discuss these developments and how organizations should prepare to leverage them. Whatever happens in the technology provider realm in the next two to three years, enterprises have to actually use the capabilities either basic or advanced to solve their problems. It so happens that security monitoring capability is not something one can buy; rather, it is something one has to actually do. Thus, organizations need to prepare themselves for the arrival of advanced analytic features by learning to use the basic ones first. Expanded Context Data Collection and Analysis Security information and event management started as a collector and analyzer primarily for log data. However, even early on, the concept of adding information, as context, to log data has been prominently featured. The very first example of context data introduced into SIEM was simply adding a host name to an IP address by acquiring the DNS server. The name (such as example.com) was not in the logs, but the IP address was. The initial use for context data was to enrich the log data and make it better-understood by analysts. Soon after that, context data started to be analyzed together with log data in order to prioritize the importance of log messages and especially alert messages from IDS. Even as early as 2003 and 2004, some SIEM products were able to automatically match attacks detected by the intrusion detection system with vulnerabilities on the host under attack (typically using the MITRE CVE mappings) and perform other analytics, thereby fusing the log data with context data. Even dynamic blacklists that are created by rule-based correlation engines (such as "if source IP is observed to be launching attacks against your organization, put it on the watch list and then check whether the same IP is involved in other malicious activities in the future") are an example of context data matching, even though the content data is created by the same SIEM product itself. An example from later SIEM evolution is asset context information, such as using Microsoft Active Directory (AD) to look up an internal computing resource based on its IP address in order to determine who owns and manages the system. User context helps resolve a cryptic user name Gartner, Inc. G Page 13 of 38

14 (such as "jsmith45") into a real-world name, user roles, and the associated business unit affiliation; this capability is helpful for both investigation and real-time event analysis. Additional use for context data inside the SIEM is simply to report on such data. Most of the products today have flexible and visually pleasing reporting interfaces. User context data, asset context data and vulnerability context data can be visualized by the SIEM tool for better analysis by the tool user and better communication to others. This applies to environments that turn context data into event data (such as asset configuration state collected, time-stamped with collection time and then sent into a SIEM) and use SIEM tools to review the trends regarding such data. Thus, the primary use of context data today is to enrich the logs, make them more useful and identify their true priority for an organization. In other words, context is just that it is not used as information by and for itself. Gartner defines several types of context that are useful for security monitoring, such as: User context Asset context Vulnerability context Configuration context Data context External context Application context Business context Location and physical context As of today, most operational SIEM deployments use at least a few simple types of content. Many SIEM deployments utilize vulnerability and asset context, and some use user context as well. External threat intelligence context, in use by some SIEM tools, and other types of the collective threat intelligence are covered in the next section as a special case of global context data. The context data can come into a SIEM from different sources, which are summarized in Table 2. Page 14 of 38 Gartner, Inc. G

15 Table 2. Sources of Context Data Context Type User Context Asset Context Vulnerability Context Configuration Context Data Context External Context Application Context Business Context Location and Physical Context Typical Source Identity management (IdM) system and directory service Asset management system, directory service and internal SIEM asset subsystem Vulnerability assessment (VA) tools, dynamic application security testing (DAST) and static application security testing (SAST) tools CMDB and VA tools with security configuration assessment capability DAP and DLP tools and data management systems Public and private threat intelligence feeds and social media monitoring Infrastructure and business applications, DAST and SAST tools Business unit managers, personnel and business applications, and IT GRC tools GPS sensors built into systems, network location data and physical access control systems Source: Gartner (May 2012) The use of context information for analysis will have to be dramatically expanded in the future. This will make (and keep) monitoring much more relevant to business and more effective in the age of advanced threats. What's more important, some products will start to actually analyze context data rather than simply using it to enhance event data. Today's SIEM products do not analyze any of the context bits they receive, but future SIEM products will derive intelligence from events and context data alike. This will help fulfill the high-level SIEM mission: to provide situational awareness across the whole environment of risks to the business and information technology. What types of analysis can be performed on context data? Endpoint vulnerability and configuration data, for example, could be matched with network configuration data (a task that requires a separate product today), or it may be analyzed to provide baselining and trending. User context data might be analyzed to determine appropriate user profiles for each role, or their physical location may be used to identify inappropriate access or impersonation attacks. Data context could allow for mapping and analysis of information streams in business processes; by extension, it could be used to find anomalous behavior. Table 3 summarizes some of the new context types that will be collected by future products. Gartner, Inc. G Page 15 of 38

16 Table 3. Context Analysis Evolution Types of Context Data Today 2014 through 2015 Vulnerability Periodic vulnerability scan report import Ongoing and automated vulnerability data import Vulnerability information trending and analysis Analysis of vulnerability information with other context such as access control list (ACLs) and firewall rules Application-level vulnerability data from DAST tools added to asset properties SAST code analysis data import and presentation Configuration N/A Ongoing and automated system and network configuration data import Correlation of configuration changes with other data User Asset Limited user context (user name-> real name via AD) System-level asset information (IP-> system name and some system properties) Extended user context synchronization from IdM and directories User profiling versus peers and past behavior; behavioral anomaly detection Extended context synchronization from asset management and directory services Context data from new asset types virtual machines, cloud instances and so on Asset profiling; detection of compromised assets based on behavior deviation Data Not common Bidirectional integration with DLP and data discovery tools 2 Correlation rules to alert on access to discovered data Application Not common Application context import direct from applications Application log enrichment using context data Runtime application data collection and analysis Network Not common Network management systems, network behavior analysis and network forensics tools Application-level network traffic analysis correlated to application context information External Basic IP address blacklists Intelligence feeds and other sources of various threat, vulnerability and attack intelligence Business Not common Business rules, practices, workflows and processes Location Not common Use of user and device location information for correlation and profiling Source: Gartner (May 2012) Page 16 of 38 Gartner, Inc. G

17 Specifically, user context will be expanded to cover not just basic user name resolution, but also information that allows the tools to perform automated profiling and ultimately detect select insider attacks and abuses. Identity fusion (identifying that "jsmith45" and "john_smith" belong to the same person), peer group comparisons (such as what is performed by tools like Securonix on SIEM data feeds) and other user analyses will become more common. These algorithms are notoriously difficult to commoditize because there is no one "normal" behavior only many facets of normal. However, it is conceivable that future tools can extract enough features of normal behavior so that such profiling becomes operationally useful without research-grade efforts. More importantly, Gartner expects that many of the organizations deploying SIEM for security as well as compliance will integrate their SIEM with identity management and other sources for user context. They would use capabilities that exist today for a more widespread analysis that can help detect persistent threats that often make use of compromised user accounts. Asset information today is mostly used for investigative purposes. In the future, the information will be used for more expanded profiling and anomaly detection to highlight compromised and malicious resources that are taken over by attackers. In addition, systems will have to handle new types of assets such as virtual machines, mobile containers and public cloud assets such as software as a service (SaaS) capabilities. The concept of an asset as something that can be resolved from an IP address at any moment will die off, especially given expanding cloud deployments. Network topology information, such as whether a system is deployed inside the perimeter or in the DMZ, is another example of asset context. Data and application context will allow SIEM to perform better application security monitoring (another SIEM future trend discussed in the Application Security Monitoring Using Logs, Context and Other Data section). Specifically, data context will allow a SIEM analyst to know whether a particular access recorded in logs can reveal sensitive data leakage or theft. For example, a DLP alert may be sent to a SIEM and reviewed by an analyst, who will then execute an API call to perform searches across captured data inside the DLP tool. Business context in contrast to technical context obtained from information systems is the most challenging, but also the most critical for escalating the SIEM importance beyond its network and system infrastructure roots. The easiest example of business context, occasionally utilized by SIEM users, is relative asset importance or asset value. Gartner expects that, in the future, SIEM will be connected to more business process automation systems in order to correlate attacks and suspicious activities with normal business practices and workflows. For example, application and system activities associated with a particular business process may be codified as "known good" activity in SIEM activity profiles or matches to policy templates. At the very least, such information will be brought in to tie system activities observed by SIEM tools to business activities performed by employees and customers and then made available to analysts. Even network context, long present in SIEM tools in the form of IP-related context, can expand in importance. Admittedly, dedicated tools such as RSA NetWitness and Solera would be used for massive packet capture and traffic analysis, but it is likely that session and other information will be channeled back to SIEM (or made available via an API call to a separate tool) to enable SOC analysts to make decisions at that level. Gartner, Inc. G Page 17 of 38

18 Current examples of this emerging trend are included in the following tools of different types, but unified with the shared-intelligence theme: HP ArcSight IdentityView presents a dedicated view of user context and its analysis. NetIQ Sentinel bidirectional IdM integration enables both identity data analysis and taking action on user accounts. IBM Q1Labs QRadar Risk Manager analyzes vulnerability and configuration information, together with ACLs and firewall rules, to model possible attack scenarios. How to Prepare for This Future It is important to realize that many of the technical capabilities for incorporating asset context are present today. However, context usage remains spotty across many SIEM deployments. To prepare for the future, organizations should look for current asset context and user context integration capabilities and identify use cases where SIEM value can be enhanced by adding such information. This will give an organization valuable experience with analyzing additional types of security data, not just logs from the perimeter devices. Context information is likely to become more important for security monitoring of internal assets and applications than it is for monitoring of commodity attacks on the perimeter. For example, an organization should establish a link between its SIEM and its IdM/IAM (identity and access management) system to better monitor internal privileged users. This will allow it to prepare for future advanced analytics on user roles and identities. In general, additional types of context and context data analysis will help SIEM break out of the silo of network security and infrastructure monitoring. However, to do so, an organization must both have the additional data and create processes for using and analyzing the various types of context. To summarize: In the near term, utilize existing context integration for solving immediate problems, and gain experience with this type of data. In the longer term, evaluate emerging tool capabilities and new types of data and algorithms. Shared, Distributed Intelligence For the entire evolution of the security industry, as well as security technologies, every enterprise has by and large faced attackers on its own, in an insular fashion. Sharing threat and countermeasure intelligence beyond a trusted circle of friends has been attempted many times since the dawn of computer security. A recent history of data sharing started from President Clinton's PDD63 in 1998, which talked about "an unprecedented attempt at information sharing among agencies in collaboration with the private sector" and launched the information sharing and analysis centers (ISACs) as trusted sharing "clubs." Despite all the attention, the real sharing across enterprises, between enterprises and government, and even between enterprises and security vendors has been limited, with notable patches of success (such as malware sample sharing). Page 18 of 38 Gartner, Inc. G

19 Today, when advanced attacks are not only targeting the defense sector, but also many other types of organizations, the need for sharing, collaboration and distributed security intelligence is greater than ever. SIEM products already serve as a security monitoring hub within the organization. Although some might claim that they mostly collect data and few succeed in turning the data into intelligence, they're still one of the industry's best shots at combining the data for broad-spectrum security monitoring. The SIEM security monitoring mission and the need to share have led and will lead in the next two to three years to increased sharing of security data to enable collaboration as well as distributed data analysis via crowdsourcing. Current state of the art of SIEM and shared intelligence only involves receiving community information from sources such as shared IP and file blacklists and commercial entity reputation services and intelligence providers, such as VeriSign idefense, isight and Cyveilance. Using a different approach, ThreatGrid can build entity reputation lists from live malware analysis and produce both traditional IP blacklists and lists of files, registry keys, domains, DNS queries and so on. SIEM vendors have long used a combination of scripts to include shared community data in correlation and reporting. Such sharing today generally does not go beyond IP blacklists and other IP address reputation lists, but it will likely expand much further in the coming years. Today, more of the niche tools, such as fraud monitoring or even anti-spam, use more global information for the analysis. Blacklists for IP addresses, file names, addresses, domains, Autonomous System Numbers (ASN) and even countries enhance the value of SIEM for security monitoring. Organizations such as Team Cymru Research, SANS ISC and Malware Domain List provide feeds of various types of IP and domain blacklists, such as botnet IPs, compromised IPs, attacking IPs and spamming IPs. The volume, quality and timeliness of such information are rapidly increasing. For example, emerging vendors automatically analyze privately captured malware binaries and then add the IP addresses that these malware samples are trying to reach to "real-time" blacklists, which vendors share with their customer bases. Other vendors, such as Vigilant, automatically correlate different threat feeds and arrive at a higher-reliability feed, then import it into a SIEM together with rules and reports for such data. However, information sharing is not only about downloading data shared by others; it is also about contributing sanitized data to others in order for a SIEM to play a part in a central distributed data analysis. Table 4 compares today's state of distributed intelligence in SIEM. Gartner, Inc. G Page 19 of 38

20 Table 4. Shared, Distributed Intelligence in SIEM Today 2014 Through 2015 Direction of sharing Community or vendor feed - > SIEM unidirectional Community or vendor feed <-> SIEM bidirectional Shared objects Blacklists and reputation lists for IPs, s, files and so on Detailed reputation information for IP addresses, hosts, domains, s, files and so on Compromise indicator sharing to look for compromised assets; query and search string sharing for rapid detection of recently discovered malicious behavior Correlation rule and other detection template sharing for finding and investigating intrusions Source: Gartner (May 2012) In addition, recent acquisitions in the SIEM market have created a set of companies that offers both managed security services (MSS) and SIEM. HP, Symantec and IBM are three primary examples. These companies have an opportunity to inject the intelligence observed from monitoring their MSSP customers into their SIEM product base in an anonymized and aggregated manner. Such unique data feeds can significantly enhance the quality of security monitoring by deploying shared correlation rules as well as investigative query strings. Analyzing events across their customers is something that most MSSPs have been doing for a long time. However, the opportunity to inject this information into SIEM products is more recent. Current examples of this emerging trend include the following capabilities of different types but unified with the shared-intelligence theme: HP ArcSight has a number of methods for importing shared intelligence. For example, "ArcOSI is a Python-based utility available for Unix or Windows that scrapes several trusted opensource intelligence sites for known malicious IP's and domains and streams them into ArcSight CEF format via Syslog for use in your SIEM content." 3 Symantec SSIM integration with Symantec's DeepSight intelligence system provides an IP blacklist feed for use in correlation. Vigilant Collective Threat Intelligence can be used to include shared-intelligence feeds in select SIEM products, complete with the SIEM content needed to use the information. RSA netwitness for Logs can use information and shared security data from netwitness Live; also, RSA efraudnetwork uses global information for fraud detection and investigation. AlienVault Open Threat Exchange enables users to both send and receive threat intelligence for the benefit of their user communities. OpenIOC project by Mandiant may enable easier compromise indicator sharing across different tools. Page 20 of 38 Gartner, Inc. G

21 Finally, distributed and shared intelligence and cross-customer analytics does not require that the SIEM product be delivered as SaaS or through an MSSP. Even for bidirectional information sharing, aggregated information can be sent from the SIEM product into the vendor data center, processed, and then distributed back to the tools in some form. However, it is easier to perform crosscustomer analysis and deploy it in the same platform in case of a SaaS SIEM or MSSP because the data is both hosted and analyzed, and the analysis results are applied, inside a single system. Emerging SaaS SIEM vendors such as SumoLogic highlight this capability as one of the differentiating factors for their technologies. How to Prepare for This Future As of today, an organization's ability to monitor its systems and networks can be improved by using open-source shared-information feeds. To prepare for a future where SIEM and other security tools will use more content produced by crowdsourcing or other types of shared analysis, evaluate your current SIEM product and integrate some of the open-source blacklists into dynamic watch lists on your SIEM. Specifically, watch for your systems initiating communication to any of the blacklist addresses. Consider sharing some of your data in a sanitized form with community organizations, and participate in trusted information-sharing communities such as FS-ISAC and others (based on industry). Demand that vendors develop more shared-intelligence features to improve the security for all of their customers (for additional details, see "Threat Assessment in Dangerous Times"). As vendors deploy more shared-intelligence features in their products, make use of them; they can make you more effective and more versatile in responding more quickly to today's threats. To summarize: In the near term, gather reliable IP blacklists from the community or commercial vendors and run reports to check whether any systems in your environment communicate with these IP addresses. In the longer term, evaluate newly available data feeds for entity reputation and integrate them in SIEM content types (rules, reports and dashboards) to better find early intrusion indicators. Emerging Environment Monitoring Just as vulnerability assessment tools and enterprise vulnerability management practices are expanding to cover new environments (see "Vulnerability Management Practices and Vulnerability Assessment Technology"), security monitoring and SIEM has to follow the expanding IT footprint to the cloud and virtual environments. Vulnerability assessment and security configuration assessment have to adapt and understand architectural and technical components as well as operational practices inside the new environments, and so do security monitoring technologies. For example, tool vendors make assumptions that are always true in traditional IT and are almost never true on public cloud provider networks: fixed server asset IP addresses, rare system restarts, static system grouping, actively managed systems, a system-level (and not service-level) approach to provisioning and so on. For details on using SIEM for security monitoring of public cloud resources, review the upcoming "Security Monitoring of Public Cloud Resources." In an increasingly Gartner, Inc. G Page 21 of 38

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

How to Define SIEM Strategy, Management and Success in the Enterprise

How to Define SIEM Strategy, Management and Success in the Enterprise How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

Realize That Big Security Data Is Not Big Security Nor Big Intelligence G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Discover & Investigate Advanced Threats. OVERVIEW

Discover & Investigate Advanced Threats. OVERVIEW Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

The Sumo Logic Solution: Security and Compliance

The Sumo Logic Solution: Security and Compliance The Sumo Logic Solution: Security and Compliance Introduction With the number of security threats on the rise and the sophistication of attacks evolving, the inability to analyze terabytes of logs using

More information

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO

More information

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation

More information

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM The Benefits of Integrating File Integrity Monitoring with SIEM Security Information and Event Management (SIEM) is designed to provide continuous IT monitoring, actionable intelligence, incident response,

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

Vendor Landscape: Security Information & Event Management (SIEM)

Vendor Landscape: Security Information & Event Management (SIEM) Vendor Landscape: Security Information & Event Management (SIEM) Optimize IT security management and simplify compliance with SIEM tools., Inc. Is a global leader in providing IT research and advice. Info-Tech

More information

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources

More information

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer. THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from

More information

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015 www.encari.com Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015 www.encari.com 2 The Problem Cyber attacks are not just a risk, they are a reality.

More information

QRadar SIEM and Zscaler Nanolog Streaming Service

QRadar SIEM and Zscaler Nanolog Streaming Service QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

Server Monitoring: Centralize and Win

Server Monitoring: Centralize and Win Server Monitoring: Centralize and Win Table of Contents Introduction 2 Event & Performance Management 2 Troubleshooting 3 Health Reporting & Notification 3 Security Posture & Compliance Fulfillment 4 TNT

More information

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

ALERT LOGIC FOR HIPAA COMPLIANCE

ALERT LOGIC FOR HIPAA COMPLIANCE SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare

More information

QRadar SIEM 6.3 Datasheet

QRadar SIEM 6.3 Datasheet QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

SecureVue Product Brochure

SecureVue Product Brochure SecureVue unifies next-generation SIEM, security configuration auditing, compliance automation and contextual forensic analysis into a single platform, delivering situational awareness, operational efficiency

More information

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach

More information

Ecom Infotech. Page 1 of 6

Ecom Infotech. Page 1 of 6 Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance

More information

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore Choosing the Right Log Management Product By Michael Pastore Tech Brief an Log management is IT s version of the good old fashioned detective work that authorities credit for solving a lot of crimes. It

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

From the Bottom to the Top: The Evolution of Application Monitoring

From the Bottom to the Top: The Evolution of Application Monitoring From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:

More information

Enabling Security Operations with RSA envision. August, 2009

Enabling Security Operations with RSA envision. August, 2009 Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200

More information

IBM QRadar as a Service

IBM QRadar as a Service Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major

More information

Feature. Log Management: A Pragmatic Approach to PCI DSS

Feature. Log Management: A Pragmatic Approach to PCI DSS Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

The Emergence of Security Business Intelligence: Risk

The Emergence of Security Business Intelligence: Risk The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are

More information

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness

More information

Speed Up Incident Response with Actionable Forensic Analytics

Speed Up Incident Response with Actionable Forensic Analytics WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware

More information

Trend Micro. Advanced Security Built for the Cloud

Trend Micro. Advanced Security Built for the Cloud datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

How To Create Situational Awareness

How To Create Situational Awareness SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Win the race against time to stay ahead of cybercriminals

Win the race against time to stay ahead of cybercriminals IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

Fortify. Securing Your Entire Software Portfolio

Fortify. Securing Your Entire Software Portfolio Fortify 360 Securing Your Entire Software Portfolio Fortify Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security threats. Craig Schumard,

More information

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Abstract Effective Security Operations throughout both DoD and industry are requiring and consuming unprecedented

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

DEMONSTRATING THE ROI FOR SIEM

DEMONSTRATING THE ROI FOR SIEM DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper Introduction Security professionals sometimes struggle to demonstrate the return on investment for new

More information

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Mucho Big Data y La Seguridad para cuándo?

Mucho Big Data y La Seguridad para cuándo? Mucho Big Data y La Seguridad para cuándo? Juan Carlos Vázquez Sales Systems Engineer, LTAM mayo 9, 2013 Agenda Business Drivers Big Security Data GTI Integration SIEM Architecture & Offering Why McAfee

More information

Find the needle in the security haystack

Find the needle in the security haystack Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Drawbacks to Traditional Approaches When Securing Cloud Environments

Drawbacks to Traditional Approaches When Securing Cloud Environments WHITE PAPER Drawbacks to Traditional Approaches When Securing Cloud Environments Drawbacks to Traditional Approaches When Securing Cloud Environments Exec Summary Exec Summary Securing the VMware vsphere

More information

Demonstrating the ROI for SIEM: Tales from the Trenches

Demonstrating the ROI for SIEM: Tales from the Trenches Whitepaper Demonstrating the ROI for SIEM: Tales from the Trenches Research 018-101409-01 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters:

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Securing SharePoint 101. Rob Rachwald Imperva

Securing SharePoint 101. Rob Rachwald Imperva Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information

How To Manage Log Management

How To Manage Log Management : Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In

More information

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats

More information