Data Challenges of Telcos and Service Providers. HawkEye AP Delivers Impressive Results

Size: px
Start display at page:

Download "Data Challenges of Telcos and Service Providers. HawkEye AP Delivers Impressive Results"

Transcription

1 Data Challenges of Telcos and Service Providers HawkEye AP Delivers Impressive Results October 2014

2 Proven Deployment In a recent deployment at a mobile Service Provider, Hexis delivered impressive results: CDR average streamloading frequency: 12 minutes Loading CDRs in online mode (concurrent with queries) showed only a 10% impact on system performance 150 concurrent users were able to run call detail queries against three billion records with an average response time of 1.6 seconds 15,000 call detail queries were performed in only 70 minutes Understanding the Ins and Outs of CDR Investigations Increasingly, Telcos and Service Providers are at the center of investigations ranging from fraud, cyberterrorism, online bullying, and international drug trafficking and child pornography. This is because many of crimes revolve around Internet and mobile devices activities. Law enforcement officials and government agencies realize that, buried within ISP transactional logs, clues to past or future crimes are uncovered. It was this realization that drove the European Parliament to approve rules forcing telephone companies to retain Call Detail Records (CDR) and Internet Protocol Detail Records (IPDR) for use in anti-terrorism investigations. The specific data retention requirements are mandated in the Directive 2006/24/EC to provide for National Security and Serious Crime, and require the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks. The Directive requires Member States to ensure that communications providers must retain, for a period of between six months and two years, necessary data as specified in the Directive, in order to: trace and identify the source of a communication trace and identify the destination of a communication identify the date, time and duration of a communication identify the type of communication identify the communication device identify the location of mobile communication equipment The Directive also specifies collection of data from ALL telecom services, fixed, mobile and Internet as well as all Internet access, including access. The data is required to be available to competent national authorities in specific cases, for the purpose of the investigation, detection and prosecution of serious crime, as defined by each Member State in its national law. Similarly, a new bill was introduced in the U.S. House of Representatives that, if passed, will require Internet Telco or Service Providers to retain subscriber information for up to 18 months to assist federal law enforcement in investigations into online child pornography and child exploitation cases. These broad mandates force Telco or Service Providers to maintain a view of data generated across the various systems and platforms that support their operations: Network security systems, including Internet gateways and firewalls, endpoint and mobile device management solutions, billing and customer relationship management systems. This leads to complex data collection, retention and analysis requirements that are just beginning to emerge. Understanding the Big Data Problem In order to size the challenge, let s first start with the mobile device services that have to be tracked: Voice, SMS (text), MMS, Internet and Internet telephony. The following are average mobile per-subscriber statistics to give a sense of the scale: Average voice calls: 300 per month Average SMS (text): 300 per month Average mobile Internet data requests: 150 per month For an operator with 20 million subscribers, just these three categories of traffic will generate over one billion detailed records daily which must be made available for queries. The need to retain this volume of data for two years, much less perform detailed traffic analysis at the request of authorized parties, is a significant challenge. The complexity is compounded by the requirement to correlate those records against billing information is added. This is driven by the need to answer questions like: Who owns the device being used? Does the billing address correspond with where the device activity is originating? Is there an unusual amount of activity, as compared to previous billing cycles? Based on call logs, are there variances in voice versus text usage suddenly? In some cases, operators have tried to solve these challenges by deploying systems to process the CDRs from Billing Mediation Servers (which handle CDRs for completed calls). The weakness in this approach: a significant portion of the criminal behavior of interest involves calls that are not completed, or may only be placed once. Examples of this are signals to other parties (ring twice, then hang up) or as triggers to explosive devices. In order to detect these and other non-standard suspicious events, operators must have the ability to process CDRs and IPDRs generated by all nodes in the operators network including the Base Station Controllers (BSCs) which would include all placed calls adding ring, no answer calls that went to voic as well as those that were terminated prior to going to voic . 2 Data Challenges of Telcos and Service Providers

3 Once the right set of data is collected, there is the issue of analyzing it coherently and quickly. Investigations often require teams to run complex, ad-hoc queries in order to discover new patterns of usage or behaviors. Therefore, it is not a realistic option to make data only accessible to certain experts in the organization or provide analysts with basic, pre-defined reports. Hexis Capabilities Hexis provides a scalable, high performance event data management and analysis platform that makes compliance with the EU Data Retention Directive and other Communications Data Record management requirements feasible and cost effective. Requirements to Address These Challenges There are four main stages to consider in the security event lifecycle: Collect Retain Analyze Dispose Structured and Raw Data Flexibility in storage capabilities is a key benefit to Hexis customers. In many cases, Telco and Service Providers need to store both structured and raw data for different business purposes. In a single event data warehouse, this is an example of a Hexis customers data storage: 2987 million CDRs collected per day Average size of structured CDR data: 500 bytes Average size of original/raw CDR data: 200 bytes Total 851 GB of loaded each day Hexis for Telco or Service Providers Today, Hexis is deployed at mobile, fixed-line and cable Telco and Service Provider customers in the United States, Europe, Africa and Asia. The Hexis solution is purpose-built for this market and selected because of its unique ability to: handle high volume and load rates of data store the data in a highly compressed format retain large volumes of raw data indefinitely (e.g. ten years or more, if needed) perform complex analysis, utilizing Sparse Query Optimization The Hexis Data Management Platform was built from the ground-up to store extremely large volumes of structured and unstructured data (multiple terabytes to petabytes) while providing the ability to run queries across the entire database. These basic characteristics of the system enable the ability to ingest data from any source and to execute the business logic necessary to tackle the biggest challenges in the security domain. Hexis delivers the following benefits: Diverse Collection: Captures and centrally aggregates all event records from all relevant sources This includes telephony, messaging, web traffic and custom applications both in ASCII (processed) and Binary (unprocessed) formats Efficient Management: Parses and stores event data in a highly compressed format to reduce storage requirements Utilization of intelligent / active archive platforms also reduces storage management overhead. High-speed, Online Analysis Rapid, pinpoint search through terabytes of data, correlating across event source types Scalable Performance Exceptional data load and query performance that can be easily expanded built upon a patented columnar database structure Open Access to Stored Data Allows direct access from standard Business Intelligence tools via a standard ODBC/JDBC interface 3 Data Challenges of Telcos and Service Providers

4 Integration with Third Party Applications While Hexis provides a fully functional management and retrieval system for Communications Data, many Telcos and Service Providers have existing workflow systems or enhanced requirements for local Law Enforcement Agencies (LEA). In these circumstances, Hexis provides a tight integration with external applications via either a Perl DBI interface or standard ODBC / JDBC calls. Examples of such systems are Web Portals for direct LEA access or ETSI compliant applications. The diagram below provides a high-level overview of a standard Hexis deployment within the Telco or Service Provider s network: Additional Telco or Service Provider Use Cases In addition to addressing the law enforcement/compliance aspect of Telco or Service Provider data, there are other data management cases Hexis can address. Below are a few of the advanced use cases driven by proactive operators: 1. Consolidation of CDRs into an event operational data store 2. Fraud/SPAM/Phishing detection 3. Interconnect, roaming/call termination causes 4. Billing audits/revenue assurance 4 Data Challenges of Telcos and Service Providers

5 1. Consolidation of CDRs into an Event Operational Data Store A key driver for Telco Operators is managing cost of data storage and access within an environment that is growing significantly. Subscriber events, source data from upstream sources (i.e. from the network), provisioning and billing information, create a staggering amount of data that must be collected, managed, stored, analyzed and disposed of. Today, this data is mediated by the Mediation system which applies business logic to create subsets that are consumed by various downstream applications. These applications then create separate databases of CDRs etc that grow independently of each other and will contain multiple copies of elements of the source data which can get out of sync. As data volumes grow, the utilization of Mediation for business logic processing increases, along with the volume of downstream databases. 2. Fraud/SPAM/Phishing Detection Mobile operators and their subscribers are susceptible to various fraud schemes. With the ability to look across large volumes of data and for extended periods of time, operators are able to detect a number of fraudulent patterns and take corrective actions to minimize liabilities and protect consumers: Fraudulent Use: There are a number of schemes employed by fraudulent users that allow set up a large unpaid bill on a post-paid plan. By looking at all calls for telltale-calling patterns (e.g. roaming calls placed from regions where fraud has been detected or to fraud associated numbers) can be an early warning that fraudulent behavior is underway. The account can be placed on hold and the subscriber contacted to determine if the calling is legitimate or not. Implementation of a Hexis Operation Data Store (ODS) allows Telco operators to create a centralized repository of static CDR and other source data which can be accessed by the downstream applications, thereby reducing the workload on the Mediation platform in terms of data manipulation and business logic. Benefits include: Reduced / consolidated database licensing costs A single source of verified CDR and other information that is shared between applications, thereby ensuring consistency of data between downstream processes Ability to scale in a controlled manner as the subscriber base grows Unrequested Text Messages/Phishing Attacks: The ability to detect abnormal SMS patterns, operators are able to identify suspect (and legitimate) senders and black or white list as appropriate, direct the throttling of traffic from suspect senders until an analysis is complete, and inspect the contents for phishing text keywords. SPAM/Virus/Trojan Reductions: A similar pattern of detection abnormal traffic patterns in IP traffic and suspect originating servers can help reduce the spread of viruses and Trojans. An approach that compliments real-time detection and throttling systems (like policy charging and enforcement nodes), Hexis can look back at systems affected by various attacks to detect nodes that need better protection or spare capacity to carry legitimate traffic during new attacks. 5 Data Challenges of Telcos and Service Providers

6 3. Interconnect, Roaming/Call Termination Causes When a subscriber calls a number not on the carrier s network, the carrier must pay an interconnect fee to the callee s Telco or Service Provider to complete the call. Similarly, if a carrier s subscriber places a call when roaming (not on the primary carrier s network), the primary carrier s roaming partner charges a hefty fee to handle the call. The ability of Hexis to efficiently store and query on all CDR data allows queries that identify: On/Off Network Calling Patterns: Understanding when off-network calls are placed, in which regions of the network, time of day, customer segment, length of call, etc can allow the carrier to offer tariff plans that are design to minimize cost and negotiate better terms with roaming/interconnect partners. The end result is improved profitability and plans tailored to the needs of subscribers (increasing retention and reducing acquisition costs) Call Success/Termination Causes: Tracking call termination causes (e.g. coverage, saturated network, neighbor list errors, etc ) will help RF Engineering teams make tuning adjustments or plan for additional capacity/coverage to improve network performance statistics. Roaming Analysis: Analysis of roaming calling patterns (for their own and roaming subscribers on their network) will permit operators to negotiate optimal roaming terms with partners. When this information is also combined with call termination data and RF data from Radio Access Network nodes, it would be possible for operators to determine areas where a lack of coverage is increasing roaming costs, and even the loss of customers to competitors (users in low coverage areas are likely to switch to an operator with better coverage at the end of the contract term). 4. Billing Audits/Revenue Assurance For many years, Telco and Service Providers (mobile and fixed) have been leaking revenue due to errors in the billing processing chain. The size of the problem is significant, with average revenue leakage in the 1-12% of gross revenues, and in some cases up to 20% on some data services. Based on AT&T s FY2011 financials, even at 1%, this could be a $1.2B problem for them. Missing or incomplete CDR records generated by various service nodes in the network can cause billing errors. Detection of these errors is possible by reviewing events logged from all the nodes in the call path and in the billing cycle. These include the Serving or Gateway GPRS Support Nodes (SGSNs, GGSNs), Base Station Controllers (BSCs), Mobile Switching, Multimedia or Short Message Service Centers (MSCs, MMSCs, SMSCs), mediation and billing servers. By looking for records generated by upstream nodes that do not map to complete/valid CDRs, Hexis is able to identify unbilled service delivery. Greater Data Management, Lower Cost In addition to addressing the critical requirements for these use cases, Hexis provides the added value of reducing storage costs. The following charts show the monthly CDR data load of a typical Hexis deployment: 6 Data Challenges of Telcos and Service Providers

7 Rapid Analysis over Large Data Sets In another Hexis Telco customer, a Service Level Agreement is in place around query response time across massive volumes of data. Analysts must complete 524 queries in ten hours against 60 days of data - The average processing time for request: 344 seconds CDR average load per day frequency: 150 million IPDR average load per day frequency: 95 million Based on the Hexis event data warehouse technologies, including a patented columnar storage and powerful compression, this is an example of a customer s storage savings. Total number of loaded records in 24 months Total source size Total storage used in Hexis deployment Storage saved by using Hexis 471,419,711, TB 43 TB 314 TB With over 314 TB saved in disk space, and using a calculation of six to ten thousand dollars per TB in SAN storage/operational cost these days, the return on investment is evident, as this compression ratio is less than one-tenth the data being loaded. Raw byte size (in TB) Online storage used in Hexis Nearline storage used in Hexis 7 Data Challenges of Telcos and Service Providers

8 Summary Hexis provides a cost-effective, scalable, high performance event data management and analysis platform that makes the management and utilization of large volumes of CDR and IPDR data over time feasible and cost effective. Hexis delivers the following benefits: Diverse Collection: Captures and centrally aggregates all event records from all relevant sources including telephony, messaging, web traffic and custom applications Efficient Management: parses and stores event data in a highly compressed format to reduce storage requirements High-speed, Online Analysis: rapid, pinpoint search through terabytes of data, correlating across event source types Scalable Performance: exceptional data load and query performance that can be easily expanded Integration with Nearline Archive Platforms: Considerably lowers the costs of managing operational network data Hexis Cyber Solutions, Inc. a wholly-owned subsidiary of The KEYW Holding Corporation 7740 Milestone Parkway Suite 400 Hanover, MD [email protected] About Hexis Cyber Solutions Hexis Cyber Solutions, Inc., a wholly-owned subsidiary of The KEYW Holding Corporation (NASDAQ: KEYW) based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, and government agencies. Our mission is to ensure that business IT infrastructure is equipped with tools and capabilities to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime targets. Hexis Cyber Solutions HawkEye family of products offer active, multidisciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting advanced cybersecurity missions within the US, ensuring your business or organization operates at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone ; Fax ; [email protected]; or on the Web at www. hexiscyber.com. Copyright 2013 Hexis Cyber Solutions, Inc. All rights reserved. Hexis Cyber Solutions and HawkEye are protected by U.S. and international copyright and intellectual property laws. Hexis Cyber Solutions and HawkEye are registered trademarks or trademarks of Hexis Cyber Solutions Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. 8 Data Challenges of Telcos and Service Providers Rev. Oct.22, 2014

Beyond Watson: The Business Implications of Big Data

Beyond Watson: The Business Implications of Big Data Beyond Watson: The Business Implications of Big Data Shankar Venkataraman IBM Program Director, STSM, Big Data August 10, 2011 The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

International Dialing and Roaming: Preventing Fraud and Revenue Leakage page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related

More information

WHITE PAPER. Gaining Total Visibility for Lawful Interception

WHITE PAPER. Gaining Total Visibility for Lawful Interception WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Mobile SMS and Data Roaming Explained

Mobile SMS and Data Roaming Explained Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area

More information

SQL Server Business Intelligence on HP ProLiant DL785 Server

SQL Server Business Intelligence on HP ProLiant DL785 Server SQL Server Business Intelligence on HP ProLiant DL785 Server By Ajay Goyal www.scalabilityexperts.com Mike Fitzner Hewlett Packard www.hp.com Recommendations presented in this document should be thoroughly

More information

Solace s Solutions for Communications Services Providers

Solace s Solutions for Communications Services Providers Solace s Solutions for Communications Services Providers Providers of communications services are facing new competitive pressures to increase the rate of innovation around both enterprise and consumer

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Processing and Analyzing Streams. CDRs in Real Time

Processing and Analyzing Streams. CDRs in Real Time Processing and Analyzing Streams of CDRs in Real Time Streaming Analytics for CDRs 2 The V of Big Data Velocity means both how fast data is being produced and how fast the data must be processed to meet

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive October 2005 ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive INTRODUCTION 1.- Purpose of the document This document

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

Application Note. Introduction to Monitoring Use Cases Using Dialogic DSI SS7HD Network Interface Boards

Application Note. Introduction to Monitoring Use Cases Using Dialogic DSI SS7HD Network Interface Boards Application Note Introduction to Monitoring Use Cases Using Dialogic DSI SS7HD Network Interface Boards Application Note Introduction to Monitoring Use Cases Using Dialogic DSI SS7HD Network Interface

More information

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs)

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) www.pipelinepub.com Volume 5, Issue 5 Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs) Operators encounter it daily: They work to provide their subscribers

More information

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach

More information

Managing Big Data with Hadoop & Vertica. A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database

Managing Big Data with Hadoop & Vertica. A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database Managing Big Data with Hadoop & Vertica A look at integration between the Cloudera distribution for Hadoop and the Vertica Analytic Database Copyright Vertica Systems, Inc. October 2009 Cloudera and Vertica

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Security Information Lifecycle

Security Information Lifecycle Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4

More information

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers The World's Fastest and Most Scalable SIEM Finally an enterprise-class security information and event management system

More information

SERVICE PROVIDER ACCESS IN MOBILE NETWORKS. March 2003

SERVICE PROVIDER ACCESS IN MOBILE NETWORKS. March 2003 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) SERVICE PROVIDER ACCESS IN MOBILE NETWORKS March 2003 Page 2 EXECUTIVE SUMMARY

More information

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices

An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

TORNADO Solution for Telecom Vertical

TORNADO Solution for Telecom Vertical BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment ISI SOLUTIONS WHITE PAPER ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment By: Mitchell Weiss Director of Product Strategy ISI Telemanagement

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

utimaco a member of the Sophos Group

utimaco a member of the Sophos Group Utimaco LIMS Lawful Interception of Telecommunication Services Benefits Compliance + Provides surveillance of all common telecommunication services in fixed and mobile networks, incl. telephony, fax, SMS,

More information

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; [email protected] Voice over (Vo) was developed at some universities to diminish

More information

Know. what will happen. Allround Puts You in Control. www.allround.eu

Know. what will happen. Allround Puts You in Control. www.allround.eu Know what will happen. Allround Puts You in Control www.allround.eu Allround Headquarters 183 Budafoki ut Budapest 1117 Hungary T: +36 1 206 6280 F: +36 1 206 1638 [email protected] Allround Solutions Proactive

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Sybase IQ Supercharges Predictive Analytics

Sybase IQ Supercharges Predictive Analytics SOLUTIONS BROCHURE Sybase IQ Supercharges Predictive Analytics Deliver smarter predictions with Sybase IQ for SAP BusinessObjects users Optional Photos Here (fill space) www.sybase.com SOLUTION FEATURES

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

Solutions for Communications with IBM Netezza Network Analytics Accelerator

Solutions for Communications with IBM Netezza Network Analytics Accelerator Solutions for Communications with IBM Netezza Analytics Accelerator The all-in-one network intelligence appliance for the telecommunications industry Highlights The Analytics Accelerator combines speed,

More information

Society, Law Enforcement and the Internet

Society, Law Enforcement and the Internet Society, Law Enforcement and the Internet Models for Give-and-Take Carter Bullard CEO/President QoSient, LLC 150 E 57th Street Suite 12D New York, New York 10022 ICCS 2010 New York, New York [email protected]

More information

Business Cases for Brocade Software-Defined Networking Use Cases

Business Cases for Brocade Software-Defined Networking Use Cases Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,

More information

QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM

QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM QLIKVIEW DEPLOYMENT FOR BIG DATA ANALYTICS AT KING.COM QlikView Technical Case Study Series Big Data June 2012 qlikview.com Introduction This QlikView technical case study focuses on the QlikView deployment

More information

Business white paper. From big data to knowledge: analytic use cases for CSPs

Business white paper. From big data to knowledge: analytic use cases for CSPs Business white paper From big data to knowledge: analytic use cases for CSPs Executive summary Big data is an opportunity for communications service providers (CSPs) to create the intelligence for operating

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...

More information

29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy 29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses

More information

Access Mediation: Preserving Network Security and Integrity

Access Mediation: Preserving Network Security and Integrity Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering

More information

Scalability in Log Management

Scalability in Log Management Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:

More information

Boosting enterprise security with integrated log management

Boosting enterprise security with integrated log management IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise

More information

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency. Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit 5 Key Questions Auditors Ask During a Database Compliance Audit White Paper Regulatory legislation is increasingly driving the expansion of formal enterprise audit processes to include information technology

More information

An Oracle White Paper July 2013. Oracle Enterprise Operations Monitor: Real-Time Voice over Internet Protocol Monitoring and Troubleshooting

An Oracle White Paper July 2013. Oracle Enterprise Operations Monitor: Real-Time Voice over Internet Protocol Monitoring and Troubleshooting An Oracle White Paper July 2013 Oracle Enterprise Operations Monitor: Real-Time Voice over Internet Protocol Monitoring and Troubleshooting Introduction... 1 Overview... 2 Key Functions and Features...

More information

Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long for clients to benefit from the vast range of functionality.

Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long for clients to benefit from the vast range of functionality. The Big Data Mining Company BETTER VISILITY FOR BETTER CONTROL AND BETTER MANAGEMENT 100 Examples on customer use cases Thanks to SECNOLOGY s wide range and easy to use technology, it doesn t take long

More information

Advanced In-Database Analytics

Advanced In-Database Analytics Advanced In-Database Analytics Tallinn, Sept. 25th, 2012 Mikko-Pekka Bertling, BDM Greenplum EMEA 1 That sounds complicated? 2 Who can tell me how best to solve this 3 What are the main mathematical functions??

More information

SQL Server 2012 Performance White Paper

SQL Server 2012 Performance White Paper Published: April 2012 Applies to: SQL Server 2012 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

G DATA TechPaper #0275. G DATA Network Monitoring

G DATA TechPaper #0275. G DATA Network Monitoring G DATA TechPaper #0275 G DATA Network Monitoring G DATA Software AG Application Development May 2016 Contents Introduction... 3 1. The benefits of network monitoring... 3 1.1. Availability... 3 1.2. Migration

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer. THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from

More information

SQL Azure vs. SQL Server

SQL Azure vs. SQL Server SQL Azure vs. SQL Server Authors Dinakar Nethi, Niraj Nagrani Technical Reviewers Michael Thomassy, David Robinson Published April 2010 Summary SQL Azure Database is a cloud-based relational database service

More information

Current IBAT Endorsed Services

Current IBAT Endorsed Services Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network

More information

White Paper. Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform

White Paper. Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform Interconnecting Networks with Dialogic s Global Multimedia Exchange Platform Executive Summary The architecture and approach that network operators have traditionally used for network interconnection have

More information

IBM QRadar Security Intelligence Platform appliances

IBM QRadar Security Intelligence Platform appliances IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed

Benefits. Around-the-clock data collection and CDR warehousing ensures data is there when needed Distributed Network Monitoring and Analysis System for Multi- Protocol Environments TAMS TAMS is a powerful, customized traffic analysis and monitoring system for multi-protocol environments. Featuring

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

RSA Security Analytics Security Analytics System Overview

RSA Security Analytics Security Analytics System Overview RSA Security Analytics Security Analytics System Overview Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

Websense Data Security Solutions

Websense Data Security Solutions Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting

More information

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Protect the data that drives our customers business. Data Security. Imperva s mission is simple: The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

More information

Configuring Celerra for Security Information Management with Network Intelligence s envision

Configuring Celerra for Security Information Management with Network Intelligence s envision Configuring Celerra for Security Information Management with Best Practices Planning Abstract appliance is used to monitor log information from any device on the network to determine how that device is

More information

Compliance Overview: FISMA / NIST SP800 53

Compliance Overview: FISMA / NIST SP800 53 Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government

More information

Financial discovery and beyond using BMMsoft EDMT Solution

Financial discovery and beyond using BMMsoft EDMT Solution Financial discovery and beyond using BMMsoft EDMT Solution USE CASE STUDY The industry is a litigation-intensive sector, so the timely iden ation of relevant business records is an imperative. This is

More information

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Appliances and DW Architectures John O Brien President and Executive Architect Zukeran Technologies 1 TDWI 1 Agenda What

More information

Torquex Customer Engagement Analytics. End to End View of Customer Interactions and Operational Insights

Torquex Customer Engagement Analytics. End to End View of Customer Interactions and Operational Insights Torquex Customer Engagement Analytics End to End View of Customer Interactions and Operational Insights Rob Witthoft Torquex {Pty) Ltd 10/1/2015 Torquex Customer Engagement Analytics Torquex Customer Engagement

More information

Defending Against Cyber Attacks with SessionLevel Network Security

Defending Against Cyber Attacks with SessionLevel Network Security Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive

More information

IBM Content Analytics: Rapid insight for crime investigation

IBM Content Analytics: Rapid insight for crime investigation IBM Content Analytics: Rapid insight for crime investigation Discover insights in structured and unstructured information to speed case and identity resolution Highlights Reduces investigation time from

More information

Symantec Advanced Threat Protection: Network

Symantec Advanced Threat Protection: Network Symantec Advanced Threat Protection: Network Data Sheet: Advanced Threat Protection The Problem Today s advanced attacks hide themselves on legitimate websites, leverage new and unknown vulnerabilities,

More information

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense

Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense Automating ITIL v3 Event Management with IT Process Automation: Improving Quality while Reducing Expense An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for NetIQ November 2008 IT Management

More information

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3 DATRET/EXPGRP (2009) 3 - FINAL EXPERTS GROUP "THE PLATFORM FOR ELECTRONIC DATA RETENTION FOR THE INVESTIGATION, DETECTION AND PROSECUTION OF SERIOUS CRIME" ESTABLISHED BY COMMISSION DECISION 2008/324/EC

More information