SIEM Log Management Evolved

Size: px
Start display at page:

Download "SIEM 2.0 - Log Management Evolved"

Transcription

1 SIEM Log Management Evolved How logging systems can meet Rapid Detection needs Jonathan Care <[email protected]> This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit 1

2 Table of Contents PROBLEM STATEMENT TAKEAWAYS BUSINESS SCENARIO AND TYPICAL REQUIREMENTS PLAN A - PREVENTION PLAN B - DETECTION PLAN C - INVESTIGATION LOG MANAGEMENT CHALLENGES LOOKING AT THE COLD CASE ARCHITECTURAL CONTEXT PROPOSED SOLUTIONS PLAN DEPLOY IT INFRASTRUCTURE ACCESS DATA VULNERABILITY INFORMATION USER INFORMATION OTHER DATA OPERATE EVOLVE TRADITIONAL SIEM SIEM 2.0 ENTERPRISE SECURITY INTELLIGENCE RECOMMENDATIONS ENSURE INFRASTRUCTURE WILL COPE WITH INCREASED LOAD 19 ENSURE DATA IS CLASSIFIED APPROPRIATELY 19 ENSURE SECURITY INTELLIGENCE SYSTEMS ARE PLACED IN THE APPROPRIATE SECURITY DOMAIN 19 ENSURE EFFECTIVE ACCESS CONTROLS 19 ENSURE BIG DATA IS HANDLED BY TRAINED ANALYSTS 19 ENSURE EMPLOYEE COMMUNICATIONS AND CUSTOMER COMMUNICATIONS REINFORCE THE ENTERPRISE COMMITMENT TO CUSTOMER PROTECTION, EMPLOYEE PRIVACY, AND INFORMATION SECURITY HYGIENE 20 19

3 Problem Statement Enterprises are experiencing an increasing incidence of cyber-attacks on their infrastructure, applications and data sources. Previous attempts have attempted to categorise these into the external attacker and the insider threat. Due to increasing attacker sophistication, the architectural shift to transact information across organisational boundaries, and the growth in demands such as BYOD, these definitions are coalescing. When searching for signs of a breach, a security analyst is typically investigating not only the known threat reported by rule-based systems, but increasingly the unknown threat, previously hidden in credentialed activity, anomalous behaviours disguised by large volumes of machine-to-machine and human-to-machine transactions, and is only observable using analytics on large data sets. Security Intelligence deployment should be incorporated into the overall enterprise security improvement programme, and care should be give to ensure that information protection risks and privacy concerns are addressed. Takeaways The current drive around rapid detection focuses heavily on re-introducing SIEM as a key tool in the information security architecture. Effective security incident and event management requires not only strong technological solutions, but also expert analysts to distill events that matter from the slew of reported information. The fundamental challenges of log management do not change, and one of these is that this is an expensive process that requires a rare breed of analyst, with a mix of technical security knowledge, business priorities, and focus to derive a complex threat pattern from multiple sources. Since SIEM is a definable process (inputs, outputs and KPI s) it is suitable for out-tasking to a specialized company. Generation 1.0 SIEM was notorious for failing to deal with a high load of data directed at it, particularly when endpoint systems (such as workstations) were added. Generation 2.0 specifically sets out to address this, doing away with the concept of normalization, and instead determinedly embracing the stream of what can decidedly be described as Big Data, consisting of all internal events across the enterprise.

4 Business Scenario and Typical Requirements As the complexity of the overall IT architecture grows, incorporating new and existing (plus legacy) applications into its overall integration mix, the amount of transactional information has grown beyond the capability of traditional log recording and SIEM systems. When other security-relevant sources are included, such as infrastructure components, desktop, and even relevant social media sources, HR systems, and physical security systems, the amount of data can quickly overwhelm a traditional SIEM based around relational databases. While Information Security is decidedly an abstract concept noticeable more by its absence than its presence (for example during a breach), a mature security organization will have three primary phases to it s security posture. Plan A - Prevention Prevention starts with detailed understanding of the threat model that the organization (or business process) is subject to. Given a good threat model, it is then possible to visualize the preventive controls that must be applied. Preventative controls are commonly applied during the architecture, design and implementation phase, although as the threat model changes it is important that it is possible to modify, add or even remove controls. Operational controls include patching, penetration testing, firewalling, whitelisting, endpoint security and the like. Increasingly, the software development lifecycle is coming under scrutiny, with requirements code analysis, penetration testing being considered a minimum safe standard. Most important of all are applications made available publicly, including mobile and web these are becoming prime fraud vectors for a monetised and motivated attack group. Risk Management can be a thorny and unpleasant task evaluating each threat in the model and deciding whether there is an effective return on investment in mitigating threats. Because of the asymptotic nature of the typical impact graph, actuarial approaches such as annualised loss expectancy are rarely effective in the heat and thunder of an actual breach. Plan B - Detection Operationally, it is expected that a publicly launched service will attract users with a wide variety of motivations, some of with will be malicious. Hence it is important that the design controls are backed up by robust operational processes. In the context of this paper, it is not enough to design and specify an effective SIEM, it must be operated competently and diligently, which is a resourceintensive task requiring skilled staff. The SIEM solution must be able to cope with not only expected threats, but also Black Swan security events. As an example such events can include a zero-day vulnerability in WebSphere, Cold Fusion, or Java, or even a flaw in a PIN entry terminal. Therefore a key part of a detection strategy is anticipating the failure of technical controls, which then logically follows that the capability to detect early is an advantage. It must be emphasised that third party notification whether it be key customer, your bank, or a random security researcher is a failure in the detection strategy. Having the ability to look at one dashboard

5 showing "wierd" events, and correlating antivirus, system event logs, IDS and vulnerability scans can massively speed detection, allowing the creation of an intruder's dilemma 1 and the limitation of attacks before they become breaches. Its important to note that detection tools need not necessarily involve huge capital expenditure. A variety of tools exist in both the open source world, including OSSEC, suricata, Snort, and Syslog- NG. A limitation of open source has traditionally been the lack of a dashboard, which can highlight important events and trends using visualisations, however frameworks such as ELSA now provide this functionality. Effective detection requires detailed understanding of application design and behaviours, in order to notice behaviours which are anomalous, such as a sudden access to a file-sharing service. Plan C - Investigation With this resilient model for operational security management, it is logical to expect that detection will fail, and that an attacker will breach the organisation. A generalised failing amongst inexperienced security managers is to assume that because the prevention and detection stages of the security model have been apparently effective, then it is safe to neglect the development of an investigative capability, and even to make bold statements such as If this ever happens, we ll go to the market and use external resources - in other words "We never think its going to happen to us". It should be emphasised that running a procurement exercise whilst in the throes of a crisis is extremely challenging, and the temptation to simply take the lowest cost option (or the one recommended by a third party) can be highly damaging. External resources engaged ad-hoc will lack the detailed understanding of the enterprise incident and event management strategy, and will rarely have the focus of bringing the organisation out of a state of crisis and back into normal operation, focusing instead on tactical delivery points. Fortunately for the organisation that has effective preventive controls and strong detection measures, the investigative process is significantly eased and facilitated by these. Edge cases and unusual behaviours will provide key indicators in establishing a timeline of events leading up to (and following) a breach event. Like any disaster readiness plan, a good incident response readiness plan must be dry-tested. As SIEM evolves into Enterprise Security Intelligence, vendors are touting techniques and tools used in other Big Data applications, therefore it is important to define what this actually means. Big Data is defined as a three-v problem, that is: Big Volume more than can be handled by traditional SQL based database management technology While researching for this article, it emerged that the number of IT managers who are still using PCI DSS as a driver is dramatically

6 Big Velocity styled as drinking from the fire hose, indicates that the stream of data is constant and rapid Big Variety data is from a variety of sources, and includes both structured and unstructured elements It becomes clear from this example that one constraint on the success of Big Data in security is the quality of the Big Analytics that can be applied to it. No vendor on the market is making a claim to reduce the demands for strong analytical and statistical skills from the human analysts who are responsible for producing actionable intelligence. The errors of false correlation/causation, null hypothesis errors (both false positive and false negative) are well known in many fields. Therefore we can define Enterprise Security Intelligence as the collection of data from all IT systems in the enterprise that could be security relevant and the application of the security teams knowledge and skill, resulting in risk reduction. The SANS log management survey (2012) identified the top challenges in log management as: Identification of key events from normal background activity Correlation of information from multiple sources to meet complex threats Lack of analytics capabilities Data normalisation at collection Data sources are many and varied, and may include both internal and external feeds, for example: Application data Physical Security DHCP/DNS GPS Netflow AD/LDAP VPN Social Media It is clear from observing the example data sources above, that much of the information in the analyst s scope will have at the very least a personal identifiable information (PII) characteristic to it. Potentially, application data could include data subject to specific compliance regimes such as PCI-DSS, Sarbanes-Oxley, Basel, or others.

7 Log Management Challenges In 2012, the SANS Organisation conducted a survey of its members asking What are the top three challenges you face in integrating logs with other tools in your organisation s overall information infrastructure? What we can derive from this is that there is a common pain felt at the inability to get timely, relevant information amongst the user community. In addition, log managers are coming to grips with the unfortunate reality that having technical solutions in place does not obviate the need for expert analysts the tools enhance, and do not replace, human expertise. Another noticeable issue is that of data reduction and normalization. A typical SIEM will only report useful information on a subset of all security relevant information in an organization. SIEM s largely correlate machine-to-machine data into Known events, which therefore means that Normal user and machine data will be filtered out of the information set, and hence unknown threats requiring analytics will be missed. In essence then, traditional SIEM architectures, whether managed internally or externally, require that the IT manager know what is required for investigation before the need emerges. It is also true to state that security relevant data can come from anywhere, not just sources specified by the vendor. The lack of scalability inherent in the funnel SIEM architectural model shown on the left restricts visibility by design, and means that events generated will tell the IT manager what is known, but not what is unknown. In the area of cold case forensic investigations, which includes many fraud investigations and data breaches, the data abstraction means that it is impossible to examine original data generated at the time, and that all that is left to the investigator are the event reports which failed to alert a breach incident in the first place. Looking at the cold case As mentioned earlier, much digital forensics work can be described as a cold case investigation. When a forensic investigations team is called in, it can be many months after the original data breach. In many cases, log event data is simply unavailable due to failure on the part of IT management to ensure it is kept (which is a violation of several compliance

8 standards, including PCI DSS 2 ). This not only impedes the investigation, but also where a regulatory authority is assessing fines, can have a substantially negative impact. Normative statistical analysis is the most important thing you can do. - Patrick Reidy, CISO FBI Another challenge to the investigator is that when viewing a condensed or normalised event log it is impossible to sensibly interpolate new data into old security events. Thus reinvestigating the breach in the light of new information, such as recently disclosed vulnerabilities, becomes a hard problem. The emergent mindset in investigative analysis involves a mix of convergent and divergent thinking, mixing pattern matching, statistical methods, with the traditional method of unconcealing. Baselines of activity are created, and then standard deviations of these norms are investigated. Abnormalities in user activity can be investigated using the following combinators: Location Action Type Role Data/Asset Type Time of Day How long did the action take Data/Asset Criticality 2 While researching for this article, it emerged that the number of IT managers who are still using PCI DSS as a driver is dramatically reducing. IT expenditure boards widely regard PCI DSS as overly prescriptive, unwieldy, and hence it is seen less as an business driver, more as a regulatory constraint that must be managed to minimize business impact.

9 Architectural Context In order to effectively utilise and safeguard a security intelligence programme, it is important to be able to place this not only within the context of a security improvement programme but also within a coherent security architecture. The specifics of security architecture will be based on the requirements of the enterprise and the IT services delivered, and also on the capability maturity of the enterprise at a point in time. As a cautionary note, it is important that a realistic picture of the enterprise s maturity as regards information security is measured and understood. Understating the enterprise maturity leads to a lack of confidence in the ability to deliver and operate, while overstatement leads to embarkation on ambitious projects, with over-reliance on vendors, ultimately leading to abrogation of leadership in the delivery context. Our data inclusion model will look radically different to one used for traditional SIEM. No up-front normalisation, time-indexed data, Analytics and Statistics Commands, Correlation, and Pattern Analysis will all feature in the model, in somewhat sharp contrast to traditional SIEM event funneling. Specific points in the security architecture that will directly support the development and delivery of security intelligence capability include: Effective Information Lifecycle Management, in particular data classification. This should answer the following questions, which will identify key information assets: What data is available? Where is it located? What access levels are currently implemented? What protection level is implemented and does it adhere to relevant compliance regulations? Help (and not hinder) privacy efforts. A security intelligence capability will process sensitive employee-related information, therefore in addition to the usual access controls and data safeguards, it is important to consider the effect of this capability on employee morale, management decisions, and indeed on brand identity. A security intelligence capability should not be used instead of effective management communications, employee leadership and workplace ethics; instead it should support and enforce strong practices in these areas. Aid regulatory reporting. Security intelligence should provide actionable reports that improve the enterprise compliance stance. Operate within multiple IT security domains. Security intelligence should be able to consume and rate information from all IT security domains, and incorporate the trust level of the security

10 domain as a factor. For example, correlation of sentiment on twitter in the time frame before an attack on the enterprise also correlated with marketing and sales campaigns. Incorporate lessons learned and best practices, both internally and externally. The SANS log management survey referenced above reveals several key requirements that may be expected of a security intelligence programme. In particular, effective security intelligence requires raw data that has not been subject to normalising at the point of collection. Availability of this raw data allows for retrospective analysis of incident data, and correlation and analysis with previously unavailable information sources.

11 Proposed Solutions A security intelligence solution can broadly be seen as an evolution of the SIEM, addressing the issues of integration of various point security products, allowing processing and correlation of data in real time, improving the real time security posture, and reducing the costs of remediation in the event of a breach by quickly identifying and mitigating breach damages. Gartner have produced their magic quadrant of SIEM vendors which may add value to the product research process. It is not the purpose of this paper to provide vendor analysis, although the emergence of visionary product solutions which draw heavily from open source development is of great interest. A SIEM deployment framework can be defined as follows: PLAN Plan In the planning stage, we can define the data sources (in broad sweep) An ever-present challenge to any enterprise is the data itself; increasingly the enterprise Expand Deploy runs the risk of being overwhelmed by the sheer volume of data that may provide valuable operational and security information. This struggle is at the heart of the big data issue that has been recently expressed. A similar struggle exists with the drive to provide timely actionable intelligence from this volume of data, and hence the growth of next generation SIEM, providing security intelligence. DEPLOY Evolve Operate A prevailing question in IT risk management is the likelihood of a particular security event or class of events. This becomes important when considering the tolerance of the enterprise to events, which at first look have an impact that threatens the survival of the business. Security intelligence

12 by its nature purports to give insights into the actual risk exposure by determining patterns of behaviours behind activities and alerting appropriately. However determining the impact and likelihood of black swan events (high impact, low likelihood) is one that will require skilled analyst input due to the nature of such an event, statistical information is rarely available. Data may be acquired from a number of sources both internal and external to the enterprise. Such sources include (but are not limited to) the following: IT Infrastructure Network Devices: logs from routers, switches, information from network access control (NAC) tools, and NetFlow data. Security Devices: logs from firewalls, IPS, and other security appliances Servers: log files from servers in data centres and offices; includes physical, virtual and public cloud instances User end-points: device information, network context, access history, records of ownership and records losses SCADA (Supervisory Control and Data Acquisition) infrastructure: data about the operation of and access to industrial control systems, their network mapping and access history Access Data Databases: Access logs. Tools such as Guardium may be used to monitor and control access to database resources, and the events recorded from such a tool are key to an early detection strategy. Other data access information: Content use monitoring, data loss prevention, and content filtration systems Business Applications: access logs for both on-premise and on-demand applications. Application activity logs are frequently overlooked in the rush to SIEM and can provide key insights into unexpected and potentially unauthorized activity. Web access data: includes chokepoint information on web uploads and downloads; feeds from DLP tools and web filtration are key to ensure that this threat vector is accurately analysed by the SIEM records: Who has been sending what to whom? While content analysis is rightfully frowned upon as a privacy violation, traffic analysis using header information can be carried out in a warrantless (and thereby unrestricted) manner.

13 Vulnerability information Third party feeds: from other IT vulnerability assessment and mitigation systems such as Tenable, Rapid 7, Qualys and FireEye.With the rapid growth in automated code analysis, it is conceivable that vulnerabilities discovered Software integrity information: patch state of operating systems, firmware, database and applications, list of known flaws Known malware: Lists of known malware that may be used as part of more complex attacks. Given the rise in targeted malware and new endpoint attacks (such as PIN entry devices) it is important that the knowns list is kept up to date as much as possible. Indeed, it may be that endpoint protection focuses on whitelisting, reporting and preventing software that does not meet the whitelist criteria. User Information User Information: data from directories that defines authorised users and their assigned groups, this includes information about current and past job roles. When correlated with Access data and vulnerability information, this becomes a key resource for identifying actors in an incident timeline Access Rights: current access rights for an individual or class of users Privileged Access Rights: records of the temporary or permanent assignment of privilege to named users Guest Access Rights: information from network access control systems about areas of networks enabled for guest access Third Party Access Rights: records of outside organisations and users that have been authorised to access infrastructure and applications Machine access rights: not all access is by humans; software applications and devices are also regularly assigned access rights; for example to carry out automated system administration Other Data Change control systems: list approved system administration activity and highlight unpex Location Data: IP and cellular geolocation indicating where access requests are originating Regulatory/standards based information: As an example, ISO27001, which many enterprises have adopted as a baseline Industry bodies: providing advice to their members on known complex attacks and how to coordinate defence against them

14 Social media feeds: identifying increased levels of sentiment targeting an enterprise. Note that sentiment may be positive or negative, and still be a powerful indicator of threat increase. Weather: unusual weather conditions in a certain area may account for observed large scale changes in user activity Time: accurate coordination is not possible without good timekeeping; an accurate source of time is needed across different systems and may be added to records to keep them pertinent over long periods. NTP serves this purpose well however sufficient access controls must be applied in the configuration. 3 3 See Team Cymru s NTP templates at

15 OPERATE As can be seen, the apparent sensitivity of the various data feeds described above varies from very low to very high. However, in aggregate and when combined into a descriptive timeline by a trained analyst, there is a clear requirement for strong information protection requirements. Using the classical Confidentiality-Integrity-Availability model, then it can be simply stated as follows: Table 1 Data Assurance requirements Data item Confidentiality Integrity Availability Discrete data record Varies Varies Varies Aggregate dataset High High Medium Analyst reports High High Medium Incident resolution reports High High Medium The reasoning behind this is that once aggregated, much of the data will form a user-centric timeline, detailing the activity of human actors through the IT systems in the enterprise. This will include customer activity, employee actions, as well as malfeasance on the part of external attackers and disgruntled insiders. The need for privacy (that is, confidentiality) of this data is therefore high, and governed by various regulations (for example, the UK Data Protection Act, and in the case of US medical information, the Health Insurance Portability and Accountability Act). One of the prime goals for a security intelligence programme is risk reduction, accomplished through actions instigated by security analyst reports. Some actions will be relatively low-impact (for example, install malware tools on BYOD laptops at no charge ); others may involve significant incident response intervention and liaison with law enforcement, at far higher cost. Several solutions exist to the challenge of safeguarding security intelligence source data, resultant analysis, and archived information. The enterprise can make an explicit choice, based on risk analysis of their environment, not to safeguard privacy or implement specific information assurance controls. This may be a sign of the relatively stable and low-risk nature of the business streams the enterprise is engaged in, or perhaps is a sign of the relative immaturity of the enterprise with regards to security awareness. It is probable that an enterprise at this low level of maturity will not fully realise the investment in Enterprise Security Intelligence, and thus it should be put further along the security improvement programme timeline. Having made a conscious choice to engage in deployment of Enterprise Security Intelligence, and having satisfied architectural constraints and pre-conditions, the architect can then make suitable choices as to storage of information assets relevant to the new system. These will include both

16 input and output assets as described above, and will include diligent role-based access controls for analysts, incident responders, IT administrators, risk managers, and IT executive management, all of whom will have different informational needs from the system. Protection of data in transit (stream-based cryptographic systems) is unlikely to generate new requirements as a result of deploying a Big Data system as described, however it should be recognised that existing data assets that become inputs to the system may have intrinsic protection requirements as a result of enterprise data classification rules or over-arching regulatory frameworks. It is considered that once aggregated (or collected), that appropriate measures are used to protect data in storage. Since Big Data Analytics requires pure raw data to be preserved, the most appropriate protection mechanism is a cryptographic one, as opposed to one using tokenisation or truncation. It must be emphasised that while cryptographic techniques are relatively easy to apply, the first-time enterprise adopter in the field of key management frequently faces operational challenges, and best practice guidelines such as ISO11568 (for financial services) and ISO11770 (as a more general model) are recommended. It should also be noted that a security intelligence package can use access requests to itself as an input item, thus providing a measure of useful self-protection. Another decision point to be made when deploying Big Data Analytics is how to communicate the change to stakeholders. Both employee and customer data is in scope of enterprise security intelligence programmes, and there is a risk of significant negative sentiment, with the accompanying risk of brand damage and lowered employee morale, should this be seen as intrusive on privacy. Many enterprises considering the adoption of this technology will be operating in a tightly regulated and controlled environment such as financial services, and thus the change in management style and working conditions will be minor. Many online services from retail to consumer finance make no secret of the extensive tracking of customer activity to drive business processes, however the all-inclusive use of Big Data analytics specifically to enforce and limit breach damage and other attacks may create concern. It is recommended that deployment of Enterprise Security Intelligence is proactively championed by executive management as part of the enterprise commitment to customer safety and privacy, and to assist the employees of the enterprise in defending against bad actors, and that the controls over stored data will enhance employee privacy, rather than lessen it.

17 EVOLVE Traditional SIEM SIEM is without doubt a key component in the modern security manager s toolbox, and can provide indicators of operational and security events. Consultants are frequently asked What good is SIEM to me, and so it is worthwhile examining what typical threats are detected. A sample is shown below, together with example sources and watch points. Threat Phase Source SIEM Search Why Spear Phishing Infiltration Mail logs Affinity of Sender Spear phishing sender address is unlikely to have communicated previously with the organisations mail servers Bad Mail Links Infiltration Mail logs Domain Affinity Low/slow exfiltration Form based exfiltration HTTP Command and Control (CnC) Exfiltration Proxy/Firewall logs Average bytes per GET Exfiltration Proxy logs Transaction: POST without GET Exfiltration/CnC Proxy logs Long URL without a referrer URL is unlikely to appear previously in organization web servers attackers can be fingerprinted Small amounts of data leaving in many sessions over time Large amounts of data leaving in few sessions. POST without GET implies an automated process Botnets commonly embed CnC messages in the URL All these threats are well understood, and indeed could be argued that in the modern IT environment, pre-emptive and protective controls are put in place to guard against these. However, some other threats that are still being used to exploit vulnerable IT environments are detailed below, together with the kind of statistical approach that SIEM 2.0 enables. SIEM 2.0 Enterprise Security Intelligence When examining what SIEM has now become, its also worthwhile to examine the threats that the modern enterprise is experiencing which previously have been below visibility of the SIEM, and hence ignored. Threat Phase Source Statistical Search Why SQL injection Infiltration Weblogs len(raw)+2.5stddev Hackers put SQL commands in the URL. Therefore URL length is standard deviations higher than normal Password brute forcing Infiltration Authentication logs short delta_time Automated password guessing tools enter credentials much faster than humanly possible

18 DNS Exfiltration Exfiltration DNS and Firewall logs count +2.5stddev Web Crawling Reconnaissance Web/FTP logs count(src_ip) +2.5stddev Hackers exfiltrate data in DNS packet; standard deviations more DNS requests from a single IP Web crawlers copying the web site for comments, passwords, addresses will be the source IP behind page requests standard deviations higher than normal Port Knocking Exfiltration/CnC Firewall count(deny) by ip Threat does inside-out port scan to identify exfiltration points As can be seen, the use of statistical methods on data sources that would previously have been considered too large for a traditional SIEM setup can yield key information on attackers. Using this threat intelligence wisely allows effective use of incident response resources, including law enforcement, and minimises the breach window between active penetration and detection. SIEM 2.0 is likely to be a distributed implementation, with data sources being calculated and correlated at many discrete points in the enterprise architecture. The amount of event data is massive and to store it at a central point creates significant O(n 2 ) scalability challenges both in network and storage infrastructure. Rather, it is preferred that SIEM 2.0 probe points contain intelligence enough to perform limited correlation, and send back correlation events to a central point, while retaining sufficient storage to allow more detailed analysis to be performed.

19 Recommendations When architecting, designing and implementing Enterprise Security Intelligence, the following recommendations should be considered: Ensure infrastructure will cope with increased load By its nature, large amounts of data will be transmitted and stored in a central point. This will place higher load on networking and server/storage components, possibly requiring increased use of direct attached storage (DAS), dedicated network topology, and higher throughput components such as routers and firewalls. Ensure data is classified appropriately Data will be gathered from diverse sources and re-purposed to provide actionable intelligence. In order to devise appropriate safeguards, this data must be classified effectively. Care must be given to consider the aggregate effect of new datasets gained by combining previously disparate and apparently unrelated data sets. Ensure security intelligence systems are placed in the appropriate security domain Since all information within the enterprise can be considered to be potentially within the scope of the security intelligence process, the systems should be placed in the IT security management domain, with restrictions and technical controls applied in line with enterprise security policies. Ensure effective access controls The information carried within a security intelligence system is deemed highly sensitive. Therefore care should be taken to ensure that access is granted on a least privilege required basis, with separation of duties wherever possible. Role based access controls must be defined for IT executive management, incident responders, IT system administrators, Risk managers, and auditors, and for any other roles with a legitimate business need to derive output from the security intelligence system. Ensure Big Data is handled by trained analysts Much of the analytical process is based around the use of statistical methods to determine probability. Given the relative new market presence from vendors, it is assumed that the requirement for trained data scientists to provide informed input and analysis is accurate. Security intelligence tools will need to make finely balanced decisions to avoid blocking valid, but unusual actions by bona fide actors. Therefore, it is important that inexperienced staff not introduce statistical errors and flaws. This in itself may well be a key business justification to investigate outsourcing the SIEM process to a solution provider.

20 Ensure employee communications and customer communications reinforce the enterprise commitment to customer protection, employee privacy, and information security hygiene As with any technical measure intended to improve enterprise information security posture, it should be deployed as an adjunct to an improvement in process and awareness. Given the wide ranging scope of a Big Data security intelligence tool, it is strongly recommended that the corresponding communication, education and awareness programme be equally wide ranging.

A Love Affair: Cyber Security, Big-data and Risk

A Love Affair: Cyber Security, Big-data and Risk A Love Affair: Cyber Security, Big-data and Risk Mark Seward, Senior Director Security and Compliance, Splunk Inc. Professional Techniques - Session 31 Security what s at stake On average, organizations

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats? Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats? Will Froning, Information Security Manager, American University of Sharjah Mark Seward, Senior Director, Security and Compliance

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Using Big Data to Align IT Security with Business Risk Mark Seward, Senior Director, Security and Compliance

Using Big Data to Align IT Security with Business Risk Mark Seward, Senior Director, Security and Compliance Copyright 2013 Splunk, Inc. Using Big Data to Align IT Security with Business Risk Mark Seward, Senior Director, Security and Compliance Legal Notices During the course of this presentation, we may make

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

www.contextis.com Effective Log Management

www.contextis.com Effective Log Management www.contextis.com About About Information Security has a client base including some of the world s most high profile blue chip companies and government organisations. Our strong track record is based above

More information

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

RSA Security Anatomy of an Attack Lessons learned

RSA Security Anatomy of an Attack Lessons learned RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack

More information

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES PROTECTIVE MONITORING SERVICE In a world where cyber threats are emerging daily, often from unknown sources, information security is something

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

RAVEN, Network Security and Health for the Enterprise

RAVEN, Network Security and Health for the Enterprise RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

SIEM is only as good as the data it consumes

SIEM is only as good as the data it consumes SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization WHITEPAPER Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization Understanding Why Automated Machine Learning Behavioral Analytics with Contextualization

More information

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a

More information

Cisco SAFE: A Security Reference Architecture

Cisco SAFE: A Security Reference Architecture Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

Cisco Security Intelligence Operations

Cisco Security Intelligence Operations Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,

More information

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa. Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Critical Security Controls

Critical Security Controls Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

ThreatSpike Dome: A New Approach To Security Monitoring

ThreatSpike Dome: A New Approach To Security Monitoring ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Extreme Networks Security Analytics G2 Vulnerability Manager

Extreme Networks Security Analytics G2 Vulnerability Manager DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering

More information

CLOUD GUARD UNIFIED ENTERPRISE

CLOUD GUARD UNIFIED ENTERPRISE Unified Security Anywhere CLOUD SECURITY CLOUD GUARD UNIFIED ENTERPRISE CLOUD SECURITY UNIFIED CLOUD SECURITY Cloudy with a 90% Chance of Attacks How secure is your cloud computing environment? If you

More information

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares

Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

The Changing Nature of Risk and the Role of Big Data

The Changing Nature of Risk and the Role of Big Data The Changing Nature of Risk and the Role of Big Data Jack Danahy Director / North American Security Consulting IBM Incidents Continue to Grow in Spite of Investment 2012 Sampling of Security Incidents

More information

Under the Hood of the IBM Threat Protection System

Under the Hood of the IBM Threat Protection System Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE [email protected] 1 You are an... IT Security Manager at a retailer

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM The Benefits of Integrating File Integrity Monitoring with SIEM Security Information and Event Management (SIEM) is designed to provide continuous IT monitoring, actionable intelligence, incident response,

More information

Enterprise Computing Solutions

Enterprise Computing Solutions Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

ALERT LOGIC FOR HIPAA COMPLIANCE

ALERT LOGIC FOR HIPAA COMPLIANCE SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources

More information

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to

More information

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011 10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s

More information

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA Changing Threats and More Demanding Regulations External

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information