DPI and Metadata for Cybersecurity Applications
|
|
|
- Raymond Hoover
- 10 years ago
- Views:
Transcription
1 White Paper DPI and Metadata for Cybersecurity Applications How vendors can improve solutions for new market demands by filling the gap between COTS cybersecurity and raw data analysis
2 Executive Summary According to the Verizon 2013 Data Breach Investigations Report, 78% of breaches take weeks or months to discover. The authors stress the importance of a strong strategy for detection and response: Prevention is crucial, and we can t lose sight of that goal. But we must accept the fact that no barrier is impenetrable, and detection/response represents an extremely critical line of defense. Let s stop treating it like a backup plan if things go wrong, and start making it a core part of THE plan. 1 This highlights the need for situational awareness, now a necessary pillar of effective cyberdefense. In today s world, organizations must assume that their networks will be compromised. In order to accelerate breach detection and mitigation, they need to improve their understanding and monitoring of normal network behavior. Vendors of cybersecurity solutions are the most likely sources for help. This paper offers a viable strategy for vendors to increase the effectiveness of products such as nextgeneration firewalls and solutions for NBAD, SIEM and DDoS attacks by using traffic metadata. It explains how metadata can be leveraged to see good from bad network behavior faster than current COTS products and raw data analysis using data logs, full packet capture and traditional Deep Packet Inspection (DPI). Metadata strengthens cybersecurity solutions by providing behavioral context to traffic monitoring. Vendors can use metadata to: Establish good and bad behavior for services, and how they communicate Rapidly define/map behavioral patterns for a host or user Build custom protocol validators to look for system exploits Allow analysts to query and investigate data in new and more effective ways Reduce data storage requirements by 10x 150x compared to full packet capture (enabling storage of a year s worth of metadata, which is unfeasible with full packet capture) Deliver products with higher quality security and fewer false positives By enabling cybersecurity tools to search through data faster, and with fewer demands on IT organizations to improve their situational awareness, vendors stand to increase their market relevance and value to customers as partners in cyberdefense Data Breach Investigations Report, Verizon,
3 Contents Executive Summary... 2 Cyberdefense Trends: The Need for Situational Awareness... 4 How Conventional Security Analysis Limits Detection and Mitigation... 4 Shifting Mindsets to Situational Awareness... 5 The Value of Traffic Metadata... 6 Use Case: Firewalls with Metadata... 8 Use Case: NBAD with Metadata... 9 Use Case: SIEM with Metadata... 9 Use Case: DDoS Mitigation with Metadata Qosmos DPI Metadata for Cybersecurity Vendors Improving Your Value Proposition to Customers
4 Cyberdefense Trends: The Need for Situational Awareness Networks today must support increases in data size and availability. Organizations have more network data to analyze and less certainty about what data they need to analyze. Data sets are more complex, making it harder to extract meaningful information. Cybersecurity teams can no longer afford to police all their data manually and must outsource all or part of their security analysis to third parties, where analysis can easily lose context for a specific business environment or security objective. The volume of data and proliferation of threats change how organizations should now approach cyberdefense. Recommendations from cybersecurity experts prioritize situational awareness and breach detection over impossible 100% prevention. Strategy should emphasize network intelligence gathering and analysis, and smart network monitoring as the best defense against threats. Vendors of cybersecurity solutions can drive emerging defense trends by engineering intelligence for situational awareness into their offerings. How Conventional Security Analysis Limits Detection and Mitigation Figure 1 shows a representative example of conventional security analysis. Billions of raw data elements collected over a period of time are screened in stages down to a few thousand investigated events. Figure 1. Conventional Security Analysis Within the Security Operations Center (SOC), traffic records are analyzed using conventional tools of choice. The time and resources required to validate data, examine events, identify breaches and mitigate them, as revealed in the Verizon report, can take weeks to months at substantial costs for the tools and talent. This is largely due to a gap between conventional COTS tools and the manual analysis performed by security teams (Figure 2). The inability to search for data patterns in the context of user behavior and application usage makes useful pattern detection (and quick breach mitigation) difficult. 4
5 Figure 2. Gap between COTS Tools and Raw Data Analysis Shifting Mindsets to Situational Awareness The use of metadata to improve the situational awareness of cybersecurity requires a shift in mindsets among vendors and their customers. Instead of preventing attacks, the premise should be that breaches will occur. Objectives should shift to detecting breaches faster by understanding the behavior and use of applications in traffic flows to recognize anomalies. Instead of thinking of cybersecurity as a discrete solution, the approach should be the integration of security with applications and web logs. Instead of relying only on protocol signatures to monitor traffic, vendors must enable products with real-time visibility into traffic patterns based on user behavior and application usage made possible with metadata. 5
6 The Value of Traffic Metadata What security teams need, and what vendors should seek to provide, are capabilities to examine traffic data with the quality of full packet inspection coupled with indexed searching of protocol attributes to find meaningful user and application behavior patterns. This would improve the situational awareness of customers cyberdefense, and is within reach for vendors through the use of traffic metadata. Metadata bridge the gap between conventional COTS and raw data analysis, enabling vendors to improve their customers situational awareness for cyberdefense. Metadata bridge the gap between conventional tools and raw analysis by enabling detection and differentiation of good and bad behavior patterns in network traffic flows. Traffic metadata provide the following advantages for vendors of cybersecurity solutions and their customers: Full classification and decoding of network protocols Layers 4-7, describing as many protocol and application attributes as needed Extraction from traffic in real-time without the need for data aggregation, formatting and database searches; they are therefore more precise, faster and easier to use than data logs Analysis of traffic without the need to store full, raw data packets, reducing storage requirements by a ratio of 1000:1, compared to processing packet captures and/or Syslog Application and session aware, and capable of tracking multiple flows with a single protocol (e.g. an FTP connection and data channels) Figure 3 shows examples of traffic metadata. Some protocols and applications can have more than 50 metadata attributes totaling thousands of attributes collectively which can be selected, correlated and analyzed to provide a complete understanding of the quality and purpose of network events. Figure 3. Examples of Application and Protocol Metadata Application Examples and Webmail Social Networking (Facebook, Twitter, Baidu, etc.) IM (MSN, Yahoo, Skype, QQ, etc.) Web Apps (YouTube, ebay, etc.) Business Apps (CRM, ERP, Citrix, MS Exchange, etc.) Protocol Examples HTTP (Hypertext Transfer Protocol) GTP (GPRS Tunneling Protocol) UDP (User Datagram Protocol) IP (Internet Protocol) RTSP (Real Time Streaming Protocol) SIP (Session Initiation Protocol) Typical Metadata Sender, receiver, login, subject, message, attachments, date and time User login, application URLs/activity, posting activity, tweets, search engine queries, and resulting URL clicks, chats, video streams, file attachments. User login, login / logoff date and time, data transfer sessions (type, content, time), volume (per user, IP, subnet, application) Typical Metadata URL, browser, cookies, URI, referrer, Device, user location, quality of service (QoS) metrics, time, duration Source port, destination port, client port, server port Source address, destination address, source port, destination port, data Play/pause, streaming file, URL, duration Caller, entity called, codec 6
7 Figure 4 compares records from Netflow, an industry standard for IP traffic monitoring, with and without metadata from Qosmos. Netflow alone is fast and repeatable but, because it is neither application nor protocol aware, the standard Netflow record doesn t disclose potential threats. Security specialists must still screen and analyze full data packets and logs manually to find behavioral context using increasingly outdated tools. Event correlations and differentiation of abnormal from normal behavior are difficult. Figure 4. Extended Visibility into Layers 4 through 7 with Metadata Qosmos metadata parse traffic in real time for user behavior and application usage, providing insight into what actually occurred between source and destination. In Figure 4, the Qosmos metadata additions to the Netflow record in this example reveal: 1. A referring party (chicaroo.cc) Why would chicaroo.cc be referring users to our site? 2. A suspicious URL ( login.php) and no cookies Why would anyone go directly to a failed login page without a session cookie? 3. A suspicious browser (curl2.x) not Internet Explorer, Firefox or Chrome, etc., but a command line version of a browser typically used in malicious scripts. 4. The server code is giving a positive result (200) despite the record s irregularities Is someone exploiting a vulnerability? Without the Qosmos metadata, the Netflow record shows how much data was transferred, between what ports and when, but security specialists must still make assumptions when screening traffic data for suspicious activity. The same record enhanced with the Qosmos metadata tells security specialists what actually transpired in the communication. It enables accurate real-time traffic monitoring of both normal and abnormal behavior i.e. situational awareness. Security specialists can work with useful pattern detection and know specifically which records to investigate. In this way, the use of metadata can reduce breach detection from weeks and months to hours and minutes. 7
8 Use Case: Firewalls with Metadata Firewalls historically employ five-tuple filtering of ports and Internet protocols. Basic port inspection, stateful inspection and protocol detection are typically based on predefined ports. Traffic protocols and applications cannot be identified unless ports and IP address are known. By enhancing their solutions with metadata, firewall vendors can enable their customers to filter traffic based on true protocol recognition from Layers 1 to 7. Firewalls today need full traffic visibility independent of ports to block security breaches initiated, for example, through social networking applications, instant messaging and . By enhancing solutions with metadata (Figure 5), firewall vendors can enable their customers to filter traffic in real time based on true protocol detection from Layers 1 to 7, so firewalls act with application awareness. For example, they may wish to allow access to Facebook, but not allow access to Facebook game applications like Farmville. Without metadata, vendors risk considerable time and money developing technology such as Deep Packet Inspection (DPI) and keeping up with changing protocols and applications to defend against new threats. And firewall customers must wrestle with the maintenance overhead of trying to block applications with IP addresses and ports. Figure 5. Firewall Improvements with Metadata 8
9 Use Case: NBAD with Metadata Network Behavior Anomaly Detection (NBAD) requires visibility into normal network behavior as a baseline in order to flag abnormal behavior. To be fully effective, this should include the real-time monitoring of protocols, payloads, virus detection, bandwidth and connection rates. Metadata improve the ability of NBAD solutions to query traffic for suspicious activity and investigative analysis by providing information on: Services or encrypted traffic on non-standard ports Hosts connecting to port 443 and not using the SSL protocol Metadata improve the ability of NBAD vendors to design solutions that query traffic for suspicious activity and investigative analysis. Hosts that started a flow with one protocol, and then changed mid stream (started with SSL then changed to something else) File attachments and user names in any supported protocol (Webmail, HTTP, FTP, file sharing, IM, etc.) A referrer or URL related to a phishing campaign The longest session with high error responses from the server Sessions with traffic that falls out of protocol spec Metadata are essential to effective cybersecurity because they provide the capability to see traffic patterns and to detect cookies that can reveal abnormal network behavior to know where a visitor is on a website at any given time. Metadata are a perfect complement to logs since they can be mixed with log information for a single, more robust view of traffic that can be indexed with data collection and indexing tools. And metadata improve investigative capabilities by requiring less storage than full packet capture, leading to faster data searches and the archiving of historical data for much longer periods of time. Use Case: SIEM with Metadata Security Information and Event Management (SIEM) is constantly required to process and analyze increasing quantities of data, and has a difficult time keeping up with the rising volume of network traffic. At the same time, vendors of Intrusion Protection Systems (IPS) and Intrusion Detection Systems (IDS) are trying to reduce the number of false alerts false negatives from IPS and false positives from 9
10 IDS which diminish their effectiveness. Today, SIEM lacks scalability. And since most solutions use Netflow as an index to correlate events, SIEM also lacks the context of user behavior and application usage to establish situational awareness for allowing or blocking traffic accurately. Metadata (Figures 6 and 7) enable events to be validated before going to full packet capture and provide an accurate and scalable method to build behavioral rules for more reliable alerts. For example, to better qualify IDS alerts, they can be weighted with metadata to screen for traffic parameters such as browser type, URL length, referrer, cookies, connection time, protocol, protocol change and more. Metadata can be used to: Show all inbound IDS/WAF (Web Application Firewall) alerts for a cross site scripting (XSS) vulnerability hidden in good traffic (correlated server response of 200) Reveal the least common URL in traffic and any related IDS/IPS alerts The use of metadata enables IPS/IDS vendors to deliver solutions with better performance, stronger capabilities and a competitive advantage against solutions that rely only on protocol signature sets. Classify protocols on any port and process only the rules that apply for each protocol (10 to 200 rules per traffic flow instead of 2,000 rules per flow) Make more informed decisions on which traffic to allow and block with in-line IPS solutions Figure 6. IDS Improvement with Metadata 10
11 Figure 7. IPS Improvement with Metadata The use of metadata enables IPS/IDS vendors to deliver solutions with better performance, stronger capabilities and a competitive advantage against solutions that rely only on protocol signature sets. For example, metadata: Reduce the noise that IDS produces, and the tuning and filtering time of false positives by 50% Reduce the false negative rate of rules in IPS by 50%, which enables customers to make more efficient use of their IPS without dramatic changes in the way they manage it Detect protocol changes in traffic flow beyond the first 5-10 MB, which eliminates a huge limitation of purely signature-based IDS/IPS solutions Use Case: DDoS Mitigation with Metadata The use of metadata enables vendors and Managed Security Service Providers (MSSPs) to dramatically improve protection against all types of Distributed Denial of Service (DDoS) attacks especially emerging attacks like application-level DDoS at significantly reduced cost per customer. SYN floods are easy to detect and block for most vendors today, but application-level DDoS detection and mitigation (Figure 8) remain difficult since they require better visibility and understanding of protocol and application behavior. Metadata improve visibility and understanding of network traffic and applications, giving DDoS detection the ability to clearly differentiate good from bad traffic, especially for application-level attacks. 11
12 Figure 8. Application-Level DDoS Detection and Mitigation with Metadata Protocol decoding and metadata extraction up to Layer 7 provide complete visibility of all network traffic and applications, giving DDoS detection solutions the ability to clearly differentiate good from bad traffic, especially for application-level attacks. For example, detection can be based on sessions connecting without a session key established over a given time, a URL, referrer, browser, etc. Even SSL renegotiation attacks become easy to identify on a per flow basis when based on metadata attributes. For vendors, the competitive advantage comes from giving customers better protection against attacks without having to increase the expertise or headcount of security specialists. The time to tune solutions is less per site and defense against DDoS is stronger with fewer chances of false alerts. Qosmos DPI Metadata for Cybersecurity Vendors Qosmos specializes in software libraries and tools for cybersecurity vendors to enhance their solutions with DPI and Metadata Data Extraction. Qosmos technology enables vendors to make their solutions applications aware and thereby increase their value to customers by responding to today s need for greater situational awareness in cyberdefense. Vendors who use Qosmos benefit from market-leading traffic parsing technology that can accelerate the delivery of application-aware solutions. As shown in Figure 9, the Qosmos ixengine Software Development Kit (SDK) and Qosmos Labs support services easily integrate into new or existing solutions. Vendors benefit from market-leading traffic parsing technology to accelerate the delivery of applicationaware solutions. Using Qosmos reduces a vendor s time to market with next-generation solutions; 12
13 development time, cost and resource requirements; and the time to update constantly changing protocols. Figure 9. Qosmos Embedded DPI and Metadata Technology Vendors Requirements Support for Network Processors Performance & Scalability Figure 10. Qosmos Technology Alignment with Cybersecurity Vendors Qosmos Technology Qosmos ixengine DPI and Metadata Extraction SDK optimized on Cavium, Intel, NetLogic, and Tilera Handles up to 10 Gbps of traffic on a single chassis Easy Integration C Library APIs (Can also share state table from another application ) Robust Protocol Extraction Wide Range of Protocols & Metadata Integration Support Standardize the Output for Metadata Rapidly extracts metadata from traffic flows, and can change protocol configuration on the fly. (Supports many protocols active at once.) 2,500 application protocols classified and 4,300 metadata extracted Quickly integrates into most systems (90 day acceleration program offered). Provides differentiating technology in security areas where security metadata are just being adopted. Provide help in standardizing output for syslog/netflow/ipfix, (provide a standards framework) 13
14 Figure 10 summarizes how Qosmos technology directly aligns with vendors needs. Qosmos offers market-leading protocol and application expertise, featuring: A library of plugins for classifying more than 2,500 protocols and applications An industry-best 4,300 metadata attributes Advanced traffic parsing capabilities for tunneling, unidirectional flows, fragmented and partial traffic, and packet by packet inspection Robust architecture to handle abnormal and forged traffic Support for core network speeds A custom protocol plugin SDK that allows vendors to develop and update their own protocols On-demand protocol and application development by Qosmos Improving Your Value Proposition to Customers Cybersecurity experts and industry analysts recognize that not all data breaches can be prevented. Adversaries motivated by espionage, fraud, terrorism, socio-political agendas and simply mischief are too many in number and too creative with easy access to increasingly sophisticated tools. The new strategy for All next-generation cybersecurity solutions will leverage traffic metadata. effective cyberdefense is to assume some breaches will occur, but to promptly detect and mitigate them with greater situational awareness of network activity. Traffic metadata provide vendors of cybersecurity solutions with the power to improve their value proposition to customers with solutions that increase their customers situational awareness. This encompasses much better capabilities to 1) differentiate good traffic from bad, and 2) detect and mitigate data breaches faster. All next generation cybersecurity solutions will leverage traffic metadata. The technology, in the form of software development kits and intelligent IP probes backed by constantly updated libraries of protocol signatures and metadata attributes, already exists through specialist companies like Qosmos. Without having to invest substantial time and resources, vendors can integrate pre-developed technology into solutions, complete with robust technical support. Many already have or are in the process of doing so. ### Copyright 2014 Qosmos S.A. All rights reserved. Qosmos, the Qosmos logo, Qosmos Service Aware Module, Qosmos SAM and Qosmos ixengine are trademarks of Qosmos. Other names and brands may be claimed as the property of others. 14
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Going Beyond Deep Packet Inspection (DPI) Software on Intel Architecture
White Paper Intel Platform for Communications Infrastructure Qosmos* ixengine Network Intelligence SDK Network Security Going Beyond Deep Packet Inspection (DPI) Software on Intel Architecture Advanced
Going Beyond Deep Packet Inspection (DPI) Software on Intel Architecture
White Paper Intel Next Generation Communications Platform - Codename Crystal Forest Qosmos* ixengine Network Intelligence SDK Network Security Going Beyond Deep Packet Inspection (DPI) Software on Intel
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
The Value of QRadar QFlow and QRadar VFlow for Security Intelligence
BROCHURE The Value of QRadar QFlow and QRadar VFlow for Security Intelligence As the security threats facing organizations have grown exponentially, the need for greater visibility into network activity
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
IBM Security QRadar QFlow Collector appliances for security intelligence
IBM Software January 2013 IBM Security QRadar QFlow Collector appliances for security intelligence Advanced solutions for the analysis of network flow data 2 IBM Security QRadar QFlow Collector appliances
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
First Line of Defense to Protect Critical Infrastructure
RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
SecurityDAM On-demand, Cloud-based DDoS Mitigation
SecurityDAM On-demand, Cloud-based DDoS Mitigation Table of contents Introduction... 3 Why premise-based DDoS solutions are lacking... 3 The problem with ISP-based DDoS solutions... 4 On-demand cloud DDoS
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring
NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
SECURITY & REAL-TIME APPLICATION INSIGHT
SECURITY & REAL-TIME APPLICATION INSIGHT OCTOBER 2014 AGENDA Knowing what s on your Network Benefits of Application Recognition Deeper Insight and Content Decoding Security Customer Use Case NETWORK SECURITY
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
EAGLE EYE IP TAP. 1. Introduction
1. Introduction The Eagle Eye - IP tap is a passive IP network application platform for lawful interception and network monitoring. Designed to be used in distributed surveillance environments, the Eagle
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail
How Fail Today s Networks And Why Will Prevail Why your current firewall may be jeopardizing your security, and how you can counter today s threats, manage web 2.0 apps and enforce acceptable-use policies.
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
QRadar Security Intelligence Platform Appliances
DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Extreme Networks: A SOLUTION WHITE PAPER
Extreme Networks: The Purview Solution Integration with SIEM Integrating Application Management and Business Analytics into other IT management systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
TIME TO RETHINK NETWORK SECURITY
TIME TO RETHINK NETWORK SECURITY There are three major trends currently unfolding that promise increased efficiency and effectiveness in how we do business. These are cloud computing, big data analysis
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Open Source in Government: Delivering Network Security, Flexibility and Interoperability
W H I T E P A P E R Open Source in Government: Delivering Network Security, Flexibility and Interoperability Uncompromising performance. Unmatched flexibility. Introduction Amid a growing emphasis on transparency
Detect & Investigate Threats. OVERVIEW
Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?
Datasheet: Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-ofbreed
How To Sell Security Products To A Network Security Company
Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity
NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Integrating MSS, SEP and NGFW to catch targeted APTs
#SymVisionEmea #SymVisionEmea Integrating MSS, SEP and NGFW to catch targeted APTs Tom Davison Information Security Practice Manager, UK&I Antonio Forzieri EMEA Solution Lead, Cyber Security 2 Information
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping
Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations
Business Case for a DDoS Consolidated Solution
Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial
Application Intelligence, Control and Visualization
Application Intelligence, Control and Visualization Marco Ginocchio Director of Systems Engineering Europe, Middle East, and Africa [email protected] SonicWALL Over 1.7 million security appliances
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Applications erode the secure network How can malware be stopped?
Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
Cisco Remote Management Services for Security
Cisco Remote Management Services for Security Innovation: Many Take Advantage of It, Some Strive for It, Cisco Delivers It. Cisco Remote Management Services (RMS) for Security provide around the clock
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
