RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution



Similar documents
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

An Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success. September, 2009

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Enabling Security Operations with RSA envision. August, 2009

RSA Security Solutions for Virtualization

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

What is Security Intelligence?

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

IBM QRadar Security Intelligence April 2013

McAfee Data Protection Solutions

Compliance Management, made easy

A Buyer's Guide to Data Loss Protection Solutions

V1.4. Spambrella Continuity SaaS. August 2

Q1 Labs Corporate Overview

How To Manage Security On A Networked Computer System

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation

Detect & Investigate Threats. OVERVIEW

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

How RSA has helped EMC to secure its Virtual Infrastructure

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Sarbanes-Oxley Compliance for Cloud Applications

Automate PCI Compliance Monitoring, Investigation & Reporting

PCI Compliance for Cloud Applications

Symantec DLP Overview. Jonathan Jesse ITS Partners

Discover & Investigate Advanced Threats. OVERVIEW

Clavister InSight TM. Protecting Values

Ecom Infotech. Page 1 of 6

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Caretower s SIEM Managed Security Services

10 Building Blocks for Securing File Data

CA Technologies Data Protection

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

TRIPWIRE NERC SOLUTION SUITE

Under the Hood of the IBM Threat Protection System

The SIEM Evaluator s Guide

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

QRadar SIEM and Zscaler Nanolog Streaming Service

Securing SharePoint 101. Rob Rachwald Imperva

ENABLING FAST RESPONSES THREAT MONITORING

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

The Impact of HIPAA and HITECH

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy

End-user Security Analytics Strengthens Protection with ArcSight

Websense Data Security Solutions

White paper. Four Best Practices for Secure Web Access

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

nfx Cinxi One SIEM Partner Guide Revision: H2CY10

Log Management Solution for IT Big Data

RSA Security Analytics

Vulnerability. Management

Information & Asset Protection with SIEM and DLP

RSA Solution Brief. Platform. The RSA envision. A Single, Integrated 3-in-1 Log Management Solution. RSA Solution Brief

Quest InTrust. Change auditing and policy compliance for the secure enterprise. May Copyright 2006 Quest Software

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

RSA Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Copyright 11/1/2010 BMC Software, Inc 1

QRadar SIEM and FireEye MPS Integration

Maximizing Configuration Management IT Security Benefits with Puppet

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Continuous Network Monitoring

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Vistara Lifecycle Management

Published April Executive Summary

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

IT Security & Compliance. On Time. On Budget. On Demand.

Vulnerability Management

SIEM Implementation Approach Discussion. April 2012

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE

Transcription:

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution David Mateju RSA Sales Consultant, RSA CSE david.mateju@rsa.com

Adding an information-centric view Infrastructure Information Infrastructure Logs Infrastructure Vulnerabilities Infrastructure Configuration Information Location Information Sharing Information Usage DLP Datacenter DLP Network DLP Endpoint

Use Case: Security incident classification DLP detects information leaving network DLP Network Analyst investigates malware outbreak Antivirus detects malware DLP tells you if confidential data lost as a result Without DLP True impact of malware infection not known Without envision Slower detection of malware outbreak More resourceintensive investigation Without integration Analyst needs training in 2 products No single pane of glass to get full picture

Use Case: Data forensics Employee leaves to join competition Server logs show which files employee accessed Analyst needs to find out what information employee accessed in final days DLP Endpoint DLP Network DLP events tell you which files were sensitive and what the employee did with them Without envision Resource-intensive to find out which files employee accessed Without DLP Impossible to to know know what which the files employee were sensitive did with Impossible those files to know what the employee did with those files Without Without integration integration Analyst Analyst needs needs training in training 2 products in 2 products No No single single pane pane of of glass to glass get full to picture get full picture

The SIEM Solution RSA envision

RSA envision 3-in-1 SIEM Platform Simplifying Compliance Enhancing Security Optimizing IT & Network Operations Compliance reports for regulations and internal policy Real-time security alerting and analysis IT monitoring across the infrastructure Reporting Auditing Forensics Alert / correlation Network baseline Visibility Purpose-built database (IPDB) RSA envision Log Management platform security devices network devices applications / databases servers storage

Supported Event Sources (cont.) RSA envision supports and understands 215 event sources out-of-the-box, leading the SIEM industry. New event sources are added monthly. More than 30 RSA engineers work just on this task. RSA envision Universal Device Support allows adding any new or custom event source via Windows GUI tool RSA envision ESI (Event Source Integrator).

RSA envision Transformation of Data into Actionable Intelligence Dashboards >1450+ reports for regulatory compliance & security operations

Live Visual Alerts

Robust Alerting & Reporting 1450+ reports included out of the box Easily customizable Grouped according to standards, e.g. National Laws (SOX, Basel II, JSOX), Industry Regulations (PCI), Best Practices & Standards (ISO 27002, ITIL)

1450+ Reports for Typical Use Cases

Report Example List of Monitored Devices

Why DLP then?! RSA envision (SIEM) gives you information about what is/was happening in your IT infrastructure from the security, compliance and operations point of view. RSA DLP gives you visibility of who and how is working with your sensitive/compliance data. Only SIEM and DLP together can give you the whole picture.

The DLP Solution RSA Data Loss Prevention

RSA Data Loss Prevention Suite Unified Policy Mgmt & Enforcement Incident Workflow DLP Enterprise Manager Dashboard & Reporting User & System Administration DLP Datacenter DLP Network DLP Endpoint Discover File shares, SharePoint sites, Databases, SAN/NAS Remediate Delete, Move, Quarantine Monitor Email, webmail, IM/Chat, FTP, HTTP/S, TCP/IP Enforce Allow, Notify, Block, Encrypt Discover Local drives, PST files, Office files, 300+ file types Enforce Allow, Justify, Block on Copy, Save As, Print, USB, Burn, etc. edrm Encryption Access Controls Supports 300+ file types, databases, repositories, CMS Leverages vast number of protocols

RSA DLP Classification Methodology Content Analysis Described Content Analysis Fingerprinted Analysis

RSA DLP Classification Methodology Custom Classification Templates Keywords, phrases, RegEx, dictionaries Special patterns - Entities Proximity analysis Positive and negative rules Described Content Analysis

RSA DLP Classification Methodology Known Sensitive Data Templates Register known sensitive data Applicable for any binary/digital file Intellectual property protection Automated fingerprinting Fingerprinted Analysis

RSA DLP Classification Methodology Identity Analysis Understand who and where Insight into organization and hierarchy Real-time data from Active Directory

RSA DLP Classification Methodology

RSA envision Dashboard with DLP Views

RSA envision & RSA DLP Integration Benefits Reduced security risk Increased likelihood of early detection of security incident Prioritization of incidents based upon data sensitivity Reduced impact of security incidents Quicker cleanup and remediation of security problems Lower cost of responding to compliance audit requests Single place to create reports around where sensitive data resides, who is accessing it, where it s going, and when it s at risk Centralized auditable framework for security incident response Single-click reports regarding non-compliant systems and the information they contain Lower personnel costs Fewer training requirements for compliance and security analysts Single pane of glass for Level 1 response to security and compliance issues