Streamline Risk Management by Automating the SANS 20 Critical Security Controls
|
|
|
- Aileen Carpenter
- 10 years ago
- Views:
Transcription
1 Sponsored by FireEye Streamline Risk Management by Automating the SANS 20 Critical Security Controls June 2012 A SANS Whitepaper Written by: James Tarala Advisor: G. Mark Hardy Core Principles and Automation Page 2 Implementing the Controls Page 12 Making Automation a Priority Page 15
2 Executive Summary The 20 Critical Security Controls, a consensus project involving numerous U.S. government, private-sector and international groups, has received a great deal of attention recently as a framework of controls for defending organizations against cyber attacks. Today s cyber attacks are increasingly complex, advanced and able to remain hidden on the network for long periods of time. As organizations begin to take the time to investigate and implement the 20 Critical Security Controls, they realize the document is more than simply a new list of things to do it is a coordinated framework of controls that espouses a philosophy for combating the most common cyber attacks being observed today, namely those that blend malware, multiple attack vectors and manipulative social engineering tactics. One of the core philosophies of these controls is that any defenses that can be automated should be automated. Rapidly detecting and thwarting follow-on attacks on internal enterprise networks minimizes an attacker s spread inside a compromised network. Overreliance on manual assessment, response and mitigation has contributed to the current increased incidence of cybercrimes and compromised systems. In 2011, attackers breached more than 31 million individually identifiable records through hacking, malware, unintended disclosures and other similar incidents of cybertheft or cyber espionage, according to PrivacyRights.org. 1 PrivacyRights also reports that, in the first four months of 2012, the number of similar events had already reached 16 million. What s worrisome is the persistent nature of these threats, which go undetected for months or even years. In an early case, intruders went undetected while compromising Heartland Payment Systems in The recent case involving the sophisticated Flame malware package found in Iranian nuclear control systems reportedly had been propagating, siphoning data and communicating to master controllers for more than two years before detection. 3 Richard Clarke, the former U.S. government counterterrorism czar who reported to three different presidents, was quoted in Smithsonian Magazine as saying, I m about to say something that people think is an exaggeration, but I think the evidence is pretty strong. Every major company in the United States has already been penetrated by China. 4 Whether this assertion is entirely true or not, it is clear that bad actors are conducting advanced, persistent cyber attacks against governments and businesses around the world. This paper discusses practical considerations for automating the 20 Critical Security Controls to create a more defensible network against these increasingly automated, persistent attacks SANS Analyst Program 1 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
3 Core Principles and Automation In 2008, the Center for Strategic and International Studies (CSIS), in partnership with the SANS Institute, developed the 20 Critical Security Controls to address advanced security challenges faced by enterprises and governments. According to the guidelines, advanced attacks require improved, continuous security defense and response on the part of enterprises, as shown in Figure 1. Security defenses include identifying attacker presence and reducing living space Maintain Long-Term Access to Compromised Systems: Staying In Security defenses include controlling superuser privileges (admin and root) Security defenses include decreasing attack surface area and hardening security Initial Compromise: Getting In Cause Damage: Acting Security defenses include disrupting command and control of attackerimplanted malware Figure 1: SANS 20 Critical Controls Depiction of Advanced Attack Activities and Associated Defenses 5 According to the project s website, the consensus document begins the process of establishing a prioritized baseline of information security measures and controls that can be applied across federal and commercial environments. The consensual effort that produced this document identifies 20 specific technical security controls effective in blocking currently known high-priority attacks as well as those attack types expected in the near future. 6 The security priorities were established with the help of more than 200 government and civilian groups, heavily influenced by feedback from the U.S. National Security Agency, the Australian Defence Signals Directorate, the U.S. Department of Energy Nuclear Laboratories, the U.S. Department of State, the U.S. Department of Defense Cyber Crime Center and many other groups SANS Analyst Program 2 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
4 Core Principles and Automation (CONTINUED) The focus was not simply to create a new list of things to do, but also to establish a new way of thinking so organizations could holistically and systemically defend themselves against these advanced attacks. Six principles guided the development of the control priorities, all of which are greatly aided by automation: 1. Defenses should focus on addressing the most common and damaging attack activities occurring today and on those anticipated in the near future. 2. Enterprise environments must ensure that consistent controls are in place across the organization to effectively negate attacks. 3. Defenses should be automated where possible and periodically or continuously measured using automated measurement techniques where feasible. 4. A variety of specific technical activities should be undertaken to produce a more consistent defense against attacks that occur on a frequent basis against numerous organizations. 5. Root-cause problems must be fixed in order to ensure the prevention or timely detection of attacks. 6. Metrics should be established that facilitate common ground for measuring the effectiveness of security measures, providing a common language for executives, information technology specialists, auditors and security officials to communicate about risk within the organization. 7 Guiding principle number 3 directly addresses automation: Defenses should be automated where possible and periodically or continuously measured using automated measurement techniques where feasible. 8 Unfortunately, many organizations do not automate security measures. Instead, they rely on manual efforts to generate, aggregate and analyze valuable data about the way their information systems operate, including data sets describing network attack traffic. A failure to automate the collection, aggregation and analysis of such data leads to increased costs and gaps in coverage. Man-hours cost more than computing time, particularly when you consider how much longer it takes humans to analyze incidents across the subnet or enterprise in which they occur. During this time lapse, events are not getting remediated, and defense against persistent threats and cyber attacks is not being improved SANS Analyst Program 3 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
5 Core Principles and Automation (CONTINUED) Vivek Kundra, then the U.S. government s federal Chief Information Officer (CIO), stated in a blog post that the security manpower and documentation for 150 major IT systems for the State Department alone cost $133 million in In 2009, the White House reported that in federal agencies 60,000 Full Time Equivalent (FTE) positions were primarily responsible for security-related duties. With an average cost of $159,000 per FTE, the annual cost for these employees exceeded $10 billion. 10 The same report published the graph shown in Figure 2, illustrating the number of security-related FTEs by agency. U.S. Agency for International Development (USAID) Nuclear Regulatory Commission National Science Foundation Department of Veterans Affairs Small Business Administration Office of Personnel Management National Aeronautics and Space Administration Department of Housing and Urban Development Department of Homeland Security General Services Administration Department of Transportation Environmental Protection Agency Department of Energy Department of Education Social Security Administration Department of the Treasury Department of State Department of Labor Department of Justice Department of the Interior Department of Health and Human Services Department of Commerce Department of Agriculture ,000 Figure 2: Number of Security-Related FTEs at Government Agencies in 2009 (Taken from 1, SANS Analyst Program 4 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
6 Core Principles and Automation (CONTINUED) Conversely, the cost to implement one information security sensor for an enterprise of less than 10,000 computer nodes is less than $100,000 annually, based on informal interviews with information security product vendors and enterprise CIOs. 11 For less than the cost of one FTE, an enterprise can implement one sensor that can automate some of the security for that enterprise. Most organizations will need more than one sensor to defend their systems, but with next-generation threat protection sensors that are much more accurate and centrally manageable, automated sensor deployment can cost significantly less than manual analysis. The more pressing danger is the potential of more attacks succeeding and persisting due to a lack of automated controls. Next-generation threats are increasingly automated, targeting end users and organizations via web browsing, attachments, mobile devices and other vectors. Attackers set malicious code to operate covertly and automatically tamper with the system s contents, capture sensitive data and spread to other systems. Advanced malware avoids signature-based and behavioral detection through polymorphic coding techniques and can even initiate countermeasures such as disabling antivirus tools running on the targeted system. By always morphing their codebase, these threats stay ahead of signatures, blacklists and reputational updates. Therefore, they are unlikely to be blocked from stealing data and communicating it back to an attacker without the help of finely tuned, automated technologies. Knowing that manual defenses are impractical and unrealistic, most organizations have begun the process of automating their monitoring systems. They have implemented network firewalls with automatic access control lists and intrusion detection sensors that automate the use of signatures. Also, next-generation threat protection tools have become more automated with multiple means of detection and analysis of advanced threats and zero-day attacks. Using virtual machine analysis and behavior-based anomaly detection, along with trust-based application whitelisting and other criteria, new security technologies can complement and enhance traditional signature-based detection, like Intrusion Detection Systems (IDSs). 12 Other automated protection and response processes include security to analyze all attachments entering the organization and to quarantine those that contain malicious code or file types, such as those that fall outside the organization s specified business rules. 13 Today s automated tools also include deep packet inspectors that can decrypt packets as needed, access and application monitoring systems, and proxy servers to automatically block access to unwanted network content. Organizations should establish an incident response process that allows their IT support teams to supply their security teams with samples of malware running undetected on corporate systems. In addition to their malware defenses, system vulnerability and configuration management, system inventories, application security, endpoint/mobility management and other similar information assurance controls can and are being automated. These systems collect data (sensors), aggregate and integrate data sets from multiple sensors (aggregators), and report and analyze the aggregated data (analysis engines). Let s consider each one of these roles in detail, including examining how they interact through further integration and automation. 11 Informal interviews were conducted by the author SANS Analyst Program 5 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
7 Core Principles and Automation (CONTINUED) Enable Infrastructure Sensors The first steps in any automation effort are defining what data needs to be collected and establishing effective collection practices. Organizations must be able to detect the most damaging attack activities occurring today, including advanced malware that bypasses traditional controls. Then, they must collect threat data in a way that can be automated, aggregated, analyzed and reported as useful information. To consolidate data and automate its collection, organizations must deploy tools and sensors to collect meaningful data from systems. The goal of a sensor is to collect data, not to analyze or aggregate the data (although many tools also provide these services). Without the right sensors monitoring for multiple signs of breaches, organizations can t even analyze the data needed to protect themselves. If an organization does not know an advanced attack is underway, it cannot protect against it. If they don t know a particular risk exists, the exploit could go unnoticed for weeks or months. Sensors can analyze all inbound and outbound data for signs of compromise in addition to collecting information that may be used to make appropriate and prioritized decisions regarding risk-mitigation efforts. There are 45 different types of sensors defined in the SANS 20 Critical Security Controls. Many of these sensors are being combined in advanced gateway technologies that include next-generation intrusion prevention, inbound and outbound web protection, application protections and more. Some of the sensor types include: Asset tracking systems Application whitelisting software Vulnerability management systems Patch management systems Antimalware software Network proxy servers Intrusion Detection Systems (IDSs) Authentication and access control systems File Integrity Assessment (FIA) systems An example of a sensor would be a malware-analysis system. Ideally, organizations would deploy malware sensors that detect more than just signatures of known malicious code. Placing these signatureless sensors across communication channels (web, and file sharing) provides the capability to detect inbound attacks that use zero-day malicious code. They can also capture outbound callbacks to criminal servers, as well as abnormal conditions, such as unusual processes that are running on a system but were not authorized as a part of a standard system build. SANS Analyst Program 6 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
8 Core Principles and Automation (CONTINUED) By deploying network-based sensors on Internet and extranet DMZ networks, organizations can look for unusual attack mechanisms and detect network compromises. Also, a properly configured network-based threat protection sensor can automatically block bad traffic. Such confirmed signs of cyber attacks and processes could then send alerts to a central management system (discussed later in this article). Simply put, successful automation begins with quality data inputs, namely evidence of any abnormal condition that could be considered evidence of intrusion. Not all the listed sensors need to be implemented before an organization can receive value from deployments. Even if only a few sensors are deployed, they have the potential to produce actionable results. For example, with access to only a vulnerability management system and a patch management system, an organization would be able to measure risk based on vulnerability severities defined by the Common Vulnerability Scoring System (CVSS). Security staff can use these scores to aggregate risk data about patches that were not installed on their systems, which would help them set priorities on which systems should be patched first in a patchmanagement cycle. If an organization must prioritize its resources and start with a smaller set of sensors, it may want to consider beginning by implementing the controls defined by the Australian Defence Signals Directorate s (DSD) Sweet Spot controls. This research suggests deploying sensors on system management, access control and application whitelisting systems first when creating an implementation plan. Aggregate Sensor Data After data from sensors has been collected, it must be centrally consolidated and aggregated. Organizations must have the capability to take the data that has been collected by each of the individual sensors and automate the centralization, normalization and consolidation of that information to create a risk profile that key stakeholders can view and act upon. Armed with aggregated data, decision makers can make risk remediation decisions using the most complete set of intelligence available. It is equally important that this process be automated, because leaving it to humans to perform manually, even if done on a regular schedule, will result in gaps. Too commonly, only a small, initiated group of individuals has access to separate data sets with little or no interaction between them. Investigators access only a small piece of the overall set of data needed to analyze risk and prioritize response. Other stakeholders, such as key business owners and senior executives, may never have the opportunity to observe a meta-view of the organization s risk. For example, an antimalware administrator is limited to information about malware infections, and a vulnerability management system administrator can see only vulnerabilities that are present at any given time on a system under his or her control. Those responsible for information security can make better decisions when data can be aggregated and made available to all decision makers. SANS Analyst Program 7 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
9 Core Principles and Automation (CONTINUED) During the collection process, the integrity of the data must be protected from compromise as well as from the data-consolidation techniques undertaken for the sake of efficiency. So in addition to normalized, consolidated data, raw data from sensors must be available to responders and auditors to ensure that they have the most accurate data possible. Sensors and aggregation tools must maintain the integrity of the data collected for these and other purposes. Typically, this aggregation of data sets is performed by Security Information and Event Management (SIEM) systems. These systems are traditionally designed with the capability to interface with numerous sensors by default, thus saving the organization the time and effort necessary to create such interfaces themselves. SIEM systems should aggregate from what can be hundreds of disparate systems that provide log and event information. Infrastructure sensors ideally should analyze full packet headers and payloads of the traffic, including web, database and traffic destined for or passing through the network border. The resulting security, packet and log data should then feed into a properly configured SIEM system so events can be correlated against other network, user, application, log and system information feeding into the SIEM. SIEMs are like spreadsheets, said Alan Paller, the Director of Research for the SANS Institute on a public conference call announcing recent updates to the controls. His point was that SIEM systems, when related to the SANS 20 Critical Security Controls, are decision-support tools that assist decision makers by crunching through data sets and normalizing the data so analysts can search for patterns, behaviors and content that they understand. So, after collection, SIEMs must aggregate this data into one central system that enables decision makers to analyze all of the application, network, log, packet and security information they need during and after an event. Analyze Security Data and Report Incidents To help identify covert channels exfiltrating data through a firewall, threat protection can monitor outbound traffic for communications to known criminal servers, alert personnel about the source and destination addresses associated with these sessions, and deliver this information to the SIEM for automated actions, such as quarantining of the endpoint. Effective threat protection requires strong analysis capabilities within the automated, integrated sensor/ collection and reporting systems involved. Effective automation must extend beyond data collection and focus on infrastructure sensors to weed out the noise and false positives that IDSs and other monitoring/ reporting systems are known to send. Further refinement must provide a way for responders and preventive personnel to perform meaningful analysis of the resulting data sets. Utilizing artificial or programmed intelligence, as well as virtual machines, can provide highly accurate data at reasonable speeds. Such devices should be able to support the analysis of information assurance data sets based on defined business analytics and metrics. SANS Analyst Program 8 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
10 Core Principles and Automation (CONTINUED) Alerts and the underlying logs that correlate with them must all feed into the analysis engine/siem to enable accurate results and provide a clearer picture of system security. Then the tool sets need to be able to provide the correlation information that today s advanced gateway sensors are able to collect, all the way down to deep packet information and even data reconstruction when, for example, exfiltration may be involved in the events. Figure 3 depicts how these controls and feeds would look in regard to Critical Control Number 1, Inventory of Authorized and Unauthorized Devices. Figure 3: Sensors and Aggregation for Critical Control Number 1: Inventory of Authorized and Unauthorized Devices It s important to note there is a big a difference between basic log systems (aggregators) and SIEM systems. Some log aggregation systems, such as syslog or its variants, simply aggregate information into one place. By default, most log aggregators fail to provide any analysis of the underlying data sets. Log analysis engines also don t collect security information and alerts from network devices, vulnerability scanners or other security devices sending messages and alerts. SANS Analyst Program 9 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
11 Core Principles and Automation (CONTINUED) A SIEM is a trainable system that has the automated capacity for analyzing logs, sensor and other rich security information, including: 1. Signatures. SIEM tools should analyze the aggregated data sets for known attacks called attack signatures. Antimalware vendors have been using these signatures for years to alert organizations of potential malware outbreaks. Along with the many alerts they collect from antimalware and other sensors on the network, SIEM analysis engines need to be programmed with signatures of their own. This helps them coordinate the data sent to them from various devices to identify trends indicative of attack and make notification. 2. Multivector Threat Capture. Today s advanced monitoring and data collectors are collecting more security information than ever before. They can see beyond ports and destinations contained in packet headers and analyze and correlate threat activities across web, , and file-based attack vectors. For example, sandboxing suspect traffic for execution in near real-time effectively automates the process of confirming whether suspect traffic is actually zero-day malware targeting sensitive passwords, data being exfiltrated, or whether malware callbacks and remote commands are being performed. The data collectors and monitors send the data sets to the SIEM to enable a larger-scale view of the event across the network. 3. Application Control and Endpoint Sensors. Application control and whitelisting endpoint sensors track all files, process activity in real time and provide a live inventory of all executable content across all systems. When coupled with network sensors, such as Intrusion Detection/Prevention Systems (IDS/ IPS) and firewalls, these systems provide audit data that enables earlier detection of threats, better filtering of noise and faster investigation and remediation times. These endpoint sensors automatically detect whether the file arrives on the endpoint and report an event only if the file is not approved. A network event highlighting a potential threat will be followed by an endpoint event of a new unapproved file only if: (a) the file actually lands on a system, and (b) there is no policy or rule that automatically approves the file. It is worth investigating such events because it can reduce the initial thousands of events to less than a few dozen actionable events. Monitoring and SIEM tools must automatically alert key stakeholders to deviations like the preceding ones in language that both business owners and system administrators can understand. Alerts should be correlated and prioritized with chain-of-command decisions implemented into the workflow process. Decisions should not be solely in the hands of technical staff: Sharing more risk data with business owners increases the likelihood that appropriate resources are dedicated to responding to each identified risk. SANS Analyst Program 10 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
12 Core Principles and Automation (CONTINUED) These automation processes will still involve the use of humans to analyze the results, but it frees them to use the results for more than just response. It allows them to take actions to improve the overall risk posture. Automated intelligence provides the data humans need to make decisions and share what they know with each other, just as the criminals perpetrating advanced persistent attacks are doing. As more information on common attacks becomes available, more off-the-shelf products will provide automated analysis to enterprises. Sharing attack intelligence among government organizations, private-sector enterprises and information assurance vendors will result in more automated intelligence being included by default in these products. To this end, the Department of Defense announced in May 2012 that it is expanding its Defense Industrial Base Cyber Security/Information Assurance Program (DIB CS/IA) to include providing classified threat and technical information to commercial businesses. 14 In addition, the U.S. House of Representatives passed the Cyber Intelligence Sharing and Protection Act (H.R. 3523) to facilitate the transfer of cybersecurity threat intelligence between the U.S. government and select private-sector companies SANS Analyst Program 11 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
13 Implementing the Controls For organizations beginning their implementation of the 20 Critical Security Controls, it makes the most sense to start with sensors and tools already deployed and then determine what additional technologies/processes will be needed to fill out the automation program. The best place to start is by inventorying and updating existing technologies to meet defensive goals. As an example, consider the U.S. Department of State s custom ipost system, which continuously monitors and reports risk on its IT infrastructure. According to the documentation, the ipost application consists of two main points of automation: 1. A single interface for administrators to access their monitoring data and objects 2. Single sign-on for enterprise-level management reporting across a variety of monitoring data 16 As a result of collecting data sets from multiple sensors and aggregating that data into central sources, the ipost system allowed the U.S. Department of State to generate automated risk reports similar to the one shown in Figure SANS Analyst Program 12 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
14 Implementing the Controls (CONTINUED) Average Risk Score Site Risk Score Hosts Average Risk Score Risk Level Grade Rank in Enterprise Rank in Region Component Vulnerability Patch Security Compliance Anti-Virus SOE Compliance AD Computers AD Users SMS Reporting Vulnerability Reporting Security Compliance Reporting Total Risk Score Risk Score , , Site_XYZ Risk Score Advisor 4, B The following grading scale is provided by Information Assurance and may be revised periodically. Average Risk Score At Least Less Than Grade A+ A B C D F F- The Site_XYZ Site Risk Score was calculated as follows: ,792.4 Avg / Host % of Score 2.0% 16.8% 22.7% 22.3% 20.3% 0.1% 10.0% 4.2% 0.7% 0.9% % How Component Is Calculated From.1 for the lowest risk vulnerability to 10 for the highest risk vulnerability From 3 for each missing Low patch to 10 for each missing Critical patch From.9 for each failed Application Log check to.43 for each failed Group Membership check 6 per day for each signature file older than 6 days 5 for each missing or incorrect version of an SOE component 1 per day for each day the AD computer password age exceeds 35 days 1 per day for each account that does not require a smart-card and whose password age > 50, plus 5 additional if the password never expires per day for each host not reporting completely to SMS After a host has no scans for 15 consecutives days, per 7 additional days After a host has no scans for 15 consecutives days, per 15 additional days Host_92898 Host_9270 Host_ Host_79133 Host_99015 Host_9271 Host_9275 Host_9237 Host_9283 Host_9276 Top 10 Risk Scores 120 Risk Score History Mar Mar Apr Apr Apr Apr Apr Apr For additional information on Risk Scoring, assistance with remediations, or to report suspected false positives, contact the IT Service Center to open a Risk Score ticket Figure 4: An ipost System Automated Risk Report ( SANS Analyst Program 13 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
15 Implementing the Controls (CONTINUED) At the beginning of their implementation of this customized risk reporting system, the agency had already deployed the following sensors in the organization: Security Center System Management Server Active Directory Security and access systems certainly provide the most helpful information for correlation, analysis and actions to take. Many organizations, however, will not deploy a custom platform for this purpose. Instead, they will utilize existing SIEM systems to achieve this goal. Once quality assurance goals are defined, determine what existing tools can be leveraged and what new tools may be required by asking these two questions: 1. Are the correct sensors in place to collect enough security event and log data to determine good from bad network, access and system behavior? 2. Can the aggregation tool facilitate data from all needed sensors and provide the level of inspection needed to protect the network or investigate a breach? If the answer to either of these questions is no, then establish a plan to remediate that issue using existing systems wherever possible and supplementing wherever necessary to achieve those goals and keep implementation costs down. For example, organizations may need to upgrade their sensors from traditional firewalls and IDSs to include sensors that can open and inspect packets, perform application security functions, execute suspicious attachments in virtual environments and more, in what are coming to be called advanced security gateways. These gateways provide richer information for the correlation engine. Capacity should be considered in any expansion plan, because the SIEM/correlation engine must be able to support logs and events from any new sensors that are added. SANS Analyst Program 14 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
16 Making Automation a Priority Specifically, what steps should organizations take to make automation a priority? Take the following actions to begin prioritizing automated defensive systems: 1. Establish a baseline of sensors based on what is in your organization and the controls and sensors listed in the 20 Critical Security Controls to collect front-line data for defense. 2. Determine which of the sensors listed in this baseline have already been effectively implemented in the organization to collect useful defense data automatically. 3. Perform a gap analysis between the desired control, the sensor baseline and the system currently implemented in the organization. 4. Implement automated systems to address the gaps identified. 5. Ensure all data sets from automated systems are aggregated into central repositories for analysis. 6. Implement analysis engines to automatically analyze the centrally aggregated data sets for necessary remediation actions. Include reporting capabilities that can be shared with enterprise defenders and business owners. 7. Implement a continuous process improvement plan that encourages the collection of better data sets from sensors, ensures the aggregation of all useful sensor data and fine-tunes the analysis of the data collected based on emerging threats. SANS Analyst Program 15 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
17 Conclusion Manual information system defense is risky behavior. While the human eye will always be needed in protection and remediation processes, over-reliance on manual activities and security functions acting in silos results in longer windows of vulnerability. It is also costly: Government organizations have reported spending hundreds of millions of dollars on security personnel, and they still have experienced significant breaches of an increasingly advanced nature. Automation, as much as possible, is strongly recommended in the SANS 20 Critical Security Controls. Although humans will always be needed to run and manage security operations, automation will help keep up with current threats and improve their overall risk posture. Elements of automation include the use of increasingly advanced sensors to detect threats, automatically collect malware forensics, produce remediation details and alert to anomalous and malicious events. Collection, correlation, analysis and reporting/alerting of event data will need to continually improve as threats grow more advanced and persistent. Continued automation, as well as the continued watchful eye of human analysts, must perpetually work together to protect against and remediate incidents in an increasingly sophisticated threat landscape. Automation should help beat advanced threats at their own game. It can be used to baseline security posture, determine what is normal, detect what is not and, ultimately, improve the overall organizational security posture through ongoing remediation and systemic improvements. SANS Analyst Program 16 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
18 About the Author James Tarala is a principal consultant with Enclave Security and is based out of Venice, Fla. He is a regular speaker and senior instructor with the SANS Institute, as well as a courseware author and editor for many of their auditing and security courses. As a consultant he has spent the past few years architecting large enterprise IT security and infrastructure architectures, specifically working with many Microsoft-based, directory services, , terminal services and wireless technologies. He has also spent a large amount of time consulting with organizations to assist them in their security management, operational practices and regulatory compliance issues. He often performs independent security audits and assists internal audit groups to develop their internal audit programs. James completed his undergraduate studies at Philadelphia Biblical University and his graduate work at the University of Maryland. He holds numerous professional certifications. SANS would like to thank its sponsor: SANS Analyst Program 17 Streamline Risk Management by Automating the SANS 20 Critical Security Controls
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Pragmatic Metrics for Building Security Dashboards
SESSION ID: GRC-W03 Pragmatic Metrics for Building Security Dashboards James Tarala Principal Consultant Enclave Security @isaudit Problem Statement What s measured improves. Peter Drucker In an era of
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Cisco Cyber Threat Defense - Visibility and Network Prevention
White Paper Advanced Threat Detection: Gain Network Visibility and Stop Malware What You Will Learn The Cisco Cyber Threat Defense (CTD) solution brings visibility to all the points of your extended network,
The Role of Security Monitoring & SIEM in Risk Management
The Role of Security Monitoring & SIEM in Risk Management Jeff Kopec, MS, CISSP Cyber Security Architect Oakwood Healthcare Jeff Bell, CISSP, GSLC, CPHIMS, ACHE Director, IT Security & Risk Services CareTech
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security
White Paper Advantage FireEye Debunking the Myth of Sandbox Security White Paper Contents The Myth of Sandbox Security 3 Commercial sandbox evasion 3 Lack of multi-flow analysis and exploit detection 3
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Security Controls Implementation Plan
GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 Table of Contents Executive Summary 3 Introduction 3 Security Controls Implementation
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity
Detecting Threats Via Network Anomalies Paul Martini Cofounder and CEO iboss Cybersecurity Why is Anomaly Detection Important? Largest enterprises with the biggest investment in prevention are still getting
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
Securing Data Center Servers: A Review of McAfee Data Center Security Suite Products
Sponsored by Mcfee Securing Data Center Servers: Review of Mcfee Data Center Security Suite Products ugust 2012 SNS Whitepaper Written by: Jim D. Hietala Bull s-eye on Servers Page 2 Products Reviewed
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
HIGH-RISK USER MONITORING
HIGH-RISK USER MONITORING Using ArcSight IdentityView to Combat Insider Threats HP Enterprise Security Business Whitepaper Overview Security professionals once defended their networks against bots and
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
How To Manage Log Management
: Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate Objectives Get more out
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS BeyondTrust Solution Overview October 2014 Table of Contents Introduction... 3 BeyondTrust Solutions... 6 The BeyondInsight
Overcoming Five Critical Cybersecurity Gaps
Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
