Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
|
|
|
- Noel Hudson
- 10 years ago
- Views:
Transcription
1 Sponsored by McAfee Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2 May 2013 A SANS Whitepaper Written by Dave Shackleford The ESM Interface Page 2 Rapid Event Analysis Page 5 Policies and the Advanced Correlation Engine Page 9 Promoting Situational Awareness Page 13
2 Introduction Many organizations today are using security event management tools to gather, correlate and report on security data within their environments. Although some are still using traditional log management tools, the need for more effective event intelligence and deeper analysis of activity within the environment is driving more interest in, and use of, security information and event management (SIEM) platforms. In 2012, the SANS 8 th Annual Log Management Survey revealed that the majority of responding organizations are leveraging security event data for the following: 1 Detecting and tracking suspicious behavior Supporting forensic analysis and correlation Achieving/proving compliance with regulatory requirements These are essentially the same use cases year after year, with a continued emphasis on saving time and making security operations as efficient as possible. Unfortunately these goals are complicated by an ever-increasing volume of event data and the growing sophistication of attacks. For example, respondents to the SANS log management survey indicated that one of their biggest challenges was the identification of key events from background activity in other words, finding the needles in the haystack. They perceived detection of advanced threats as being difficult, including the day-to-day use cases for SIEM tools, such as tracking suspicious behavior, supporting forensics analysis or preventing incidents. Given the nature of today s attacks, this use of SIEM is merely scratching the surface. Security teams need tools that can help them identify events quickly, distill large volumes of event data into simple timeframes for rapid analysis, and incorporate more types of data than ever before. An increasing number of organizations are looking to develop and incorporate new sources of threat intelligence, with the hope of getting ahead of threats. To do this, new and different data from a variety of different sources is needed, and advanced analysis capabilities to normalize and correlate this data with security information will be useful, as well. On top of this, analysts need tools they can implement with ease in a reasonable time period, while quickly extracting meaningful information from event stores. To this end, we had the opportunity to review McAfee s Enterprise Security Manager (ESM) 9.2 with a focus on fundamental SIEM features and capabilities to meet this new business demand for security and threat intelligence. Overall, the tools were easy to use. Key features such as the ability to integrate related McAfee products, including Vulnerability Manager, Network Security Platform, epolicy Orchestrator (epo) and Global Threat Intelligence (GTI) were tested. Overall, the product performed in a means that was intuitive and easy on the security admin or manager. These and other details are covered in this paper. 1 SANS Analyst Program 1 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
3 The ESM Interface Naturally enough, we began the review by exploring the ESM interface, which within minutes, felt almost infinitely customizable. Although this review did not include physical setup, we did configure features within the interface as part of our evaluation. Users can shape the interface into views that contain numerous different displays of information, and creating these and switching among them was incredibly simple. This is a vitally important feature for enterprise security teams: Focusing and simplifying the UI of a complex investigative tool such as a SIEM system can save hundreds of operations hours each year, and makes for much easier installation and tuning. ESM offers one of the most user-friendly interfaces we have seen from a SIEM system to date, offering immediate benefits to IT teams with minimal time spent setting it up. The ESM interface is composed of several distinct panes: Event Summary: Displays major malicious events detected Source IPs: Displays source IP addresses noted in events Total Events: Displays a simple metric for keeping up with overall event counts in the environment Event Distribution: Charts event counts as a graph over time Destination Geolocation: Displays the location of events in a specified period Figure 1 shows a typical dashboard view of these panes. Figure 1. The ESM Dashboard SANS Analyst Program 2 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
4 The ESM Interface (CONTINUED) In the uppermost right corner of the center pane is a drop-down menu for specifying the time range viewed, with built-in ranges from the last minute to several years (shown in Figure 1 immediately above the Total Events gauge, with the Current Month selected). Custom ranges can be set easily as well. On the left side of the display, users can create or select different displays, enabling them to customize their system navigation. Many users might opt for a display of the entire aggregated set of data within the ESM platform for others, circumstances may dictate the display of only a single device type or source for drill down and deeper analysis. In the center, we started with the view of the SIEM s event analysis. To create a new view/dashboard element, we clicked the appropriate button from the left pane, then dragged and dropped different elements (for example, graphs, tables, and source and destination graphs and lists) onto the page. Then we selected the types of queries (system details, traffic types and so on) that will feed these elements. Finally, we placed the elements where desired. Figure 2 shows an example of this process, in which we created a new view that includes a pie chart of OS deployments. Figure 2. Customizing the ESM Interface On the right-hand side of the interface, the user can create a number of flexible filters to look for and select only specific data from the view. The number and types of filters are extensive, with options for filtering on traffic, device attributes, protocols, specific services and other characteristics. SANS Analyst Program 3 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
5 The ESM Interface (CONTINUED) Finally, the upper-right corner of the ESM interface displays up to nine small Quick Launch icons that direct users to important product features, as shown in Figure 3. Figure 3. Typical Set of Quick Launch Icons These provide access to the following functions and capabilities (in order, left to right): System Properties. This contains information about the system, its hardware platform, application and OS licenses and other basic details. Asset Manager. The Asset Manager polls devices discovered on the network for their configuration details. It can group discovered assets into zones for risk classification and identification, and is useful in configuring network discovery tasks. Reports. You can set ESM to generate reports on the fly or according to a schedule. The reports can be custom or standard reports provided through ESM. Alarms. These can send a variety of alerts, which can be aggregated into a simple view, to analysts. For example, an analyst could have an alarm triggered by a specific threshold of traffic, or certain types of rules that were triggered, and ESM could send an notifying the team. Watchlists. These can monitor for specific objects or identified systems, users, traffic, protocols, ports, addresses and more. When the targeted object is spotted, a rule will then notify an assigned analyst. Case Management. In this feature, you can create and track event cases. This is a simple incident tracking system that functions in a manner similar to basic ticketing applications. Enterprise Log Manager (ELM) Search. This feature queries specific log events if ESM is connected to McAfee s Enterprise Log Manager. Not seen in Figure 3 are the remaining Quick Launch icons: Policy Editor. The platform s rule engine operates in a variety of categories, ranging from intrusion prevention system (IPS) signatures to firewall rules, database monitoring, and others. Correlation. This icon accesses the correlation engine, which combines policy rules and custom parameters to create complex filtering and alerting definitions that only trigger alerts when several conditions are met, such as IPS rules and specific source addresses appearing together. SANS Analyst Program 4 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
6 Rapid Event Analysis Given the amount of data many security teams are collecting today and the complexity of current threat scenarios, it is vital that the security teams be able to rapidly pinpoint events of interest and view granular details of events and network traffic. In breach and attack scenarios where seconds count, security teams will appreciate ESM s ability to find what they re looking for quickly. We tested a variety of scenarios, using different dashboard views that were populated with security events and correlated data, to see how quickly we could find useful information for security analysis. Ultimately, the easiest way to get started was to find the specific information pane in the dashboard that we were interested in, highlight a data range or specific event type, and quickly zoom into this data for more in-depth searching and analysis. For example, by clicking a specific event type (for example, Malware sent from internal source ) in the Event Summary pane, we could immediately update other panes, such as Source IPs and Event Distribution, with this event type. This type of self-learning and updating is important because threats and attack methodologies continue to advance. Having loaded the various panes with specific event data we wanted to capture, we then drilled into the data by highlighting a cross-section of the visible data, continuing this process until we reached an appropriate level of detail and granularity. For example, we selected successively smaller date ranges for events in the Event Distribution pane until we had several thousand malware events within a several minute period on a single day. Highlighting any one of these events then updates the Source IP pane with the event s source IP address, as shown in Figure 4. Figure 4. Rapid Drill-Down into Events SANS Analyst Program 5 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
7 Rapid Event Analysis (CONTINUED) As for speed and efficiency, we managed to get to this level of fine-grained detail in only a few seconds, which was impressive and absolutely critical in the case of an event in progress. We also explored a variety of different dashboard panes and views, some of which are available in the product in its default configuration. The views we used included the following: Application Activity. This view shows specific applications and services communicating in the environment, ranging from SSH to Kerberos and QuickTime. We were able to quickly discern the top traffic related to these services, in terms of hosts, source and destination users and IP addresses, and total events and severity of the events detected. Figure 5 shows this dashboard. Figure 5. Application Activity Dashboard SANS Analyst Program 6 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
8 Rapid Event Analysis (CONTINUED) Incidents. This dashboard showed us the correlated events over a given period, with source and destination IP addresses, events and event distribution over time, severity, and network flows between source and destination. This enabled us to explore the Flow Source and Destination Graph pane, which instructs the analyst to drag a source or destination to the center of the pane to display and highlight its connections. Figure 6 depicts this graph, after some simple tuning and investigation. Flow Packets by Destination and Source. This is another useful gauge of network flows that can be correlated against our last example. A quick display of source and destination IPs appeared, with the number of flows by packet count displayed. This data is useful for tracking the event to specific IPs to gauge where the event originated from as well as its attempts to spread. Figure 6. Source and Destination Flow Analysis We then explored the drill-down options for these views. First, we expanded the destination IP addresses to show a separate view of source ports alongside it, as shown in Figure 7. Figure 7. Expanding Flow Analysis Data SANS Analyst Program 7 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
9 Rapid Event Analysis (CONTINUED) This enabled us to start analyzing traffic and determining what applications might be communicating most frequently. This is a good means for baselining normal traffic as well as detecting abnormal flows. Then, we drilled into the distribution of noted vulnerabilities by asset from the same pane, which enabled us to look at data fed to the ESM platform by McAfee s Vulnerability Manager product. This is critical for organizations needing to distinguish real events from noise and to make critical improvements so that such events cannot occur again. In summary, with one set of actions in a single pane, we started with source and destination flows by packet, expanded packets by destination to include source ports, and then looked at noted vulnerabilities for these destination systems as well, all in the space of several minutes. We found the speed of analysis and the quality of data presentation to be excellent. SANS Analyst Program 8 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
10 Policies and the Advanced Correlation Engine Next, we turned our focus to the policy and correlation rule engine within ESM, which can be one of the most complex aspects of a SIEM system. Security teams need a relatively simple interface, coupled with a flexible and powerful rule engine. Most security teams spend a fair amount of time creating and tuning rules, so this process needs to be as easy to use as possible. Creating Rules After opening the policy editor, analysts can first evaluate or create new variables. These variables are useful for defining network details and other data for use within rules and help clarify the purpose of the rules and simplify their creation. For example, a basic variable called HOME_NET (a McAfee default variable) can be configured to represent an internal IP address range (for example, /24) and then called from within rules as needed. Analysts can create many different rule types in several major categories. The first rule category is IPS. This type focuses on intrusion detection and prevention capabilities, and enables native access to and easy inclusion of McAfee IDS or IPS platforms within ESM. IPS preprocessor rules are anomaly detection and packet inspection rules for McAfee Nitro IDS/IPS and include fragmented packet analysis and reconstruction, port scan analyzers, HTTP traffic normalization and more. Rules in the Firewall category cover basic packet analysis and traffic control; source and destination ports and IP addresses can be monitored and blocked, alerts can be sent, and other actions initiated. In addition, analysts can use these rules to generate a blacklist of addresses and/or ports automatically, consolidate the blacklists into a unified view and take further steps. Figure 8 depicts firewall rule creation. Figure 8. Creating Firewall Rules SANS Analyst Program 9 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
11 Policies and the Advanced Correlation Engine (CONTINUED) Deep Packet Inspection rules enable more advanced IPS rule customization and application through the use of rule attributes and options. Another main rules category is the set of Receiver rules. These rules pertain to the McAfee Event Receiver, which can accept numerous event types, including firewalls, routers, flow data, IDS/IPS, among others. Instantiating this class of rules is simple, enabling the user to define specific actions to be taken when the Event Receiver detects specific data types. For example, Advanced Syslog Parser rules can include regular expression pattern matching and perform specific actions on only the identified portions of logs sent to the Event Receiver by numerous platforms. Data Source rules are automatically created as Event Receiver notifications come in, and Windows Event rules activate McAfee-defined events that can trigger responses or packet data capture for Windows events that the Event Receiver sees. Other rule categories include Application Data Monitor (ADM) rules, which enable more complex and deeper analysis of application behavior profiles and traffic, and Database Event Monitor (DEM) rules, which can monitor database transactions for a variety of events. We experimented with a range of rule types within ESM. Most of these were very intuitive to work with, although the number of options available is exhaustive. Many have drag-and-drop interfaces, allowing the use of simple Boolean statements, and all have a graphic interface with form fields that enable the selection of particular conditions. McAfee has also simplified the integration and use of normalization, a key element in rule-based correlation. McAfee maintains a list of normalization rules that brings together similar rules from different vendors and products under one ID within ESM. Analysts can then use the rules in different dashboard views, filters and event summaries. SANS Analyst Program 10 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
12 Policies and the Advanced Correlation Engine (CONTINUED) Correlating Event and Activity Data Correlation was our next area to review. The ESM appliance that we evaluated had a number of correlation rules built in, and we generated several new ones as part of our test cases. With any SIEM product, the correlation capability and rule set tend to be critical aspects of success or failure in event monitoring and response. We found McAfee s default correlation engine to be intuitive and easy to use. As with its policy rules, analysts can easily create ESM s correlation rules through a graphic interface into which they can drag and drop data and analysis operators. For example, Figure 9 shows a simple correlation rule identifying a buffer overflow attack and subsequently looking for a connection to a backdoor that may have been opened. Figure 9. Buffer Overflow and Backdoor Correlation Rule Analysts can combine any number of rules and filters in various ways to create new correlation rules quickly and easily. Figure 10 shows another example, detecting a successful exploit or malware event, followed by a DNS probe. SANS Analyst Program 11 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
13 Policies and the Advanced Correlation Engine (CONTINUED) Figure 10. Exploit and DNS Probe Correlation Rule For shops needing centralized, more in-depth correlation, McAfee offers, as a separate appliance, the Advanced Correlation Engine (ACE). ACE augments the existing correlation capabilities of ESM by adding risk scoring of correlation rules and events and performing real-time or historical correlation. Analysts can configure multiple correlation managers that enable ACE s rule-less correlation engine to identify what is important to the business a specific service or application, user or group, or profile of activity. SANS Analyst Program 12 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
14 Promoting Situational Awareness Knowing what s taking place inside the network perimeter is only the beginning of what McAfee ESM can do when it comes to providing threat intelligence and early warning. A number of services and other functions easily fit into an ESM deployment, giving analysts and higher-ups a view of what s on the other side of the hill, as well as what s inside the wire. Global Threat Intelligence One of the most interesting new features within ESM 9.2 that we explored was the inclusion of data from McAfee s Global Threat Intelligence (GTI) service, which centralizes and correlates threat and attack data from around the world and incorporates McAfee s own security research and analysis. This feature enables the delivery of reputation-based, relevant intelligence to numerous McAfee security platforms in a manner that facilitates real-time event correlation and threat identification. In the ESM product SANS reviewed, GTI was automatically imported in several places. First, GTI creates automatic watchlists from globally noted malicious and suspicious IP addresses, which can be integrated into filters, rules and dashboard views to quickly see what GTI is now reporting. Figure 11 shows a sample dashboard display of GTI sources and events. Figure 11. GTI Sources and Events Other built-in GTI dashboards include an overall summary, a threat summary and specific charts for threat sources and destinations. These dashboards can provide interesting and relevant data about what is happening to other organizations. This information can be vital to security teams who need additional, timely threat intelligence that can help them determine whether events are widespread and affecting others in general or if the organization appears to be a specific target. SANS Analyst Program 13 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
15 Promoting Situational Awareness (CONTINUED) Reporting We examined a variety of ESM reports, from high-level executive reports to more detailed ones focusing on event and correlation data. For example, one report contained only host-based events related to user account-sharing activity so analysts could provide PCI compliance reports for this control to auditors. Analysts can customize the reports easily, again using drag-and-drop design, and store them locally, send them to a defined remote location or them to users and/or groups. Situational Awareness Even with all of the robust features we explored in ESM 9.2, one aspect of McAfee s toolset stood out the integration and cross-platform correlation features to gain visibility and situational awareness. McAfee is beginning to consolidate many of its products into a single central monitoring architecture, enabling enterprises to correlate and manage data from a vast range of sources from one interface. An especially rewarding integration combines ESM with McAfee s management platform, epolicy Orchestrator (epo), which many organizations already use to centrally configure and control diverse security platforms, ranging from DLP to host-based IPS and whitelisting agents. Network security devices such as McAfee s network IPS are managed by their Network Security Platform (NSP), which integrates into ESM much like epo does. The focus of both products integration with ESM is on quarantine commands that can help to quickly isolate sources of malicious events and contain their ill effects. Thanks to the ability to natively integrate and communicate with existing epo deployments, ESM can now work with a huge amount of security data and configuration information that epo and NSP already know about. As a result of this integration, ESM can be used to identify threats and then instruct epo to clarify or even remediate issues in a short time frame. A combined solution that enables analysts to not only identify events, but also fix problems, is a powerful one. Although our evaluation did not extend to this degree of platform integration, we were able to see and work with epo data fed into the system. For example, Figure 12 shows a dashboard summary of event information from an epo platform. SANS Analyst Program 14 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
16 Promoting Situational Awareness (CONTINUED) Figure 12. epo Dashboard and Event Integration with ESM Between the advanced and thorough, yet easy-to-use reporting features and the advanced integration of information from monitored systems combined with threat intelligence from a wide range of sources, ESM gives security analysts some foreknowledge of what attacks they could have to fend off, how urgently they have to prepare for them, and where the vulnerabilities are most acute. SANS Analyst Program 15 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
17 Conclusion With today s rapidly evolving threat landscape, the need to more quickly analyze an increasing amount of security event data over an expanding timeframe is evident. Security teams need the ability to assess and correlate data easily, track events for investigations, and report on security controls within the environment. McAfee Enterprise Security Manager 9.2 offers enterprises a relatively easy-to-use SIEM system that can perform broad and deep event analysis as well as provide a quick assessment. The speed of the system s interface and its flexible dashboard views enabled us to view a broad range of security events within a relatively short period of time, and the policy and correlation rules were both easy and flexible to create and manage. Reporting was simple yet thorough, and ESM provided a variety of prebuilt reports that address common requirements. Creating new reports was easy, and the intuitive drag-and-drop design engine allowed for easy customization. In addition to the foundational SIEM capabilities that ESM offered, the inclusion of threat intelligence feeds from systems around the world as well as McAfee security research teams, lent the platform a new degree of credibility in identifying and correlating security events. Many organizations don t have a strong set of controls in threat intelligence today, and McAfee s GTI service offers enterprises a way to bring a much broader security analysis perspective to bear within their own environments. For organizations currently using McAfee s epo, IDS/IPS, Vulnerability Manager, database monitoring and related products, ESM s new integration capabilities are making it easier than ever to create a unified security architecture with best-of-breed components that work well together. With the inclusion of epo integration in ESM, McAfee now also offers the ability to remediate issues directly from within ESM, a significant enhancement of the product. A similar integration with McAfee Vulnerability Manager can enable ESM to trigger vulnerability scans, and the integration with Network Security Platform (NSP) enables the automation of quarantine actions when correlation rules are triggered by malicious event sources or suspicious traffic. ESM will prove to be a capable SIEM platform for enterprises of all types one that offers distinct advantages in the areas of flexibility and ease-of-use, as well as speed and integration. SANS Analyst Program 16 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
18 About the Author Dave Shackleford is the founder and principal consultant with Voodoo Security, a SANS analyst, instructor and course author, and a GIAC technical director. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. He is a VMware vexpert, and has extensive experience designing and configuring secure virtualized infrastructures. He has previously worked as CSO for Configuresoft and CTO for the Center for Internet Security. Dave is the author of the Sybex book Virtualization Security. Recently, Dave co-authored the first published course on virtualization security for the SANS Institute. Dave currently serves on the board of directors at the SANS Technology Institute and helps lead the Atlanta chapter of the Cloud Security Alliance. SANS would like to thank its sponsor: SANS Analyst Program 17 Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
McAfee Security Information Event Management (SIEM) Administration Course 101
McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services
Intel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm s Security Analytics Platform
Sponsored by LogRhythm Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm s Security Analytics Platform September 2013 A SANS Analyst Program Review Written by
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring
NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
Protecting Virtual Endpoints with McAfee Server Security Suite Essentials
Sponsored by McAfee Protecting Virtual Endpoints with McAfee Server Security Suite Essentials December 2013 A SANS Analyst Whitepaper Written by Dave Shackleford Capability Sets for Virtualization Security
Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence
Threat intelligence visibility the way forward Mike Adler, Senior Product Manager Assure Threat Intelligence The modern challenge Today, organisations worldwide need to protect themselves against a growing
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
SIEM Orchestration. How McAfee Enterprise Security Manager can drive action, automate remediation, and increase situational awareness
SIEM Orchestration How McAfee Enterprise Security Manager can drive action, automate remediation, and increase situational awareness Scott Taschler, Solution Architect, McAfee Table of Contents Introduction
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
How To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
LogInspect 5 Product Features Robust. Dynamic. Unparalleled.
LogInspect 5 Product Features Robust. Dynamic. Unparalleled. Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10
Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?
Datasheet: Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-ofbreed
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LOGPOINT Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics,
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
Redefining SIEM to Real Time Security Intelligence
Redefining SIEM to Real Time Security Intelligence David Osborne Security Architect September 18, 2012 Its not paranoia if they really are out to get you Malware Malicious Insiders Exploited Vulnerabilities
Detect & Investigate Threats. OVERVIEW
Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
Discover & Investigate Advanced Threats. OVERVIEW
Discover & Investigate Advanced Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
Enabling Security Operations with RSA envision. August, 2009
Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
Defining, building, and making use cases work
Defining, building, and making use cases work Paul Brettle Presales Manager, Americas Pacific Region What is a use case? Compliance FISMA, PCI, SOX, etc Network security firewalls, IDS, routers & switches
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst
ESG Lab Spotlight AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst Abstract: This ESG Lab Spotlight details ESG s hands-on testing of
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
Security Operations Metrics Definitions for Management and Operations Teams
Whitepaper Security Operations Metrics Definitions for Management and Operations Teams Measuring Performance across Business Imperatives, Operational Goals, Analytical Processes and SIEM Technologies Research
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
Fight the Noise with SIEM
Fight the Noise with SIEM An Incident Response System Classified: Public An Indiana Bankers Association Preferred Service Provider! elmdemo.infotex.com Managed Security Services by infotex! Page 2 Incident
Intel Security Certified Product Specialist McAfee Network Security Platform (NSP)
Intel Security Certified Product Specialist McAfee Network Security Platform (NSP) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking for
QRadar SIEM and Zscaler Nanolog Streaming Service
QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
STEALTHWATCH MANAGEMENT CONSOLE
STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?
McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time
SolarWinds Network Performance Monitor powerful network fault & availabilty management
SolarWinds Network Performance Monitor powerful network fault & availabilty management Fully Functional for 30 Days SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables
Blind as a Bat? Supporting Packet Decryption for Security Scanning
Sponsored by VSS Monitoring Blind as a Bat? Supporting Packet Decryption for Security Scanning November 2012 A SANS Whitepaper Written by: Dave Shackleford Options for SSL Inspection Page 2 Implementing
Find the needle in the security haystack
Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
McAfee Enterprise Security Manager 9.3.2
Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
Server Monitoring: Centralize and Win
Server Monitoring: Centralize and Win Table of Contents Introduction 2 Event & Performance Management 2 Troubleshooting 3 Health Reporting & Notification 3 Security Posture & Compliance Fulfillment 4 TNT
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF
NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event
How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)
Monitor Network Activity Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
Securing Data Center Servers: A Review of McAfee Data Center Security Suite Products
Sponsored by Mcfee Securing Data Center Servers: Review of Mcfee Data Center Security Suite Products ugust 2012 SNS Whitepaper Written by: Jim D. Hietala Bull s-eye on Servers Page 2 Products Reviewed
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers
NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers The World's Fastest and Most Scalable SIEM Finally an enterprise-class security information and event management system
Monitor Network Activity
Monitor Network Activity Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Technology Blueprint. Defend Against Denial of Service Attacks. Protect each IT service layer against exploitation and abuse
Technology Blueprint Defend Against Denial of Service (DOS and DDOS) Attacks Protect each IT service layer against exploitation and abuse LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
Extreme Networks: A SOLUTION WHITE PAPER
Extreme Networks: The Purview Solution Integration with SIEM Integrating Application Management and Business Analytics into other IT management systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
How To Manage Log Management
: Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Monitor Network Activity
Monitor Network Activity Panorama provides a comprehensive, graphical view of network traffic. Using the visibility tools on Panorama the Application Command Center (ACC), logs, and the report generation
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
SIEM is only as good as the data it consumes
SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to
