SIEM approach for a higher level of IT security in enterprise networks
|
|
|
- Jordan Ward
- 10 years ago
- Views:
Transcription
1 The 8 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications September 2015, Warsaw, Poland SIEM approach for a higher level of IT security in enterprise networks Prof. Dr. K.-O. Detken 1, T. Rix 1, Prof. Dr. C. Kleiner 2, B. Hellmann 2, L. Renners 2 1 DECOIT GmbH, Fahrenheitstraße 9, detken/[email protected], 2,3 University of Applied Sciences and Arts of Hanover, Ricklinger Stadtweg 120, D Hanover, carsten.kleiner/bastian.hellmann/[email protected], The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented sufficient security strategies and components for their networks yet. Additionally, tablets, smartphones, and netbooks changed the requirements of IT security rapidly. Today, there are several security components (e.g. anti-virus-system, firewall, and intrusion detection system) available to protect enterprise networks; unfortunately, they work independently from each other isolated. But many attacks can only be recognized if logs and events of different security components are combined and correlated with each other. This possibility is offered by a security information and event management (SIEM) system. But nowadays these systems are very complex and expensive in deployment and maintenance ([12]). The SIMU project, funded by the BMBF [6] and presented in this paper, offers several features of a SIEM system with better handling and more efficient use in the SME environment. Keywords: SIEM, open source, IF-MAP, CBOR, IDS, network security I. INTRODUCTION SIEM systems are seen as an important component of company networks and IT infrastructures. These systems allow to consolidate and to evaluate messages and alerts of individual components of an IT system. At the same time messages of specialized security systems (firewalllogs, VPN gateways etc.) can be taken into account. However, practice showed that these SIEM systems are extremely complex and only operable with large personnel effort. Many times SIEM systems are installed but neglected in continuing operation. SIEM systems are typically not suitable for the use in SME environments, mainly because of the following reasons: a. High costs for installation and maintenance because new components (collectors) of IT infrastructure have to be installed, configured and maintained. b. High costs for the operation due to the necessity of extensive expert knowledge for the policy and rule definition as well as for the correct analysis and the right interpretation of the output of SIEM systems. c. Deficient scalability to small-and-medium-sized networks Therefore the main goal of the SIMU project is the development of a system, similar to SIEM, which significantly improves IT security in a corporate network without making great effort. In addition to its simple integration into IT infrastructures of SME and its easy traceability of relevant events and processes in the network, it is to be realized without great effort of configuration, operation and maintenance. On the functional level SIMU works like common SIEM systems, which means it monitors processes and events within the corporate network and automatically detects situations of interest. It can thereby provide high-level information and even initiate proactive measures in near real-time, significantly improving security. [5] The remainder of this paper is structured as follows. The next section II provides an introduction into SIEM systems and our understanding of SIEM. Subsequently, section 0 covers the architecture of the SIMU project. In section IV a workflow demonstration is described to clarify our approach for a SIEM-like system. The final section V gives concluding remarks and an outlook on the next steps and future lines of research. II. SIEM DEFINITION The term security information event management (SIEM), which has been coined by Mark Nicolett and Amrit Williams of Gartner in 2005 [4], describes the product capabilities of gathering, analyzing and presenting information from network and security devices. Although the acronyms SIM, SEM and SIEM are often used within the same context, the term SIEM correctly is a combination of security information management (SIM) and security event management (SEM). The first area, SIM, provides long-term storage, analysis and reporting of log data. The second area, SEM, deals with real-time monitoring, correlation of events, notifications and console views. [3] Both areas can be combined differently to set-up a SIEM system. In detail, SIEM technology thereby provides near realtime analysis of security alerts, which have been generated by network hardware and applications. SIEM can be used as software, appliance or managed service, and is also
2 applied to log security data and generate reportss for compliance purposes. The objective off SIEM is to help companies respond to attacks faster and organize mountains of log data. A key focus is to monitor andd help managing user and service privileges, directory services and other system configuration changes, as well as providing log auditing and review and incident response. A complete SIEM system consists of different modules, which have to supportt the following functionalities: a. Event correlation: save, archive, normalize, and correlate log-files to a common data-basiss for further analysis. b. Situation detection: surveillance of the network condition and detection off unwanted and unexpected situations. This can include configuration management, signature based matching, or anomaly detection techniques. c. Identity mapping: assigning network specific information, like IP/MAC addresses, to real identities, e.g. the actual user. d. Key performance indication: measurement of the IT security by central analysis of asset details regarding security information. e. Compliance reporting: continuous check onn the IT compliance (e.g. integrity, risk, r effectiveness) of an enterprise and comparison to the real situation. f. Application programming interface (API): adaptation of legacy security systems and offering of a generic interface for the integration of arbitrary devices or systems. g. Role based access control: central c view of all events (big picture) of an enterprise under consideration of different responsibilities. Not all available SIEM systems of the market cover all features equally ([12]). III. SIEM AR RCHITECTURE O OF SIMU The SIMU project implements architecture quite similar to typical SIEM systems. Figure 1 depicts an overview of the components, whichh can roughlyy be divided into two layers: a. The SIMU collectors and flow-controllers, which are responsible for data collection and enforcement. b. The SIMU engine,, which includes the centrall data and knowledge storage, the data correlation, aggregation, and visualization of data, as well as protocol interfaces. The communication between thee layers andd the components is mostly realized by using the IF-MAP protocol. A. SIMU-Engine The SIMU engine is the processing and presenting component of the architecture. It is composed as follows: a. irond: The centrall communication point, implementing the MAP-Server as defined by the IF-MAP specification. Alternativee approaches have beenn suggested inn literature ([11]) but those imply thee disadvantage of using a proprietary format instead of IF-MAP, see section B below. b. VisITMeta: IF-MAP graph persistence (with respect to the history off the data) and visualization of graph data. d [9] c. Detectionn Engine: detection of relevant situationss using a graph g pattern matching approach on the basis of the data provided by the VisITMeta dataa service part. d. CBOR-Proxy: RFC 7049 defines the Concise Binary Object O Representation (CBOR), a dataa exchange protocol, which focuses on multiple design goals including g small code, message size, and extensibility. In this architecture CBOR is used as ann alternative too SOAP/XML, and helps to address performance problems and to facilitate the usage of f IF-MAP enabling the application a in small bandwidth scenarios. e. IO-Tool (Interconnected-asset ontology): extends the database with further f asset information of the network infrastructure to enable a correlation c later on. f. SIMU-GUI: graphical user front-end for the administrator. Presents analysis results and incidents as well as mechanisms for incident management, such as detailed information views or a ticketing system, in an understandable e manner. Figure 1: SIEM architecture of the SIMU project B. IF-MAP The Interface for Metadata Access Pointss (IF-MAP) is an open standard,, client-server r based protocol for sharing arbitrary information across different entities, specified by the Trusted Computing C Group (TCG). Its intendedd
3 purpose was to enable network devices to share sensitive security information with the goal of integrating arbitrary tools (like NAC solutions, firewalls, IDS, etc.), thus easing their configuration and extending their functionality. However, it turns out that IF-MAP can also provide benefit to other use cases that do not have anything to do with network security. That is why the TCG decided to separate the use case independent base protocol (current version 2.2[13]) from the use case dependent metadata specifications. This ensures that new metadata specifications can easily be developed without touching the base protocol spec. The base specification defines the two roles client and server and three different operations: publish, search and subscribe to distribute and access information. In addition, the basic data model is defined, consisting of identifiers (entities) and metadata, which can be attached either to the identifiers directly or connect two identifiers as a kind of relationship, called link. Thereby, an undirected information graph originates. The separated specification for network security [14] adds the definition of standardized metadata for the network security domain (an example graph is given later in this paper in section IV covering the workflow demonstration). Hence, IF-MAP can provide the following benefits: Integration of existing security systems by a standardized, interoperable network interface Avoidance of isolated data silos within a network infrastructure Extended functionality of existing security tools (for example automatic responses on detected intrusions, identity-based configuration of packet filters) No vendor lock-in C. Collector and flow controller components Flow controller and collectors are the typical components and services in a network infrastructure. They collect information or manage the network behavior. Several clients have been adopted to support the integration into an IF-MAP environment, i.e. providing their information in the IF-MAP data model or using information from the MAP-Server for their decisions. The following client collectors have been implemented for the architecture of SIMU (as also shown in Figure 1): a. DHCP collector: extracts metadata of actual IP leases from the lease file. b. RADIUS collector: delivers metadata regarding user logins and the user itself (groups, authority). c. Syslog collector: delivers metadata regarding the status of arbitrary syslog clients - hosts and services (e.g. CPU load or false logins). d. Nagios collector: publishes extracted metadata from Nagios regarding the status of hosts and services (i.e. availability of the network). e. Snort collector: translates Snort alerts into IF- MAP metadata. f. Nmap: Network Mapper integration into the IF- MAP environment. Detects devices, server, services, etc. g. OpenVAS: Publication of the scan results obtained by the vulnerability scanner. Allows for periodic or regularly triggered scans and can automatically respond to requests for investigation. h. Log-file collector: generic collector for analysis of arbitrary log-files and translation of the log information in IF-MAP metadata. i. Android collector: delivers metadata regarding the status and behavior of the smartphone (e.g. firmware, kernel, build number, traffic on different network interfaces, CPU load). j. LDAP collector: manages a connection to the directory service and delivers according IF-MAP metadata. Furthermore, the architecture includes the following flow-controller components, which partly may also have collector functionality: a. iptables: can perform automated enforcement by adapting the firewall rules and informs about operated reactions. b. macmon NAC: publishes different information about connected devices in the network (e.g. authorization of well-known devices, their location in the network), and further device characteristics (e.g. operating system, ports). c. NCP-VPN: delivers several relevant metadata about the VPN users, such as authorization, IP address, data throughput, and connection time. Furthermore, automated enforcement is possible on the VPN layer. d. OpenVPN: alternative, SSL-based VPN solution with similar features. IV. WORKFLOW DEMONSTRATION The following example setup and scenario is used to clarify the collaboration of the different tools as well as to further illustrate the individual task. The network infrastructure for the demonstration scenario is shown in Figure 2. Irond is running as a central MAP-server (MAPS) and several MAP-clients (MAPC) provide information regarding the overall network state: Typical services like a RADIUS server for the network access control, a DHCP server and according lease information, or a mail-server. Additionally, security relevant components are available like a Nmap scanner and an OpenVAS client, which periodically scan the network and publish information about identified devices, services, and vulnerabilities. A snort IDS monitors the network traffic and raises critical alerts. The gathered information is persisted by the data service component of VisITMeta. The connected detection
4 engine uses this information to analyze the network situation and detects malicious conditions. The found incidents are communicated towards the SIMU-GUI, which presents a general overview regarding the incidents and the network situation. More detailed information can be displayed, i.e. on the basis of the VisITMeta visualization of the MAP graph itself (cf. [9]). The SIMU- GUI additionally manages the incidents raised by the detection engine in form of a ticketing system paving the way for further handling. Previously presented visualization tools (e.g. [10]) are too complex for the less skilled operators in SME and also lack the integration of a ticketing system to further simplify the security incident management workflow for a SME. 5. The detection engine correlates the detected attack with the information that the server is actually vulnerable to these kinds of attacks (provided by the vulnerability scanner). 6. A resulting incident is created due to correlation and communicated towards the SIMU-GUI. 7. Due to its severity (a service that is actually vulnerable to the specific attack), the detection engine additionally creates metadata about the incident to enable automated enforcement, preventing further harm. 8. The RADIUS server consumes the metadata and consequently blocks the user access. A report about the enforced action is published. 9. The administrator sees the (high-level) alert reporting and can react appropriately. The provided and attached information (exactly which metadata led to the alert creation) allow for a targeted analysis. 10. After the incident has been handled appropriately, the client can be reintegrated into the company network and the employee can follow his regular work. Figure 2: Management architecture of the demonstration The communication of some MAP-clients has been realized using the CBOR-Proxy to take advantage of the more compact data representation it does not affect the fulfilled tasks. Subsequently, the individual demonstration steps will be described and Figure 3 illustrates the resulting IF-MAP graph. The initial situation is as follows: The RADIUS server manages the network access based on its configuration and the company policy. The detection engine is equipped with rules that detect malicious patterns, e.g. brute force login attacks or Snort alerts in correlation with vulnerable targets. The SIMU-GUI is used by an administrator to monitor the network status and react on incidents. The demonstration itself consists of the following activities: 1. The Nmap client identifies a running SSH server. 2. OpenVAS detects a vulnerability in the version of the SSH server. 3. Later, an employee is authenticating successfully at the RADIUS server and gains access to the company network. 4. Snort monitors network traffic and detect attack patterns from the authenticated client s IP address. Figure 3: IF-MAP graph of the workflow demonstration The administrator s viewpoint is further highlighted in Figure 4, which shows an excerpt of the information provided by the SIMU-GUI. In particular, the detailed report of the generated incident is displayed. The incident describes the detected situation and the recommendation informs the user of already performed steps (i.e. the request for an automated enforcement) and proposes next steps along with further information about the specific situation.
5 SIMU system enables automatic reactions, e.g. alerts or enforcements, to prevent attacks in the enterprise infrastructure. Eventually, the complete system thereby improves security management, especially in SME environments. ACKNOWLEDGMENT The authors give thanks to the BMBF [6] for the financial support as well as all other partners involved into the research project SIMU for their great collaboration. The project consists of the industrial partners DECOIT GmbH, NCP engineering GmbH, macmon secure gmbh, and the research partners Fraunhofer SIT, and University of Applied Sciences and Arts of Hanover. Figure 4: Incident report of the SIMU-GUI The administrator is thereby enabled to properly investigate and perform actions. The SIMU-GUI can be further used to assist the administrator to track his movements and time spent applying the integrated ticketing functionality. The gathered information can be used for later assessment of the incident as well as the response. This demonstration shows how different open source tools can be used to build a SIEM-like system that detects and treats anomalous and malicious behavior in near realtime. Different, heterogeneous data sources allow for complex and precise situation definition and the userfriendly GUI enables easier security management. The (optional) extension, CBOR proxy, allows the deployment in environments with bandwidth or resource limited scenarios. It also shows how open source tools, developed by different vendors, collaborate by leveraging TCG technologies, especially the IF-MAP protocol. V. CONCLUSIONS SIEM systems are complex solutions and consist of different modules, security components, and interfaces. Thus, high installation and service efforts are associated with the use of such systems. As a consequence, these kinds of systems are still not used in small-and-mediumsized enterprises (SME). The developed system in the SIMU project focusses on the SME scenario and targets an easier implementation strategy. The use of the IF-MAP protocol enables an integration of different information from multiple security components on the same data format. Already implemented clients and open architecture facilitate the inclusion of typical networking devices and services, reducing the management and investment efforts. This is further supported by the general focus on open-source solutions. The data collection in one common data format allows easily performed correlations to detect malicious behavior and undesirable situations. Additionally, the REFERENCES [1] K.-O. Detken, T. Rossow, R. Steuerwald: SIEM-Ansätze zur Erhöhung der IT-Sicherheit auf Basis von IF-MAP. D.A.CH Security 2014: Bestandsaufnahme, Konzepte, Anwendungen und Perspektiven, ISBN , Hrsg. Peter Schartner u. Peter Lipp, syssec-verlag, Graz (Österreich) 2014 [2] K.-O. Detken, J. v. Helden, B. Hellmann, T. Rossow, R. Steuerwald, A. Steffen, D. Dunekacke: Near Real-time Security with Open Source Tools. IF-MAP scenario demonstration on the RSA conference in San Francisco with the partners DECOIT GmbH, University of Applied Sciences in Rapperswil and University of Applied Sciences and Arts in Hanover, February, Moscone Center, USA 2014 [3] Amir Jamil: The difference between SEM, SIM and SIEM. Blog, 29 th July 2009 [4] Amrit Williams: The Future of SIEM The market will begin to diverge. Blog, 1 st January 2007 [5] SIMU project website: Last request on 11 th February 2015 [6] Federal Ministry of Education and Research: [7] M. Shahd, M. Fliehe: Fast ein Drittel der Unternehmen verzeichnen Cyberangriffe. BITKOM-Pressemitteilung vom 11. März 2014, CeBIT, Hannover 2014 [8] H. Birkholz, I. Sieverdingbeck, K. Sohr, C. Bormann: IO: An interconnected asset ontology in support of risk management processes. IEEE Seventh International Conference on Availability, Reliability and Security, Page , 2012 [9] V. Ahlers, F. Heine, B. Hellmann, C. Kleiner, L. Renners, T. Rossow, R. Steuerwald: Replicable security monitoring: Visualizing time-variant graphs of network metadata. Joint Proceedings of the 4th Int. Workshop on Euler Diagrams (ED 2014) and the 1st Int. Workshop on Graph Visualization in Practice (GViP 2014), edts.. Jim Burton, Gem Stapleton u. Karsten Klein, number 1244 in CEUR Workshop Proceedings, p , Melbourne, 2014 [10] E. Novikova, I. Kotenko: Analytical Visualization Techniques for Security Information and Event Management. 21st Euromicro International Conference on Parallel, Distributed and Network- Based Processing (PDP), 2013, IEEE Computer Society, p [11] I. Kotenko, O. Polubelova, I. Saenko: The Ontological Approach for SIEM Data Repository Implementation IEEE International Conference on Green Computing and Communications (GreenCom), IEEE Computer Society, p [12] K. Kavanagh, M. Nikolett, O. Rochford: Gartner Magic Quadrant for Security Information and Event Management, 2014 [13] ng_for_soap_specification [14] data_for_network_security
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System
Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System Prof. Dr. Kai-Oliver Detken 1, Dr. Dirk Scheuermann 2, Bastian Hellmann 3 1 DECOIT GmbH, Fahrenheitstraße 9, 28359 Bremen,
A viable SIEM approach for Android
IDAACS 2015, 24.-26.09.15 A viable SIEM approach for Android Kai-Oliver Detken Evren Eren Markus Schölzel DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen https://www.decoit.de [email protected] Outline Introduction
Trust@FHH - IF-MAP Research Projects and Open Source Software
Trust@FHH - IF-MAP Research Projects and Open Source Software Josef von Helden Trust@FHH Research Group Hochschule Hannover University of Applied Sciences and Arts June 26, 2013 Trust@FHH J. von Helden
How To Create An Integrated Visualization For A Network Security System (For A Free Download)
Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources Bastian Hellmann Trust@HsH Research Group University of Applied Sciences and Arts in Hanover July 13th 2015 GraMSec
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
A viable SIEM approach for Android
The 8 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 24-26 September 2015, Warsaw, Poland A viable SIEM approach for Android
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
TORNADO Solution for Telecom Vertical
BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
How To Manage Sourcefire From A Command Console
Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security
Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
Enabling Security Operations with RSA envision. August, 2009
Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
Realize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
Cyber Situational Awareness for Enterprise Security
Cyber Situational Awareness for Enterprise Security Tzvi Kasten AVP, Business Development Biju Varghese Director, Engineering Sudhir Garg Technical Architect The security world is changing as the nature
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security
Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
Paul Cochran - Account Manager. Chris Czerwinski System Engineer
Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
Security and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.
chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy
Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network
COUNTERSNIPE WWW.COUNTERSNIPE.COM
COUNTERSNIPE WWW.COUNTERSNIPE.COM COUNTERSNIPE SYSTEMS LLC RELEASE 7.0 CounterSnipe s version 7.0 is their next major release and includes a completely new IDS/IPS leveraging high performance scalability
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
CLOUD GUARD UNIFIED ENTERPRISE
Unified Security Anywhere CLOUD SECURITY CLOUD GUARD UNIFIED ENTERPRISE CLOUD SECURITY UNIFIED CLOUD SECURITY Cloudy with a 90% Chance of Attacks How secure is your cloud computing environment? If you
Find the needle in the security haystack
Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats
Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats Executive Summary Palo Alto Networks strategic partnership with Splunk brings the power of our next generation
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Tivoli Security Information and Event Manager V1.0
Tivoli Security Information and Event Manager V1.0 Summary Security information and event management (SIEM) is a primary concern of the CIOs and CISOs in many enterprises. They need to centralize security-relevant
Concept. Central Monitoring and IP Address Administration
Concept Central Monitoring and IP Address Administration Concept of Central Monitoring and IP Address Administration Novicom Company together with its partner Invea-tech offer a unique concept of Centralized
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements The benefits of QRadar for protective monitoring of government systems as required by the UK Government Connect
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Business Cases for Brocade Software-Defined Networking Use Cases
Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
Security Orchestration with IF-MAP
Security Orchestration with IF-MAP Gary Holland, Lumeta/IMRI 2 November 2011 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Trusted Network Connect Explanation of IF-MAP
LogInspect 5 Product Features Robust. Dynamic. Unparalleled.
LogInspect 5 Product Features Robust. Dynamic. Unparalleled. Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10
Log management & SIEM: QRadar Security Intelligence Platform
Log management & SIEM: QRadar Security Intelligence Platform Tibor Bősze Security Architect for CEE+RCIS [email protected] The Security Intelligence Leader Who is Q1Labs: Innovative Security Intelligence
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Mobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
Server Monitoring: Centralize and Win
Server Monitoring: Centralize and Win Table of Contents Introduction 2 Event & Performance Management 2 Troubleshooting 3 Health Reporting & Notification 3 Security Posture & Compliance Fulfillment 4 TNT
Solicitation RFI-FTB-1415-SIEM Project. SIEM Project. Bid designation: Public. State of California
5 Solicitation RFI-FTB-1415-SIEM SIEM Bid designation: Public 6/19/2014 10:56 AM p. 1 6 SIEM 5 Bid Number Bid Title RFI-FTB-1415-SIEM SIEM Bid Start Date Jun 19, 2014 9:56:09 AM PDT Bid End Date Jul 7,
Open Source Software for Cyber Operations:
W H I T E P A P E R Open Source Software for Cyber Operations: Delivering Network Security, Flexibility and Interoperability Introduction For the last decade, the use of open source software (OSS) in corporate
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LOGPOINT Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics,
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Simplifying. Single view, single tool virtual machine mobility management in an application fluent data center network
Simplifying Network Administration in an Alcatel- Lucent VMware Virtual Environment Single view, single tool virtual machine mobility management in an application fluent data center network Strategic White
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cisco Remote Management Services for Security
Cisco Remote Management Services for Security Innovation: Many Take Advantage of It, Some Strive for It, Cisco Delivers It. Cisco Remote Management Services (RMS) for Security provide around the clock
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Securing your IT infrastructure with SOC/NOC collaboration
Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and
funkwerk packetalarm NG IDS/IPS Systems
funkwerk packetalarm NG IDS/IPS Systems First Class Security. Intrusion Detection and Intrusion Prevention Funkwerk IP-Appliances Corporate and Authorities networks: A Popular Target of Attacks Nowadays,
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
