Symantec Security Information Manager Version 4.7



Similar documents
CiscoWorks SIMS(Netforensics)

ArcSight Supports a Wide Range of Security Relevant Products

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

Secure Your Operations through NOC/SOC Integration

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

Modular Network Security. Tyler Carter, McAfee Network Security

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

SANS Top 20 Critical Controls for Effective Cyber Defense

Find the needle in the security haystack

Detecting a Hacking Attempt

List of Supported Systems & Devices

TECHNOLOGY INTEGRATION GUIDE

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

HawkEye AP Log Adapter List Updated January 2014

Virtualization Journey Stages

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

IBM Internet Security Systems

QRadar SIEM 6.3 Datasheet

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

TECHNOLOGY INTEGRATION GUIDE

Supported Devices (Event Log Sources)

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

HawkEye AP Log Adapter List Updated January 2016

Managed Security Services Portfolio

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

What is Security Intelligence?

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

JUNIPER NETWORKS STRM TECHNICAL NOTE

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Industrial Security for Process Automation

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

A progressive and integrated approach to protecting corporate networks

Payment Card Industry Data Security Standard

Q1 Labs Corporate Overview

How To Buy Nitro Security

Cisco Remote Management Services for Security

PCI DSS. Get Compliant, Stay Compliant Seminar

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Current IBAT Endorsed Services

Enabling Security Operations with RSA envision. August, 2009

VMware Integrated Partner Solutions for Networking and Security

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

SENTINEL MANAGEMENT & MONITORING

How To Manage Sourcefire From A Command Console

Sygate Secure Enterprise and Alcatel

Unified Threat Management, Managed Security, and the Cloud Services Model

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

World-class security solutions for your business. Business Products. C a t a l o g u e

Managed Security Services

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Introduction to Network Discovery and Identity

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

RSA Security Analytics

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

IBM Internet Security Systems products and services

Response to Questions CML Managed Information Security

Information Technology Policy

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

Secospace elog. Secospace elog

Security Information & Event Management (SIEM)

IBM Global Technology Services Preemptive security products and services

Protecting productivity with Plant Security Services

Symantec Endpoint Protection Analyzer Report

Chapter 9 Firewalls and Intrusion Prevention Systems

CALNET 3 Category 7 Network Based Management Security. Table of Contents

BitDefender Client Security Workstation Security and Management

Vulnerability Management

Secure Cloud-Ready Data Centers Juniper Networks

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Select the right security information and event management solution to automate security and compliance operations.

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Government of Canada Managed Security Service (GCMSS) Annex A-7: Statement of Work - Security Information and Event Management (SIEM)

Symantec Security Information Manager 4.6 Administrator's Guide

The SIEM Evaluator s Guide

Enforcive /Cross-Platform Audit

McAfee Server Security

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

OfficeScan Corporate Edition 6.5

Transcription:

Version 4.7

Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2

Security Management Challenges 3

Managing IT Security PREVENT INFORM COMPLY Monitor user access violations Prioritize attacks as they occur Reduce impact through quicker remediation Assist forensic investigations Establish metrics and trends Correlate to global threat activity Collect, query and analyze log data Meet long term log retention requirements Provide on demand audit information 4

What is Security Information Manager? Broad and customizable High volume processing Meaningful normalization Assured reliability Collection Storage Flexible capacity Archive segmentations Quick queries/searches Retention Policy Automation Security Information Manager Pattern based rules Global Intelligence Network integration Asset groupings Over 400 out of box queries Correlation Reporting Customizable consoles Web based portals Raw event data viewer Over 150 out of the box compliance reports 5

Why Symantec Security Information Manager? 6

All Inclusive Solution Collectors Syslog Windows Events Intrusion Prevention Infrastructure Components Correlation Manager Manager LiveUpdate Service Reports and Dashboards Optional Intelligence Feed (GIN) Firewall Other sources Console Pre-built Queries Log Archiving 150+ Universal Collector Pre-defined Reports Only 1 optional component No excessive add-on costs Single deployment supports evolving needs 7

Key Advantages Lower acquisition and maintenance costs Rapid Deployment = Faster time to value Lower maintenance overhead Dynamic correlation with updated external intelligence content (GIN) Expands external attack information for bots, worms and IP addresses Improves posture for proactive protection Flat file data structure Faster querying More economical archiving and storage Automated updates to remediation and workflow guidance Attack descriptions Optimal safeguard details and mitigation steps Single solution for log and event management Does not require two separate infrastructures Same infrastructure can expand with requirements 8

What to ask yourself What is the required deployment timeframe for your SIM? What staff resources and expertise will be available to maintain database tuning and correlation rule development? What are your requirements for true real time processing of events? Can your SIM detect malicious IPs coming in or targeting your network? Can your SIM detect malicious traffic coming from your network to a malicious IP source? Can your SIM determine when malicious IP traffic is actually coming from an internal address in your own network? Can your SIM make recommendations for best safeguards and mitigation steps and provide current attack descriptions? 9

Typical SIM s focus ONLY on INTERNAL activities OS Firewall breaches Infected systems Virus outbreaks Privileged user activities Other internal events Antivirus Mail and Groupware Corporate Network Syslogs Databases Firewalls IDS/IPS Other sources Vulnerability Scanners 10

EXTERNAL activities are becoming increasingly important. OS Additional Intelligence on: Malicious IPs Botnet IPs Firewall breaches Infected systems Virus outbreaks Privileged user activities Antivirus Mail and Groupware Corporate Network Database Firewalls Worm IPs Other internal events Syslogs Comprehensive Visibility Other sources Vulnerability Scanners IDS/IPS 11

Malicious Traffic Why Is This Important? Coming to or targeting your network Incoming Botnet commands and controls from a malicious host Port scans against the network Coming from your network to a malicious source Bot communicating information back to a malicious host Proprietary data leaks Originating malicious IP is an internal address Network used as a proxy by hackers to conduct their business Network bandwidth compromised 12

How Does It Work? 13

True Integration Integrated Global Intelligence console information: Latest global threat trends and statistics Current vulnerability and attack pattern details Up to date threat resolution details and recommended safeguards Dedicated Global Intelligence rules: IP Watchlist Source IP Watchlist Destination Organization IP in Watchlist Global Intelligence integration into multi-conditional rules Combines internal activities with external intelligence to conclude incidents 14

Intelligence Console 15

IP Watchlist Source Rule 16

Indicating Source IP Activity Red indicates Malicious IP 17

IP Watchlist Destination Rule 18

Indicating Target IP Activity Red indicates Malicious IP 19

Organization IP in Watchlist Activity 20

Indicating IP Watchlist Activity from Inside the Network Red indicates Malicious IP 21

Making a Good Thing Better Advanced Capabilities Symantec Security Information Manager Every Other SIM Do you know if there s malicious traffic being sourced from your network? Yes? Can you identify known Worm IPs communicating with your network? Yes? Can you identify resources in your network communicating information back to a known malicious host? Yes? Can you detect when your network is being used as a proxy by hackers to conduct their business? Yes? Can you preemptively correlate external malicious activities to internal incidents? Yes? Can you integrate global intelligence into rules for combining internal events with external data? Yes? 22

Summary Unified log Management and Correlation Advanced Intelligence Comprehensive Analysis Broad and Customizable Data Collection Flexible Storage Options and Automated Archiving Easy and Scalable Implementation 23

Appendix

Event Collectors - Over 220 Supported Products Intrusion Detection/Prevention Symantec Network Security (SNS) Symantec HIDS Symantec ITA Snort Symantec Sygate Symantec Critical System Protection Cisco IDS Cisco Security Agents TippingPoint NIPS Enterasys Network Dragon eeye Retina JuniperIDP ISS Siteprotector McAfee Intrushield SourceFire Web servers, Filters and Proxies Apache Web Server IBM Websphere Bluecoat Proxy Microsoft ISA Microsoft IIS Sun One WebServer Vulnerability/Policy/Config Scanners Symantec ESM Symantec CCS Nessus ncircle Qualys QualysGuard StillSecure VAM Tripwire Ecora Databases Oracle Security Logs (9i & 10g) MS SQL Server Logs Firewalls Symantec Gateway Security Cisco PIX Cisco FWSM Nokia FW Juniper NetScreen Firewall Checkpoint Firewall-1 Nortel Contivity Fortinet Fortigate SunScreen Microsoft Windows Firewall Microsoft ISA SideWinder G2 StoneSoft Stonegate Operating systems Microsoft Windows Event Log Solaris OS Collector Sun BSM SUSE Linux Debian Linux RedHat Linux IBM AIX HP/UX Tandem RACF SMF SELinux IPTables Novell Netware IBM System i (AS/400) Snare for Windows Identity Management Microsoft Windows DHCP Microsoft Operations Manager Microsoft Active Directory RSA SecurID Cisco ACS Routers, Switches and VPN Cisco IOS Juniper VPN CyberGuard Cisco VPN 3000 Concentrator Air Defense Enterprise AV Solutions Symantec AntiVirus 8, 9, 10 Symantec Endpoint Security 11 Symantec Mail Security for Exchange Symantec Mail Security for Lotus Domino Symantec Mail Security for SMTP Symantec Mail Security Cisco IronPort McAfee EPO McAfee GroupShield McAfee VirusScan Kaspersky AV F-Secure AV Sophos AV CA AntiVirus Trend Micro Control Manager (TMCM) Trend Server Protect Information Server Trend Interscan Messaging Security Suite Trend Scanmail Trend Interscan Viruswall Trend Interscan Web Security Suite Other Cisco Netflow Fox Server Control Blue Lance LT Auditor PassGo UPM Kiwi Syslog Generic Syslog Symantec Cyberwolf Mazu Profiler 25

Data Collection Key Benefits Access valuable data from both existing and new security investments Minimize overhead in data collection process Create meaningful associations to enrich data value Maintain ongoing process reliability 26

Data Storage Key Benefits Maintain efficient and adaptable capacity for changing volume requirements Optimize data organization for quick and easy access Reduce overhead associated with managing varying retention period requirements Assure integrity of stored data 27

Data Correlation Key Benefits Maintain consistent data analysis standards without compromising staff resources and productivity Leverage intelligence from distributed sources and investments Utilize data for proactive prevention instead of just reactive response Draw immediate conclusions based on business impact Conduct real time inquiries and research 28

Data Presentation Key Benefits Provide self service to key stakeholders reducing IT staff disruptions Easily fulfill forensic reporting requirements Automate report distributions Validate security investments 29

NEW! Built in Compliance Reports 30