Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER



Similar documents
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

How To Manage Log Management

Boosting enterprise security with integrated log management

Compliance Management, made easy

Clavister InSight TM. Protecting Values

TRIPWIRE NERC SOLUTION SUITE

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

10 Reasons Your Existing SIEM Isn t Good Enough

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

Best Practices for Building a Security Operations Center

THE TOP 4 CONTROLS.

SecureVue Product Brochure

AlienVault for Regulatory Compliance

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

The SIEM Evaluator s Guide

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

IBM Tivoli Compliance Insight Manager

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

The Sumo Logic Solution: Security and Compliance

How To Buy Nitro Security

High End Information Security Services

BlackStratus for Managed Service Providers

Compliance Guide: ASD ISM OVERVIEW

Are You Ready for PCI 3.1?

Extreme Networks Security Analytics G2 Vulnerability Manager

PCI Compliance for Cloud Applications

WHITE PAPER. Meeting the True Intent of File Integrity Monitoring

Continuous Network Monitoring

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

The Comprehensive Guide to PCI Security Standards Compliance

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

CorreLog Alignment to PCI Security Standards Compliance

Win the race against time to stay ahead of cybercriminals

Exporting IBM i Data to Syslog

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

PCI DSS Top 10 Reports March 2011

Trend Micro. Advanced Security Built for the Cloud

Proving Control of the Infrastructure

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Extreme Networks Security Analytics G2 Risk Manager

Securing your IT infrastructure with SOC/NOC collaboration

Secret Server Splunk Integration Guide

Feature. Log Management: A Pragmatic Approach to PCI DSS

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

ALERT LOGIC FOR HIPAA COMPLIANCE

STEALTHWATCH MANAGEMENT CONSOLE

Event Log Monitoring and the PCI DSS

nfx One for Managed Service Providers

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

How To Manage Security On A Networked Computer System

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Enterprise Security Solutions

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

End-user Security Analytics Strengthens Protection with ArcSight

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Security Information and Event Management (SIEM)

Logging In: Auditing Cybersecurity in an Unsecure World

Maximizing Configuration Management IT Security Benefits with Puppet

Logging and Auditing in a Healthcare Environment

What is Security Intelligence?

Automate PCI Compliance Monitoring, Investigation & Reporting

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

Caretower s SIEM Managed Security Services

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Dynamic Data Center Compliance with Tripwire and Microsoft

Information Technology Policy

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Enforcive / Enterprise Security

Security. Security consulting and Integration: Definition and Deliverables. Introduction

1 Introduction Product Description Strengths and Challenges Copyright... 5

CLOUD GUARD UNIFIED ENTERPRISE

CyberArk Privileged Threat Analytics. Solution Brief

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Transcription:

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren t easily collected, and there was no easy way to make sense of which were important. When network administrators had log recording turned on, they were lost in a sea of data, and would have to sift through it all in an attempt at analyzing suspicious activities. Some organizations deployed early Security Information and Event Management (SIEM) systems to help filter out the noise. The problem, however, is that the industry and government auditors found a gap in what was collected. There was no way to capture the events that those early SIEM solutions weren t aware of. The auditors said that everything needed to be captured and stored. Compliance regulations such as Payment Card Industry Data Security Standard (PCI DSS), NERC, Sarbanes-Oxley (SOX), and the Federal Information Security Management Act (FISMA) changed at least part of that scenario. Organizations now need to be meticulous in collecting and storing log data. If they aren t they can be slapped with fines, and their executives held responsible. Another, and more positive, trend is emerging. Some organizations are starting to realize they can use logs to pinpoint holes in their cyber defenses and thereby boost security. The Defense Department in a recent study said that log management ranked among the highest value controls that could be used to block attacks on networks. In a 2009 survey of the log management industry, The SANS Institute reported more organizations saying that top uses for log data were tracking suspicious behavior and user monitoring and for forensics and day-to-day IT operations. In previous years, SANS said, companies had reported trouble just collecting log data. Mature organizations are now beginning to use logs for these more advanced purposes, it said. But there s a disconnect between desire and application. Not only are there now even more devices that produce logs, and therefore increasingly large volumes of data to manage, but different devices and operating systems use different formats to log data. Pure log management systems focus on just collecting and storing logs, and traditional SIEM systems that attempt to combine both the collection and analytical prowess needed to meet the emerging trends are too complex end up being cost prohibitive for most organizations. That s not surprising since the log management industry, which focuses on collecting and managing logs, and the security information and event management (SIEM) industry, which is the analytical side of the equation, have developed more-or-less separately. You usually either have to choose between strong log management or strong security event management capabilities, with separate devices needed for each product. The combinations that do exist are essentially tools from one side bolted onto those from the other, with questionable impact on the scalability and performance needed from modern, integrated solutions. Tripwire Log Center offers a new approach. Tripwire Log Center was built to include both log and event management in an all-in-one solution from the very first day. It meets IT compliance needs by capturing tens of thousands of events per second, then compressing, encrypting and storing the logs. Since it supports all the most popular log transmission protocols, it can immediately collect logs from just about any source. And since it has SIEM capabilities built right in, itprovides real-time alerts about suspicious activity. The all-in-one log and event management capabilities of Tripwire Log Center make it a sophisticated security event analysis platform. With it, you can query and search all the data in the event database and then drill down to investigate any suspicious activities. It provides graphical tools for correlating events, and pinpointing parts of the infrastructure that could be affected by any incident. A centralized dashboard gives a quick view of all alerts, events and vulnerabilities. And, though Tripwire Log Center is a standalone product, it also works hand-in-hand with Tripwire Enterprise to provide a single, integrated IT security and compliance automation solution that correlates change data and compliance status with events-of-interest produced by the log monitoring. That gives end-to-end visibility across the enterprise for both events and changes. Tripwire Log Center: Next Generation Log and Event Management WHITE PAPER 3

Tripwire Log Center Capabilities DYNAMIC ACTIVITY ANALYSIS Knowing what changes have been made to your IT infrastructure is vital, particularly when they are unauthorized. Identifying any suspicious events is also paramount. Even better, however, is being able to correlate those changes and events so you can get a complete view of all questionable activity. That helps as much with eliminating the mundane as it does identifying real security threats. After all, how many times have you mistyped a password? You need to be able to distinguish that from repeated logon failures that might signal an attack. Tripwire Log Center provides real-time intelligence of events that led to an unexpected change, as well as what resulted after the change was made. Feature rich dashboards give a complete view of what is happening across the infrastructure. It provides for automated notifications and alerts to quickly get to the most appropriate person who needs to know about the potential breach. Tripwire Log Center also allows for automated remediation so you can stop threats before they wreak havoc across your infrastructure. Integrated log management and file monitoring means you also have a comprehensive, archived audit trail for when you need information for reporting and compliance needs. REAL-TIME THREAT MONITORING Security threats these days happen fast and often, so it s essential to have some way to track down in real-time the kinds of suspicious flurries of activity or coordinated events that can signal that an attack is underway. With Tripwire Log Center, security analysts have a dashboard they can customize for their needs to show them just where the suspicious activity is happening. Heat maps show the relative levels of activity at certain locations, for example, while color-coded links between nodes show what the highest priority events were over each of the links. Analysts can then also use the dashboard to drill down into any areas of activity to see in more detail what s happening and what the potential causes are. The event management capabilities of Tripwire Log Center allow managers to compare activity against a set of pre-defined policies and thresholds. If any of those are breached, notifications and alerts automatically go out to the people who need to know so that issues can be fixed before they become actual problems. And events are captured and stored to enable a slowmotion replay of activity maps. Just as with slo-mo in televised sports that show the exact moment when a football player s knee hits the ground, in this case it can reveal in exacting detail how suspicious events developed, and if anything was missed on the first go-around of an analysis. AUTOMATED EVENT RESPONSE Monitoring and detection are the first line of defense, but they are less effective if they generate a less than immediate response. With the speed at which security threats develop today, automated reaction and response is a must. Tripwire Log Center allows for real-time alerts based on any series of events from many different sources. When those events affect a policy or hit a preset threshold, notification is sent to relevant personnel via email or Syslog, using scripts, or even directly to the Tripwire Log Center console. The event manager includes a security event ticketing system to help pinpoint high-priority events so they can be fixed soonest. Tripwire Log Center also enables auto remediation of a problem. That s admittedly not a major factor yet for network and security managers, most of whom prefer to act on notifications and alerts. But with the number and frequency of security threats accelerating, and with a consequent increase in the speed with which issues need to be addressed, it s only a matter of time before auto remediation becomes a required feature. COMPREHENSIVE LOG MANAGEMENT Even though compliance is less of a driving issue for people to collect logs as security concerns continue to grow, SANS reported that just under 60 percent of the respondents to its 2009 survey still reported it as their main reason for doing so. 4 WHITE PAPER Tripwire Log Center: Next Generation Log and Event Management

Tripwire Log Center Capabilities (cont d) Tripwire Log Center collects every event that happens on IT infrastructure devices, compressing and encrypting the data before storing them as a flat file. That also means you can use standard storage mediums such as storage area network and network attached storage. It applies normalization rules to the raw log data after they ve been captured rather than before, which eliminates the need to know the log schema before capturing a new device log. This means Log Center can capture raw logs from any device. Plus you can dynamically edit the schema later to support the log format when generating reports and queries. Google-like indexing is used on the data, enabling fast, complex searches using plain keywords to look for forensic evidence as needed. INTEGRATED CONFIGURATION CONTROL This is where the combination of Tripwire Log Center and Tripwire Enterprise comes into its own. Given that file integrity monitoring the focus of Tripwire Enterprise is as much of a mandatory requirement for most regulatory compliance as log management is, it s a beneficial marriage of best practices. With both solutions in play, organizations have an endto-end understanding of both log information and change data, and how they play together. No change can be made in the IT infrastructure that isn t accounted for in the device logs, and any unauthorized change is detected immediately in the log information. All data is collected both before and after the change is made, so changes that aren t authorized under existing compliance policies can be automatically examined. Inconsequential changes, those that don t affect compliance, can be ignored or labeled as low priority concerns. That those do affect compliance can be flagged for immediate response. Conclusion Compliance regulations have made log management a mandatory IT practice for organizations, but there s an increasing awareness of what those logs can also do for security through tracking suspicious activity and user behavior. However, there s a dearth of ready solutions that can provide for both sides of this scenario. You can have strong log management and strong SIEM, but making the two work together to provide the intelligence needed to make good decisions on security is complex work. The result is usually something that s much less than optimum, which doesn t scale well and which doesn t have the speed and performance to meet the needs of modern IT security. Tripwire Log Center by itself integrates both log management and sophisticated event analysis. The result is next generation log and event management, without the complexity and bloat associated with traditional log and SIEM systems. Plus, when Tripwire Log Center is used in concert with Tripwire Enterprise, Tripwire s file integrity monitoring and change configuration solution, organizations achieve total visibility and intelligent threat control across all events and changes with no compromise to performance and scalability. Tripwire Log Center: Next Generation Log and Event Management WHITE PAPER 5

ABOUT TRIPWIRE Tripwire is the leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Over 7,000 customers in more than 86 countries rely on Tripwire s integrated solutions. Tripwire VIA, the comprehensive suite of industry-leading file integrity, policy compliance and log and event management solutions, is the way organizations proactively prove continuous compliance, mitigate risk, and achieve operational control through Visibility, Intelligence and Automation. Learn more at tripwire.com. 2010 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. WPTLC1a