Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success



Similar documents
Eoin Thornton Senior Security Architect Zinopy Security Ltd.

An Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success. September, 2009

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

RSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief

QRadar SIEM 6.3 Datasheet

Enabling Security Operations with RSA envision. August, 2009

End-to-end Solutions to Enable Log Management Best Practices

RSA Solution Brief. Platform. The RSA envision. A Single, Integrated 3-in-1 Log Management Solution. RSA Solution Brief

Clavister InSight TM. Protecting Values

Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

How To Buy Nitro Security

Security Information Lifecycle

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

RSA Solution Brief. RSA envision LogSmart Internet Protocol Database. RSA Solution Brief

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Configuring Celerra for Security Information Management with Network Intelligence s envision

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Effective Use of Security Event Correlation

Peter Dulay, CISSP Senior Architect, Security BU

Enterprise Security Solutions

How To Achieve Pca Compliance With Redhat Enterprise Linux

RSA envision Platform. Sales Guide

Vulnerability. Management

White paper. Log Management Best Practices. The Foundation for Comprehensive Security Information and Event Management

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Security Controls What Works. Southside Virginia Community College: Security Awareness

Scalability in Log Management

Payment Card Industry Data Security Standard

Real-Time Database Protection and. Overview IBM Corporation

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

syslog-ng Product Line

VMware Integrated Partner Solutions for Networking and Security

RSA Security Solutions for Virtualization

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

RSA envision to RSA Security Analytics. Successful Migration in a Managed Environment

Detect & Investigate Threats. OVERVIEW

Symantec Security Information Manager Administrator Guide

How To Manage Log Management

EMC Security for Microsoft Exchange Solution: Data Loss Prevention and Secure Access Management

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Cisco ASA 5500 Series Firewall Edition for the Enterprise

Caretower s SIEM Managed Security Services

Current IBAT Endorsed Services

Feature. Log Management: A Pragmatic Approach to PCI DSS

IBM QRadar Security Intelligence April 2013

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Cisco Advanced Services for Network Security

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

The Education Fellowship Finance Centralisation IT Security Strategy

Boosting enterprise security with integrated log management

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Discover & Investigate Advanced Threats. OVERVIEW

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

An Oracle White Paper January Oracle Database Firewall

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

AlienVault for Regulatory Compliance

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

Meeting PCI Data Security Standards with

10 Reasons Your Existing SIEM Isn t Good Enough

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Secret Server Splunk Integration Guide

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

What is Security Intelligence?

INCIDENT RESPONSE CHECKLIST

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

The Comprehensive Guide to PCI Security Standards Compliance

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

CorreLog Alignment to PCI Security Standards Compliance

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Preemptive security solutions for healthcare

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Transcription:

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success Copyright 2008 EMC Corporation. All rights reserved. Chris Bloom, RSA, The Security Division of EMC

Today s Agenda The Evolving Landscape Around Security & Compliance How RSA envision Turns Log Data Into Actionable Information The RSA envision Difference Copyright 2008 EMC Corporation. All rights reserved. 2

Challenge: Changing Threat Profile Attacks occur over long periods of time TJX - Credit card data compromised over 17-month period at retailer Insiders perpetrating more and bigger thefts Fidelity National - Database administrator at investment organization stole 2.3 million consumer records and successfully sold them Cybercrime has become a $105B business that now surpasses the value of the illegal drug trade worldwide (David DeWalt, McAfee CEO, September 2007) Copyright 2008 EMC Corporation. All rights reserved. 3

Challenge: Compliance More Proscriptive, Complex and Expensive Than Ever Specific mandates e.g. PCI, partner contracts etc. very prescriptive (thou shalt encrypt data at rest etc.) Best practice based mandates e.g. EUDPD, HIPAA, SOX thou shalt exert best practice when thou dealest with my data However, leaves exact details of how and what open to interpretation. Mandatory disclosure e.g. State privacy laws Don t specify what has to be done, but If you lose my data you must inform us about it Copyright 2008 EMC Corporation. All rights reserved. 4

Challenge: Infrastructures and organizations are getting ever more complex IT environments are seldom single, monolithic entities Invariably a complex mass of conflicting technologies Ill-defined priorities All managed by a matrix organization It s difficult to get visibility into the IT environment What is out there? What activities are taking place? What will stop working when I make a change? What impact will that have on the business? Copyright 2008 EMC Corporation. All rights reserved. 5

Challenge: Explosive Growth of Security Data information growth information uses information regulations more growth: Estimated 58% CAGR for security information over next five years (ESG, 2006) more types: firewalls, VPNs, hosts, applications, storage more uses: Security Operations, Compliance, Risk Management, Application Performance, IT Operations information types more regulations: Sarbanes-Oxley, PCI, Basel II, GLBA, HIPAA, FISMA, etc. (more coming!) Copyright 2008 EMC Corporation. All rights reserved. 6

Today s Agenda The Evolving Landscape Around Security & Compliance How envision Turns Log Data Into Actionable Information The RSA envision Difference Copyright 2008 EMC Corporation. All rights reserved. 7

Logs Are a Goldmine of Data Unix Router Database Application Firewall Intrusion Prevention System Log File File Server Program installed User account created Failed login Copyright 2008 EMC Corporation. All rights reserved. 8 Unauthorized access attempt Database design change

RSA envision Turns Log Data into Information Baseline Correlated Report Realtime Alerts Forensics Analysis Interactive Query Integrated Incident Mgmt. Analyze SIEM Log Mgmt Manage Collect Collect Collect UDS Windows Server Netscreen Firewall Cisco IPS Juniper IDP Microsoft ISS Trend Micro Antivirus Device Device RSA envision Supported Devices Legacy Copyright 2008 EMC Corporation. All rights reserved. 9

RSA envision: Purpose-Built Platform Non-Intrusive, Extensible, Easy to Deploy Security event & operations info. No data filtering Parallel architecture ensures alert performance Easy to deploy appliance packaging PARALLEL PROCESSES No agents required Flexible XML UDS engine Copyright 2008 EMC Corporation. All rights reserved. 10 Customizable work environments Fully customizable compliance & security reports

RSA envision and LogSmart IPDB All the Data with Consistently High Performance Limitations of Relational Database Not designed for unstructured data (log) Data Loss Requires processing (filter, normalize, parse) Unpredictable consumption: collection bottleneck impacts use of data (e.g. alerts) Data Explosion Relational Database Unpredictable Alerts Data Loss: events are lost due to selective collection or system bottleneck Data Explosion: indexes & related data structure information is added (can result in <10x data) Copyright 2008 EMC Corporation. All rights reserved. 11

RSA envision and LogSmart IPDB All the Data with Consistently High Performance Data Loss Data Explosion Relational Database Unpredictable Alerts Parallel analysis Limitations of Relational Database Not designed for unstructured data (log) Requires processing (filter, normalize, parse) Unpredictable consumption: collection bottleneck impacts use of data (e.g. alerts) Data Loss: events are lost due to selective collection or system bottleneck Authenticated Data Explosion: indexes & related Compressed data structure information is added (can result in <10x data) Encrypted LogSmart IPDB Copyright 2008 EMC Corporation. All rights reserved. 12

Manages the Lifecycle of Security Information ILM User Defines Log Retention Policies RSA envision Automatically Enforces Policies Online Policy (~ 15 months) Retention Policy Store Retain Capture Compress Secure Retire Online in Nearline EMC Celerra EMC Centera Copyright 2008 EMC Corporation. All rights reserved. 13

Scales from Single Appliance to Global Deployment A-SRV D-SRV NAS D-SRV LC NAS LC Chicago WW Security Operations London European Headquarters A-SRV D-SRV D-SRV Mumbai Remote Office LC NAS LC A-SRV: Analysis Server D-SRV: Data Server LC: Local Collector New York RC: Remote Collector WW Compliance Operations Copyright 2008 EMC Corporation. All rights reserved. 14

Presents Information in Easily Digestible Format Dashboards >1100 reports for regulatory compliance, security, and IT & network operations Copyright 2008 EMC Corporation. All rights reserved. 15

Integrates Seamlessly with EMC Storage Online Storage >ST31XX Direct Attached >RSA envision DAS2000 >Single Appliance >1TB-2.5TB >2.75TB >RSA envision NAS3500 >Based on EMC Celerra > Multi-Appliance > Enterprise Class >3.5TB 7TB >Celerra Family Integrated Network Attached >Enterprise Class >5TB + >With Celerra Gateway: >EMC Clariion Family >EMC Symmetrix Family >Enterprise Class >5TB + Longer Retention Storage >Centera Content Addressed Storage Systems External Network Attached Storage Recommended for all RSA envision LS cluster deployments, Required for High Availability Copyright 2008 EMC Corporation. All rights reserved. 16

Options for Smallest to Largest Deployments 300,000 30000 EPS LS Series 10000 7500 5000 ES Series 2500 1000 500 # DEVICES 100 200 400 750 1250 1500 2048 30,000 Copyright 2008 EMC Corporation. All rights reserved. 17

Today s Agenda The Evolving Landscape Around Security & Compliance How envision Turns Log Data Into Actionable Information The RSA envision Difference Copyright 2008 EMC Corporation. All rights reserved. 18

Advantage: Best-in-Class Functionality All the Data Ability to Collect, Manage & Analyze All the Data Single Global View Event Source Support Non-invasive Deployment Interoperable & Extensible All the Time Cradle to Grave ILM High Availability Infrastructure Uninterrupted Scalability High and Consistent Application Performance Low TCO Strong Customer Focused Organization Copyright 2008 EMC Corporation. All rights reserved. 19

Advantage: Maximum Efficiency and Low TCO Data Storage Advantage GBs Per Day Collection Rate Advantage (EPS) 250 10,000 200 9,000 8,000 150 7,000 6,000 100 5,000 4,000 50 3,000 2,000 1,000 0 1000 EPS 5000 EPS 10,000 EPS Events Per Second (EPS) 0 System Performance RDBMS LogSmart IPDB RDBMS LogSmart IPDB Copyright 2008 EMC Corporation. All rights reserved. 20

Advantage: Independently Acknowledged Industry Leader Copyright 2008 EMC Corporation. All rights reserved. 21

Advantage: Unparalleled Demonstrable Scalability Organization Driver Locations Events Devices Security Configuration Control Access Control Enforcement Privileged User Monitoring 34 240K/ Sec 20B/ Day 76.8T/ Year 30,000 Compliance & Security Real-Time Monitoring False Positive Reduction Access Control Enforcement 18 180K/ Sec 15.5B/ Day 5.6T/ Year 20,000 Compliance SAS 70 Compliance 28 450K/ Sec 38.8T/ Day 148T/ Year 28,000 Compliance & Security Log Management Monitoring Firewalls For Audits 4 80K/ Sec 6.9B/ Day 2.5T/ Year 4,000 Compliance Internal Audit 3 95K/ Sec 8.2T/ Day 2.9T/ Year 17,000 Copyright 2008 EMC Corporation. All rights reserved. 22

Advantage: Unparalleled Client Base Over 1300 Clients Energy & Utility Retail & Hospitality MSSP Healthcare Fortune 500 Financial Services Copyright 2008 EMC Corporation. All rights reserved. 23

Summary Logs are a gold mine of information for Improving security Demonstrating compliance Streamlining IT operations RSA envision turns log data into information Readable reports Actionable alerts At-a-glance dashboards RSA envision is widely accepted as the leading SIEM solution Unparalleled demonstrable scalability Independently validated leadership Invaluable install base Copyright 2008 EMC Corporation. All rights reserved. 24

Today s Agenda The Evolving Landscape Around Security & Compliance How RSA envision Turns Log Data Into Actionable Information The RSA envision Difference Copyright 2008 EMC Corporation. All rights reserved. 26

Challenge: Changing Threat Profile Attacks occur over long periods of time TJX - Credit card data compromised over 17-month period at retailer Insiders perpetrating more and bigger thefts Fidelity National - Database administrator at investment organization stole 2.3 million consumer records and successfully sold them Cybercrime has become a $105B business that now surpasses the value of the illegal drug trade worldwide (David DeWalt, McAfee CEO, September 2007) Copyright 2008 EMC Corporation. All rights reserved. 27

Challenge: Compliance More Proscriptive, Complex and Expensive Than Ever Specific mandates e.g. PCI, partner contracts etc. very prescriptive (thou shalt encrypt data at rest etc.) Best practice based mandates e.g. EUDPD, HIPAA, SOX thou shalt exert best practice when thou dealest with my data However, leaves exact details of how and what open to interpretation. Mandatory disclosure e.g. State privacy laws Don t specify what has to be done, but If you lose my data you must inform us about it Copyright 2008 EMC Corporation. All rights reserved. 28

Challenge: Infrastructures and organizations are getting ever more complex IT environments are seldom single, monolithic entities Invariably a complex mass of conflicting technologies Ill-defined priorities All managed by a matrix organization It s difficult to get visibility into the IT environment What is out there? What activities are taking place? What will stop working when I make a change? What impact will that have on the business? Copyright 2008 EMC Corporation. All rights reserved. 29

Challenge: Explosive Growth of Security Data information growth information uses information regulations more growth: Estimated 58% CAGR for security information over next five years (ESG, 2006) more types: firewalls, VPNs, hosts, applications, storage more uses: Security Operations, Compliance, Risk Management, Application Performance, IT Operations information types more regulations: Sarbanes-Oxley, PCI, Basel II, GLBA, HIPAA, FISMA, etc. (more coming!) Copyright 2008 EMC Corporation. All rights reserved. 30

Today s Agenda The Evolving Landscape Around Security & Compliance How envision Turns Log Data Into Actionable Information The RSA envision Difference Copyright 2008 EMC Corporation. All rights reserved. 31

Logs Are a Goldmine of Data Unix Router Database Application Firewall Intrusion Prevention System Log File File Server Program installed User account created Failed login Copyright 2008 EMC Corporation. All rights reserved. 32 Unauthorized access attempt Database design change

RSA envision Turns Log Data into Information Baseline Correlated Report Realtime Alerts Forensics Analysis Interactive Query Integrated Incident Mgmt. Analyze SIEM Log Mgmt Manage Collect Collect Collect UDS Windows Server Netscreen Firewall Cisco IPS Juniper IDP Microsoft ISS Trend Micro Antivirus Device Device RSA envision Supported Devices Legacy Copyright 2008 EMC Corporation. All rights reserved. 33

RSA envision: Purpose-Built Platform Non-Intrusive, Extensible, Easy to Deploy Security event & operations info. No data filtering Parallel architecture ensures alert performance Easy to deploy appliance packaging PARALLEL PROCESSES No agents required Flexible XML UDS engine Copyright 2008 EMC Corporation. All rights reserved. 34 Customizable work environments Fully customizable compliance & security reports

RSA envision and LogSmart IPDB All the Data with Consistently High Performance Limitations of Relational Database Not designed for unstructured data (log) Data Loss Requires processing (filter, normalize, parse) Unpredictable consumption: collection bottleneck impacts use of data (e.g. alerts) Data Explosion Relational Database Unpredictable Alerts Data Loss: events are lost due to selective collection or system bottleneck Data Explosion: indexes & related data structure information is added (can result in <10x data) Copyright 2008 EMC Corporation. All rights reserved. 35

Manages the Lifecycle of Security Information ILM User Defines Log Retention Policies RSA envision Automatically Enforces Policies Online Policy (~ 15 months) Retention Policy Store Retain Capture Compress Secure Retire Online in Nearline EMC Celerra EMC Centera Copyright 2008 EMC Corporation. All rights reserved. 36

Scales from Single Appliance to Global Deployment A-SRV D-SRV NAS D-SRV LC NAS LC Chicago WW Security Operations London European Headquarters A-SRV D-SRV D-SRV Mumbai Remote Office LC NAS LC A-SRV: Analysis Server D-SRV: Data Server LC: Local Collector New York RC: Remote Collector WW Compliance Operations Copyright 2008 EMC Corporation. All rights reserved. 37

Presents Information in Easily Digestible Format Dashboards >1100 reports for regulatory compliance, security, and IT & network operations Copyright 2008 EMC Corporation. All rights reserved. 38

Integrates Seamlessly with EMC Storage Online Storage >ST31XX Direct Attached >RSA envision DAS2000 >Single Appliance >1TB-2.5TB >2.75TB >RSA envision NAS3500 >Based on EMC Celerra > Multi-Appliance > Enterprise Class >3.5TB 7TB >Celerra Family Integrated Network Attached >Enterprise Class >5TB + >With Celerra Gateway: >EMC Clariion Family >EMC Symmetrix Family >Enterprise Class >5TB + Longer Retention Storage >Centera Content Addressed Storage Systems External Network Attached Storage Recommended for all RSA envision LS cluster deployments, Required for High Availability Copyright 2008 EMC Corporation. All rights reserved. 39

Options for Smallest to Largest Deployments 300,000 30000 EPS LS Series 10000 7500 5000 ES Series 2500 1000 500 # DEVICES 100 200 400 750 1250 1500 2048 30,000 Copyright 2008 EMC Corporation. All rights reserved. 40

Today s Agenda The Evolving Landscape Around Security & Compliance How envision Turns Log Data Into Actionable Information The RSA envision Difference Copyright 2008 EMC Corporation. All rights reserved. 41

Advantage: Best-in-Class Functionality All the Data Ability to Collect, Manage & Analyze All the Data Single Global View Event Source Support Non-invasive Deployment Interoperable & Extensible All the Time Cradle to Grave ILM High Availability Infrastructure Uninterrupted Scalability High and Consistent Application Performance Low TCO Strong Customer Focused Organization Copyright 2008 EMC Corporation. All rights reserved. 42

Advantage: Maximum Efficiency and Low TCO Data Storage Advantage GBs Per Day Collection Rate Advantage (EPS) 250 10,000 200 9,000 8,000 150 7,000 6,000 100 5,000 4,000 50 3,000 2,000 1,000 0 1000 EPS 5000 EPS 10,000 EPS Events Per Second (EPS) 0 System Performance RDBMS LogSmart IPDB RDBMS LogSmart IPDB Copyright 2008 EMC Corporation. All rights reserved. 43

Advantage: Independently Acknowledged Industry Leader Copyright 2008 EMC Corporation. All rights reserved. 44

Advantage: Unparalleled Demonstrable Scalability Organization Driver Locations Events Devices Security Configuration Control Access Control Enforcement Privileged User Monitoring 34 240K/ Sec 20B/ Day 76.8T/ Year 30,000 Compliance & Security Real-Time Monitoring False Positive Reduction Access Control Enforcement 18 180K/ Sec 15.5B/ Day 5.6T/ Year 20,000 Compliance SAS 70 Compliance 28 450K/ Sec 38.8T/ Day 148T/ Year 28,000 Compliance & Security Log Management Monitoring Firewalls For Audits 4 80K/ Sec 6.9B/ Day 2.5T/ Year 4,000 Compliance Internal Audit 3 95K/ Sec 8.2T/ Day 2.9T/ Year 17,000 Copyright 2008 EMC Corporation. All rights reserved. 45

Advantage: Unparalleled Client Base Over 1300 Clients Energy & Utility Retail & Hospitality MSSP Healthcare Fortune 500 Financial Services Copyright 2008 EMC Corporation. All rights reserved. 46

Summary Logs are a gold mine of information for Improving security Demonstrating compliance Streamlining IT operations RSA envision turns log data into information Readable reports Actionable alerts At-a-glance dashboards RSA envision is widely accepted as the leading SIEM solution Unparalleled demonstrable scalability Independently validated leadership Invaluable install base Copyright 2008 EMC Corporation. All rights reserved. 47