BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION

Size: px
Start display at page:

Download "BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION"

Transcription

1 BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION 20

2 Table of contents 1 Introduction CyberReveal Overview CyberReveal Platform CyberReveal Analytics CyberReveal Investigator Technical Requirements CyberReveal Platform CyberReveal Analytics CyberReveal Investigator Service Delivery Evaluation Training Professional services Onboarding Applied Intelligence: Information Intelligence BAE Systems CyberReveal Page 1 of 14

3 1 Introduction Enterprises today face a range of cyber adversaries. Amongst the most sophisticated are criminal organisations and foreign governments determined to steal high-value information or disrupt critical services in order to inflict damage or gain unfair competitive advantage. It is almost impossible to prevent a determined, knowledgeable and well-resourced attacker from compromising an organisation. They will modify and re-modify their attack over weeks, months or even years to eventually defeat an organisation s security controls. Their actions may go undetected for some time, but the damage can be considerable and lasting. Many organisations have responded by proactively monitoring their infrastructure to detect attackers that have successfully gained access. The objective is simple: to find, investigate and respond effectively to attacks before lasting damage is done. Conventional security monitoring products are not effective. Enterprises that develop an in-house monitoring capability, by investing in technology and security analysts, often find their efforts hampered by the limitations of traditional monitoring products: Efficiency: Analysts and tools are overwhelmed by security alert data. Threat: New types of attack may go undetected by products that only recognise previously encountered attacks. Scale: The cost of processing increasing volumes of alert data becomes prohibitive. Decision making: The contextual information needed to assess alerts is distributed across several toolsets. To effectively manage the sophisticated cyber-attacks we face now, and will face in the future, a more sophisticated security monitoring platform is clearly needed. CyberReveal is a true big data security analytics and investigation platform. It brings together our heritage in network intelligence, big data analytics and cyber threat research into a unique enterprise-scale product. BAE Systems CyberReveal Page 2 of 14

4 2 CyberReveal Overview CyberReveal is a highly scalable, modular product stack for the detection and investigation of advanced security threats against an infrastructure. By utilizing the latest big data technologies and advanced security analytics, CyberReveal provides effective protection against targeted cyber-attacks. CyberReveal provides more sophisticated threat detection than traditional signatures and rules-based methods as the CyberReveal Analytics are behavioural based. This enables the analytics to find previously unknown threats due to anomalous behaviour, rather than just finding the subset of known threats that signatures provide. By combining and correlating multiple sources of data and alert sources, CyberReveal significantly increases analyst efficiency allowing analysts to make more informed decisions, quicker. Our solution was built for analysts, by analysts, and is the same technology which is deployed and proven in our managed security service, providing protection for over 150,000 endpoints across the globe. CyberReveal currently contains three core components, which can be split into: Platform: Big data platform that can store and process billions of events. Analytics: Advanced behavioural security analytics for the detection of the most sophisticated threats. Investigator: An intuitive investigation and response tool providing a single view of threats to the organization to support security and threat analyst workflows. 2.1 CyberReveal Platform Figure 1. CyberReveal Product Overview The CyberReveal big data platform is built from the ground up around the massively scalable Hadoop ecosystem. In our specific use case, Hadoop provides the scalability to store, process and rapidly query billions of infrastructure events per day and do so costeffectively on commodity hardware. BAE Systems CyberReveal Page 3 of 14

5 Figure 2. CyberReveal Platform CyberReveal aims to align with Apache releases of Hadoop and supports a range of distributions including HortonWorks, Cloudera and Greenplum Pivotal HD. If a Hadoop cluster already exists on the deployment environment, depending on the distribution, CyberReveal can leverage this existing infrastructure without requiring exclusive access to the cluster. CyberReveal provides an abstraction layer at the ingress of data, meaning that the CyberReveal Platform is agnostic to the specific data source and format being ingested. All data is normalized into standardized formats which can later be used in the analytics stage of the solution. The platform can leverage log data from existing monitoring infrastructure, or Applied Intelligence can provide the capability to collect the data using our network probes and host agents. The typical types of data that we envisage being ingested for detecting and investigating advanced threats include: - HTTP: Commonly collected from web proxies or network probes at the network perimeter, CyberReveal analyses HTTP transaction metadata records. CyberReveal supports many common proxy vendors such as Blue Coat. - CyberReveal can collect log data from gateways such as IronPort. The SMTP metadata is useful for detecting spear-phishing attacks (scheduled for release in version 1.2), which is a common form of infiltration. - Host: Integrating CyberReveal with either a third-party agent or the Detica Host Agent installed on each client machine or server can provide a richer view of the activities on BAE Systems CyberReveal Page 4 of 14

6 the infrastructure. Host agents can record details such as running processes, login attempts and user activity which can be correlated against network events. - Network: CyberReveal can also integrate with other network log data such as DNS, firewall or net-flow data. - Enrichment: CyberReveal also has the ability to bring in numerous sources of data which provide context to an investigation. Examples of this include asset databases, third party data such as Alexa rankings and WHOIS information. - Threat Intelligence: CyberReveal has the capability to ingest threat intelligence from numerous threat intelligence sources such as isight and extract meaningful signatures from them. These signatures can then be used within CyberReveal to detect threats or exported to network devices such as firewalls or intrusion prevention systems. Once the data has been ingested, the CyberReveal Platform relies on Apache Accumulo, which is built on top of the Hadoop File System, to store the data with granular, cell-level security. By using Accumulo to index the normalized data into key/value pairs, a subset of events can be retrieved from the whole dataset (which could scale to billions of records) in a matter of seconds. Accumulo provides a cost-effective, high performance and secure infrastructure for unified logging. 2.2 CyberReveal Analytics After the events have been ingested, the CyberReveal Analytics can be run across the entire breadth of the data stored in the platform. The CyberReveal Analytics can identify malicious behaviour within your IT infrastructure and raise alerts to CyberReveal Investigator. CyberReveal s behavioural analytics are able to find new attack methods and zero day exploits, where traditional rules or signature engines are commonly restricted to detecting known malicious activity. CyberReveal Analytics are driven by current threat intelligence gathered and created by Detica s Threat Intelligence team. The analytics are tested, refined and proven in Detica s managed security service which is run across a range of clients varying in sizes and industries. The CyberReveal Analytics are based on an extensible framework that provides the foundations for clients to write their own analytics to address their priority threats. Part of our offering also includes the opportunity to co-create analytics with CyberReveal s analytics development team to be able to design and create new analytics to meet the needs of the client. Training and Collaborative Analytics Services help clients become productive quickly. BAE Systems CyberReveal Page 5 of 14

7 Figure 3. CyberReveal Analytics We have defined attack models for APT (Advanced Persistent Threat). The APT pack is well established and proven within our managed security service. We employ multiple behavioural analytics to detect traits exhibited by the adversary at various stages of the attack. The APT attack model mainly focuses around covert information theft, although it is extensible to other malicious activity and the entire analytics framework is extensible to allow detection of other threats. The table below shows an example of various attack techniques that we look for within our APT analytics: Figure 4. CyberReveal APT Attack Techniques BAE Systems CyberReveal Page 6 of 14

8 2.3 CyberReveal Investigator Once the CyberReveal Analytics have run, these are then forwarded to CyberReveal Investigator. CyberReveal Investigator is the front-end operational tool for efficiently investigating alerts from both CyberReveal Analytics as well as third-party monitoring devices that provide alerts, such as SIEMs like ArcSight. Our aim is to improve analysts efficiency and effectiveness by providing their alert, incident or threat intelligence work queue in a single interface along with all contextual data and visualizations to enable them to quickly make accurate decisions. CyberReveal Investigator has an open architecture which enables quick and easy integration into the IT infrastructure. There are standard open APIs for the integration of alerting systems, threat intelligence, enrichment sources, ticketing as well as log sources for querying. Examples of some previous integrations with Investigator include CA Service Desk Manager and SharePoint for ticketing, ArcSight and Splunk for both alerting and querying, and asset directories and AV endpoint protections systems for enrichment Alerts and Threat Intelligence Figure 5. CyberReveal Investigator Investigator provides analysts unprecedented insight and efficiency through a unified view across the whole security infrastructure. It provides a single pane of glass into the security environment by integrating with the existing infrastructure to obtain greater operational benefits from them. For example, alerts from other monitoring systems as well as threat intelligence from multiple sources can be aggregated, correlated and investigated in one place Context and Visualizations CyberReveal Investigator has interactive tables and visualizations to enable investigators to effectively analyse information. This helps give the analyst more context and an intuitive understanding of the activity that is taking place. Within the visualisations, Investigator automatically links entities to provide a coherent graphical view of related entities in alerts or threat intelligence reports. These linked entities can come from a BAE Systems CyberReveal Page 7 of 14

9 range of data sources and enrichment to easily investigate the full context of the activity and collate data from multiple sources. By standardising an interface to query the underlying data sources, analysts do not need technical knowledge to query each logging system. This not only means that querying any data source is quick and simple, but as it reduces the skill level required the team is more easily scaled. It also greatly improves efficiency as the analyst does not have to swivel-chair between systems. CyberReveal Investigator can integrate with any query source including the system we use in our solution, i.e. CyberReveal Platform. Enrichment is automatically done for each entity, both on the graph and in the Enrichment panel. This information helps give the analyst context to the data being presented. This enrichment information can be from both internal databases such as threat intelligence repositories as well as open source information such as Alexa rankings and blacklists Incident/Knowledge Management CyberReveal Investigator has a myriad of knowledge store functionality that not only aids in operationalising the investigation of alerts and intelligence reports but also improved efficiency through reduced repetition of work. Investigator integrates with an incident management system to enable tickets/cases to be created from an alert or intelligence. The fields being submitted to the ticketing system are automatically populated with the information of the alert, which reduces the risk of human error. Additionally, visualisations of contextual data can also be attached to the ticket so that further investigation can continue, potentially with other analysts in different teams. In addition to this, CyberReveal Investigator has a feature to maintain and share an analyst knowledge base across the team. This functionality enables an analyst to make a note against any entity within Investigator. These notes are viewable by all analysts, who have the correct permissions, instantly, enabling quick and easy knowledge sharing between analysts, reducing the time needed to investigate. This enables the analyst to quickly understand whether previous incidents relate to the activity they are investigating and what remediation was taken at that time. BAE Systems CyberReveal Page 8 of 14

10 3 Technical Requirements 3.1 CyberReveal Platform Many large organisations already have a preferred Hadoop distribution and CyberReveal can be installed on top of an existing Hadoop cluster, as long as the hardware is sufficient and the Hadoop version and distribution are supported. As part of our associated professional services associated with CyberReveal deployment we can install HortonWorks HDP 1.3, our preferred distribution, on client hardware. CyberReveal runs on Hadoop versions , up to 1.2. To-date CyberReveal has been deployed on a variety of Hadoop distributions including Cloudera, GreenPlum and HortonWorks. Applied Intelligence has a Hadoop testing facility and a programme of work to test CyberReveal on the most popular distributions. The actual number of machines required in your cluster will depend on various factors: - The size of the estate that you are monitoring - The number and type of analytics that you are running - The memory and CPU performance of the machines in the cluster - Intensity of IT usage of the user community - The data retention period, the HDFS replication factor and the data compression ratio We can estimate the number of machines required in your cluster based on your particular circumstances using our CyberReveal Cluster Sizing Model. As an example, a typical installation of CyberReveal in a 50,000 employee organisation might run on 15 commodity servers. For more detailed information on CyberReveal Platform and its interaction with Hadoop please contact the CyberReveal team. 3.2 CyberReveal Analytics Each CyberReveal Analytics pack takes various data types as input. Each data source enables various analytics within the pack depending on what each algorithm is trying to detect. For example, our Advanced Persistent Threat (APT) pack primarily uses HTTP data, metadata and host data. These data sources enable our CyberReveal Analytics to identify anomalous behaviour at each stage of the kill chain. The CyberReveal Platform provides an abstraction layer between the data sources and the CyberReveal Analytics. Therefore CyberReveal is not dependant on any particular brand of data source. You are free to create your own analytics in order to identify any threats in your environment. You will use your own knowledge of the threat and your environment in order to identify the data sources required. Full details of the data sources required for a specific analytics pack are available under NDA. BAE Systems CyberReveal Page 9 of 14

11 3.3 CyberReveal Investigator The CyberReveal Investigator front end component is a Java-based, web delivered application. Any reasonable business-grade specification PC or Mac will be able to run the software. It is envisaged that the analyst would have a dual monitor setup to derive the best use of the tool. BAE Systems CyberReveal Page 10 of 14

12 4 Service Delivery 4.1 Evaluation 4.2 Training Prior to a full deployment Applied Intelligence offer the option of evaluation. The evaluation period can last between one to three months, but is normally the full three months. During this period an information gathering exercise in undertaken to capture all relevant information relating to the Clients Business Drivers and Client Technology. Once this information has been gathered, to facilitate a smooth integration, we will install and configure the CyberReveal product During the evaluation period training will be provided to allow Client security analysts to exploit the tool. If the Client has chosen to take the analytics component of CyberReveal the evaluation period will include up to three workshops (one per month of the evaluation) to ensure the analytics are functioning appropriately. The output of these workshops will enable us to work together with the Client to build, test and refine analytics to prove and meet the Clients business requirements. Throughout this time, the Client will be able to evaluate the product against agreed success criteria and business objectives. We will provide assistance where required and are open to feedback on the product and where improvements could be made. The CyberReveal product is specifically designed to ensure that the Clients Security Analysts will require no formal Software or programming training or skills to be able to operate the product. Once the CyberReveal product has been installed the Security Analysts will receive training in how to use and exploit the tool effectively and efficiently. This standard training provision is included in the cost of the CyberReveal licence. Should the client wish to generate their own Analytics, then an understanding of Java and MapReduce as well as the technical architecture of Hadoop will be necessary. If the client wishes to support their own Hadoop cluster then an understanding of Hadoop, Oozie, MapReduce and Accumulo will be needed. This bespoke training is available as a professional service and as such is charged in line with our SFIA rate card. 4.3 Professional services Deploying the full solution requires a team typically comprising the following roles: - Technical Project Manager: A technical delivery and project manager from the CyberReveal team. They will be responsible for timely delivery of product evaluations and implementations. - Business Analyst: A CyberReveal business analyst who will work with the client team to define the business requirements for a specific implementation. The business analyst will also help to shape the business case and benefits of a CyberReveal implementation. - Technical Deployment: A CyberReveal technical architect who will work with client side technical team (network, IT and Security) to ensure a successful deployment of the product. - Analytics Lead: A CyberReveal cyber security analytics expert to work with your analytics team to create analytics relevant to your organisation. BAE Systems CyberReveal Page 11 of 14

13 - Systems Integration Partners: In addition, we have a number of our systems integration partners who can support the above roles. The exact compilation of the team and the amount of effort required for a successful deployment will depend on the complexity of the client network and number of integrations required. Our professional services are charged at the SFIA rate card attached. 4.4 Onboarding Deployment of the CyberReveal product to your network is an extensively defined and managed process to ensure a successful outcome that meets your business and security requirements. We use a framework process to identify and incorporate all relevant data sources and any legacy data stores you would like incorporating into the solution. The deployment process entails close working between our deployment engineers and your security operations staff and includes training on the product to enable your analysts to test and operate the system as quickly as possible. BAE Systems CyberReveal Page 12 of 14

14 5 Applied Intelligence: Information Intelligence BAE Systems Applied Intelligence is an information intelligence specialist. We help government and commercial organisations exploit information to deliver critical business services more effectively and economically. We also develop solutions to strengthen national security and resilience, enabling citizens to go about their lives freely and with confidence. By combining technical innovation and domain knowledge, we integrate and deliver world-class solutions often based on our own unique intellectual property to our customers most complex operational problems. We recognise the importance of Cloud services to the realisation of HMG s IT Strategy and have optimised many of our most compelling IT service offerings for Government on G-Cloud. Through these offerings we are at the forefront of realising the full benefits of Information Technology for our customers. Below is a summary of our G-Cloud services. G-Cloud Service Consultancy Service Integration and Management (SIAM) Information Security Agile Design and Delivery Architecture Data Services Service Description Providing Business and IT strategy and transformation consultancy services, including requirements management, organisational change, and business case & benefits management. Covering all aspects of SIAM services, from target operating model design, to service integration, supplier management, architecture and transition and transformation management. Cyber security assessments, architecture and testing services; Threat detection, protective monitoring and security management services; Cyber incident response, and Industrial Protection, Secure Web Gateway and Cross domain services. Services delivered using the Agile method for design and development, including Secure-by-Design services. The design of end-to-end architecture solutions, including infrastructure, operations, applications and service, as well as enterprise architecture. Data management, protection and exploitation services covering people, process, data and technologies. Includes maturity assessments, organisation design and provision of data analytics services. Programme Management Digital Media Secure Mobility & MobileProtect Provision of programme management and support experts to provide delivery and/or assurance of internal and external programmes. Digital transformation, media development, including user experience, social business and mobile media. From mobile strategy, through to development of your secure mobile proposition for your user base; Cloud based protection for your user base portfolio of mobile devices. NetReveal OnDemand Cl Cloud based delivery of the global leader in counter fraud software. For more details on our G-Cloud services for G-Cloud, visit or send us an at gcloud@baesystems.com. Applied Intelligence is part of BAE Systems, the premier global defence, security and aerospace company. BAE Systems delivers a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. BAE Systems CyberReveal Page 13 of 14

15 Applied intelligence Limited is a BAE Systems company, trading as BAE Systems Applied Intelligence. Applied Intelligence Limited is registered in England (No ) with its registered office at Surrey Research Park, Guildford, England, GU2 7YP. Copyright BAE Systems plc All Rights Reserved. BAE SYSTEMS, APPLIED INTELLIGENCE and the names of the BAE Systems Applied Intelligence products referenced herein are trademarks of BAE Systems plc and are registered in certain jurisdictions. BAE Systems CyberReveal Page 14 of 14

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION.

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION. DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Services Overview...4 2.1 Rapid KPI Reporting Delivery Services...4 2.2 Data Discovery & Exploitation Services...5

More information

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION

PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION PROTECTIVE MONITORING SERVICE G-CLOUD SERVICE DEFINITION 15 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Protective Monitoring...3 2.2 Service Description...4 2.3 Scenario: Basis for

More information

ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION

ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION ADVANCED THREAT DETECTION G-CLOUD SERVICE DEFINITION 14 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Advanced Threat Detection Service...3 2.2 Service Description...4 2.3 Scenario: Basis

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION

DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION DATA ANALYTICS SERVICES G-CLOUD SERVICE DEFINITION 3 Table of contents 1 Introduction...2 2 Service Overview...3 2.1 Rapid Reporting Delivery Services...3 2.2 Data Discovery & Exploitation Services...4

More information

Threat analytics solution

Threat analytics solution Threat analytics solution Comprehensive protection against all cyber threats Why do so many companies still find themselves the victims of successful cyber attacks, in spite of all the layers of protection

More information

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their

More information

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making

More information

G-Cloud Big Data Suite Powered by Pivotal. December 2014. G-Cloud. service definitions

G-Cloud Big Data Suite Powered by Pivotal. December 2014. G-Cloud. service definitions G-Cloud Big Data Suite Powered by Pivotal December 2014 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 6 Our Approach... 7 Service Management... 7 Vendor Accreditations/Awards...

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity

More information

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS ADVANCED CYBER THREAT ANALYTICS POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. Wynyard Advanced Cyber Threat Analytics (ACTA) is a Pro-active Cyber Forensics solution that helps protect organisations

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

CA Technologies Big Data Infrastructure Management Unified Management and Visibility of Big Data

CA Technologies Big Data Infrastructure Management Unified Management and Visibility of Big Data Research Report CA Technologies Big Data Infrastructure Management Executive Summary CA Technologies recently exhibited new technology innovations, marking its entry into the Big Data marketplace with

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

CASSIDIAN CYBERSECURITY

CASSIDIAN CYBERSECURITY CASSIDIAN CYBERSECURITY ADVANCED PERSISTENT THREAT (APT) SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something no organisation can afford

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber

More information

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

SIEM is only as good as the data it consumes

SIEM is only as good as the data it consumes SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to

More information

Cisco Data Preparation

Cisco Data Preparation Data Sheet Cisco Data Preparation Unleash your business analysts to develop the insights that drive better business outcomes, sooner, from all your data. As self-service business intelligence (BI) and

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Defending against modern cyber threats

Defending against modern cyber threats Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Discover & Investigate Advanced Threats. OVERVIEW

Discover & Investigate Advanced Threats. OVERVIEW Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics

More information

Ubuntu and Hadoop: the perfect match

Ubuntu and Hadoop: the perfect match WHITE PAPER Ubuntu and Hadoop: the perfect match February 2012 Copyright Canonical 2012 www.canonical.com Executive introduction In many fields of IT, there are always stand-out technologies. This is definitely

More information

Cyber Situational Awareness for Enterprise Security

Cyber Situational Awareness for Enterprise Security Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

+44 (0) 1189 908 0850 partners@voxclever.net www.voxclever.com

+44 (0) 1189 908 0850 partners@voxclever.net www.voxclever.com ENTERPRISE CLOUD COMMUNICATIONS: AN INTRODUCTORY OVERVIEW +44 (0) 1189 908 0850 partners@voxclever.net www.voxclever.com Table of Contents Why choose us?... 2 How do we help?... 2 Product as a Service...

More information

agility made possible

agility made possible SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible

More information

Data Warehouse as a Service. Lot 2 - Platform as a Service. Version: 1.1, Issue Date: 05/02/2014. Classification: Open

Data Warehouse as a Service. Lot 2 - Platform as a Service. Version: 1.1, Issue Date: 05/02/2014. Classification: Open Data Warehouse as a Service Version: 1.1, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response, no

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

Securing and protecting the organization s most sensitive data

Securing and protecting the organization s most sensitive data Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Data processing goes big

Data processing goes big Test report: Integration Big Data Edition Data processing goes big Dr. Götz Güttich Integration is a powerful set of tools to access, transform, move and synchronize data. With more than 450 connectors,

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats Solution Overview Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats What You Will Learn The network security threat landscape is ever-evolving. But always

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

A New Era of Cybersecurity Neil Mohammed, Sales Engineer

A New Era of Cybersecurity Neil Mohammed, Sales Engineer A New Era of Cybersecurity Neil Mohammed, Sales Engineer Copyright 2015 Raytheon Company. All rights reserved. R W Market Advantages Strong Financial Backing Accelerated Innovation Increased Breadth and

More information

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively

More information

IBM QRadar as a Service

IBM QRadar as a Service Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major

More information

How to Develop a Log Management Strategy

How to Develop a Log Management Strategy Information Security Services Log Management: How to develop the right strategy for business and compliance The purpose of this whitepaper is to provide the reader with guidance on developing a strategic

More information

EnCase Analytics Product Overview

EnCase Analytics Product Overview GUIDANCE SOFTWARE EnCase Analytics EnCase Analytics Product Overview Security Intelligence through Endpoint Analytics GUIDANCE SOFTWARE EnCase Analytics EnCase Analytics Key Benefits Find unknown and undiscovered

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Security Analytics for Smart Grid

Security Analytics for Smart Grid Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC robert.griffin@rsa.com blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard

More information

idata Improving Defences Against Targeted Attack

idata Improving Defences Against Targeted Attack idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does

More information

Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management

Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management This guide will show you how a properly implemented and managed SIEM solution can solve

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

A New Perspective on Protecting Critical Networks from Attack:

A New Perspective on Protecting Critical Networks from Attack: Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published

More information

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible White Paper Time for Integrated vs. Bolted-on IT Security Cyphort Platform Architecture: Modular, Open and Flexible Overview This paper discusses prevalent market approaches to designing and architecting

More information

locuz.com Big Data Services

locuz.com Big Data Services locuz.com Big Data Services Big Data At Locuz, we help the enterprise move from being a data-limited to a data-driven one, thereby enabling smarter, faster decisions that result in better business outcome.

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Eight Essential Elements for Effective Threat Intelligence Management May 2015 INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent

More information

Converged, Real-time Analytics Enabling Faster Decision Making and New Business Opportunities

Converged, Real-time Analytics Enabling Faster Decision Making and New Business Opportunities Technology Insight Paper Converged, Real-time Analytics Enabling Faster Decision Making and New Business Opportunities By John Webster February 2015 Enabling you to make the best technology decisions Enabling

More information

Hadoop in the Hybrid Cloud

Hadoop in the Hybrid Cloud Presented by Hortonworks and Microsoft Introduction An increasing number of enterprises are either currently using or are planning to use cloud deployment models to expand their IT infrastructure. Big

More information

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security re-defines enterprise endpoint protection against advanced malware IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

How To Handle Big Data With A Data Scientist

How To Handle Big Data With A Data Scientist III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced

More information

Boosting enterprise security with integrated log management

Boosting enterprise security with integrated log management IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise

More information

BANKING ON CUSTOMER BEHAVIOR

BANKING ON CUSTOMER BEHAVIOR BANKING ON CUSTOMER BEHAVIOR How customer data analytics are helping banks grow revenue, improve products, and reduce risk In the face of changing economies and regulatory pressures, retail banks are looking

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Defending Against Cyber Attacks with SessionLevel Network Security

Defending Against Cyber Attacks with SessionLevel Network Security Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Advanced Threats: The New World Order

Advanced Threats: The New World Order Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China gary.lau@rsa.com 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC

More information

Redefining Incident Response

Redefining Incident Response Redefining Incident Response How to Close the Gap Between Cyber-Attack Identification and Remediation WHITE PAPER - How to Close the Gap Between Cyber-Attack Identification and Remediation 1 Table of Contents

More information

Endpoint Threat Detection without the Pain

Endpoint Threat Detection without the Pain WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a

More information

Threat Intelligence Platforms: The New Essential Enterprise Software

Threat Intelligence Platforms: The New Essential Enterprise Software Gitomer-1 Threat Intelligence Platforms: The New Essential Enterprise Software Due to the ever-increasing volume of cyber attacks and regulatory pressures, there is a need for a new type of enterprise

More information

Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes

Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes Capitalize on Big Data for Competitive Advantage with Bedrock TM, an integrated Management Platform for Hadoop Data Lakes Highly competitive enterprises are increasingly finding ways to maximize and accelerate

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

August 2011. Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

August 2011. Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach August 2011 A Sensage TechNote highlighting the essential workflow involved in a potential insider breach Table of Contents Executive Summary... 1... 1 What Just Happened?... 2 What did that user account

More information

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations

A Vision for Operational Analytics as the Enabler for Business Focused Hybrid Cloud Operations A Vision for Operational Analytics as the Enabler for Focused Hybrid Cloud Operations As infrastructure and applications have evolved from legacy to modern technologies with the evolution of Hybrid Cloud

More information

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Using SIEM for Real- Time Threat Detection

Using SIEM for Real- Time Threat Detection Using SIEM for Real- Time Threat Detection Presentation to ISSA Baltimore See and secure what matters Joe Magee CTO and Co-Founder March, 27 2013 About us Vigilant helps clients build and operate dynamic,

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,

More information

D. Grzetich 6/26/2013. The Problem We Face Today

D. Grzetich 6/26/2013. The Problem We Face Today Ideas on Using Asset Criticality Inference (ACI) Through Gathering and Processing of Asset Contextual Utilizing Analytical Models and Processing Rules D. Grzetich 6/26/2013 The Problem We Face Today Security

More information

Big Data Architectures: Concerns and Strategies for Cyber Security

Big Data Architectures: Concerns and Strategies for Cyber Security Big Data Architectures: Concerns and Strategies for Cyber Security David Blockow Software Architect, Data to Decisions CRC david.blockow@d2dcrc.com.au au.linkedin.com/in/davidblockow Executive summary.

More information

Mucho Big Data y La Seguridad para cuándo?

Mucho Big Data y La Seguridad para cuándo? Mucho Big Data y La Seguridad para cuándo? Juan Carlos Vázquez Sales Systems Engineer, LTAM mayo 9, 2013 Agenda Business Drivers Big Security Data GTI Integration SIEM Architecture & Offering Why McAfee

More information

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information