The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Similar documents
ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

White. Paper. Rethinking Endpoint Security. February 2015

Compensating Security Controls for Windows Server 2003 Security

Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Integrated Network Security Architecture: Threat-focused Nextgeneration

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

The ESG Cybersecurity Maturity Model

This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.

Next-generation Security Architecture for the Enterprise

WHITE PAPER: THREAT INTELLIGENCE RANKING

Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Research Perspectives

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Combating a new generation of cybercriminal with in-depth security monitoring

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

The Network Application Security Architecture Requirement

IBM QRadar Security Intelligence April 2013

How To Integrate Identity And Security With A Network-Based Business Process

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Requirements When Considering a Next- Generation Firewall

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Cybersecurity Skills Shortage: A State of Emergency

IBM Security X-Force Threat Intelligence

An Analytics-based Approach to Cybersecurity

1 Introduction Product Description Strengths and Challenges Copyright... 5

THE EVOLUTION OF SIEM

ESG Threat Intelligence Research Project

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Using SIEM for Real- Time Threat Detection

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Overcoming Five Critical Cybersecurity Gaps

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

RSA Security Analytics

INTRODUCING isheriff CLOUD SECURITY

I D C A N A L Y S T C O N N E C T I O N

The Internet of Things: A CISO and Network Security Perspective

How To Create An Insight Analysis For Cyber Security

The Importance of Cyber Threat Intelligence to a Strong Security Posture

10 Things Every Web Application Firewall Should Provide Share this ebook

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Analyzing HTTP/HTTPS Traffic Logs

The SIEM Evaluator s Guide

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Getting real about cyber threats: where are you headed?

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

EMC Isilon: Data Lake 2.0

KASPERSKY PRIVATE SECURITY NETWORK: REAL-TIME THREAT INTELLIGENCE INSIDE THE CORPORATE INFRASTRUCTURE

Security Intelligence Services.

Symantec Cyber Security Services: DeepSight Intelligence

Windows Server 2003 End of Support. What does it mean? What are my options?

Transcription:

ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations are not only consuming commercial threat, but also using it to improve risk management. In fact, advanced organizations seem to include security as a best practice as they claim to get a lot of value from external security. While this is encouraging, the fact remains that not all security is created equally. New independent security services from providers like Norse are starting to emerge in the market. This type of can provide real-time, detailed focused on cybercriminal activities. Enterprise organizations can use this type of focused data to make timely risk management decisions, automate security operations, and improve incident detection/response. Overview Large organizations are collecting more disparate security data feeds, keeping this data online for longer periods of time, and using the data for more types of security analysis and investigations. In spite of all this, internal data collection and analysis is no longer enough. To execute on strong risk management and timely incident detection/response, CISOs need to supplement internal data with highly relevant external security. In fact, ESG research indicates that nearly two-thirds of surveyed enterprises use external threat as part of their information security analytics activities today (see Figure 1). 1 Figure 1. Use of External Threat Intelligence as Part of Information Security Analytics Activities Does your organization use external threat as part of its information security analytics activities? (Percent of respondents, N=257) Don't know, 3% No, 32% Yes, 65% 1 Source: ESG Research Report, Emerging Intersection Between Big Data and Security Analytics, November 2012.All other ESG research references and charts in this brief have been taken from this research report.

ESG Brief: The Growing Need for Real-time and Actionable Security Intelligence 2 As part of its analysis, ESG used a scoring algorithm to segment the total survey population into three types of organizations: advanced (i.e., those with superior security processes, controls, and resources), progressing (i.e., those with average security processes, controls, and resources), and basic (i.e., those with below average security processes, controls, and resources). Using this segmentation model, 18% of enterprise organizations were classified as advanced, 56% were classified progressing, and 26% were classified as basic. The ESG segmentation model is useful here because it indicates a varying use of external threat among the three segments: Ninety-five percent of advanced organizations use external threat as part of their information security analytics activities compared with 63% of progressing and 49% of basic organizations. Given this segmentation, it is safe to conclude that external security consumption and analysis can be seen as an enterprise security best practice. External Security Intelligence Value In theory, external threat should be extremely valuable if it is used proactively and effectively for improving risk management and incident detection/response. This thesis is consistent with ESG research findings. In total, 95% of surveyed organizations consuming external threat say that it is highly effective or somewhat effective (see Figure 2). Figure 2. Effectiveness of Commercial Threat Intelligence to Help Organizations Address Risk How effective is commercial threat in terms of helping your organization address risk? (Percent of respondents, N=143) Not very effective, 6% Highly effective, 29% Somewhat effective, 66% It should also be noted that there were strong differences of opinion between advanced, progressing, and basic organizations (see Table 1). Note that more than half (57%) of surveyed advanced organizations say that commercial threat is highly effective in helping their organizations address risk as compared with 43% of progressing and 0% of basic organizations. Based upon this data, it is safe to assume that advanced security organizations use security in a more meaningful way than other types of organizations, and this usage actually helps them improve risk management and cybersecurity responsiveness.

ESG Brief: The Growing Need for Real-time and Actionable Security Intelligence 3 Table 1. Effectiveness of Commercial Threat Intelligence Analyzed by the ESG Segmentation Model Advanced Progressing Basic Highly effective 57% 20% 15% Somewhat effective 43% 76% 65% Not very effective 0% 4% 19% Analyzing Security Intelligence Based upon ESG data, there is no question that enterprise organizations believe that external security can be extremely valuable in helping them manage IT risk more proactively. This makes sense since security is really meant to supplement internal security data with information about what s happening in the wild. While it is safe to conclude that all security can be helpful, this raises a logical question: Is there certain security available that provides more value than others? ESG believes that the answer to this question is yes, without a doubt. At a high level, security falls into three distinct categories, each with its own benefits: 1. Open source security. This category includes all publicly available security from security vendors, universities, researchers, security organizations, and government entities. While this is certainly valuable, various reports tend to be highly redundant with one another. Additionally, data tends to be a posteriori in nature. In other words, it is based upon knowledge acquired by experience such as known attack patterns, malware, and vulnerabilities. 2. Product-based. In this case, security is really an adjunct service that is tightly integrated with specific security technologies such as antivirus software, IDS/IPS, or web threat management. With productbased, security vendors use their install base as part of their research community. When a customer experiences a new type of attack, security vendors capture the event, develop a countermeasure, and distribute it throughout their customer base. Some vendors enhance product-based with their own research and some even productize their so they can offer it as an independent service. In general, product-based s link between and remediation is quite valuable, but it tends to be limited to a specific type of security technology or control. 3. Independent security services. This type of security is focused on the dark side of the Internet malnets, cybercriminals, malware patterns, etc. Independent security includes basic services like reputation lists (IP reputation, website reputation) and deep analytics based upon mathematical algorithms that can apply a risk score to things like hosts, IP addresses, files, malware, etc. Enterprise organizations can then use these risk scores to help automate security policies. For example, security professionals can set up automated rules for blocking an external host when it receives a risk score in excess of 90 (out of a possible risk score of 100). Given the scale and scope of independent security, smart CISOs can utilize it to address a multitude of risks with proactive adjustments to security controls. In reality, CISOs should really consume all three types of security, but it is realistic to expect different value from each one (see Table 2).

ESG Brief: The Growing Need for Real-time and Actionable Security Intelligence 4 Table 2. Security Intelligence Description and Value Open source security Product-based security Independent security services Description Value Comment Free security provided by an assortment of organizations Security service adjunct to onpremises security technology products Commercial threat services that are independent of any specific security products Historical overview of threats, vulnerabilities, malware, suspect hosts, IP addresses, and content Creates a hub-and-spoke network for detection and distribution of security Broad coverage of security focused on realtime discovery and distribution of new threat, vulnerability, malware, and suspicious threat actors Basic requirement for all enterprise organizations. May be lag time between discovery and publication Improves security controls but may create security silos Can be integrated with various security controls to help automate risk management remediation and security operations Introducing Norse Enterprise CISOs recognize that they need help addressing cybersecurity complexity and the increasingly dangerous threat landscape. In fact, new cybersecurity requirements are driving a wave of product and service innovation. Good news overall, but many security professionals are growing progressively more confused by this avalanche of options. For example, which type of commercial security can help improve risk management and deliver strong ROI? ESG recently met Norse, an innovative company focused on live threat, which may help illustrate how enterprise-class security services are evolving. What s interesting about Norse is that it has tailored its independent security services to the behavior and manifestations of the modern threat landscape, including cybercriminal rings, darknets, and network-based attack patterns. Norse can then analyze this data, separate out the noise, and provide true actionable to its customers. Norse accomplishes this by: Establishing a presence on the dark side. Norse employs millions of physical and virtual distributed agents across the Internet backbone to gather live (i.e., real-time) security on network traffic. In this way, Norse observes traffic beyond customer sites and it can concentrate its monitoring and research efforts on the bad neighborhoods of the Internet: darknets, TOR networks, IRC channels, P2P networks, and Internet proxies where cybercriminals tend to congregate. Baiting the bad guys. Aside from passive network observation, Norse uses a number of surveillance tools like advanced honeypots and attractive don t ask, don t tell open source software services to actively engage hackers and study their behavior. This is used in concert with observable network activity to further pinpoint bad actors and truly malicious activities. Doing the math. Norse analyzes traffic patterns through algorithms composed of over 1,500 various risk factors. The result of this analysis includes Norse s IPQ risk scoring system based on a scale of zero (no risk) to 100 (extreme risk). These calculations are executed based upon Norse s massive data collection and big data security analytics performed in the cloud. Addressing the cybersecurity skills shortage. According to ESG research, 39% of surveyed enterprise organizations are challenged by a lack of skilled professionals in their security operations/incident response team. 2 These firms can t simply hire security professionals to bridge this gap given the global information 2 Source: Ibid.

ESG Brief: The Growing Need for Real-time and Actionable Security Intelligence 5 security skills shortage. What s needed here is security and security operations automation to help over-worked security teams work smarter; not harder. Norse does just this because its focus on cybercrime and hackers can help organizations increase the efficiency of security staff by streamlining investigations and automating remediation. Providing actionable security. Norse security can be viewed in numerous reports and threat feeds, but it can be used most effectively for security operations automation by integrating Norse risk scores directly with security controls like network firewalls, SIEM systems, and network access control points. Norse security enables this integration through a RESTful API for data exchange. In this way, CISOs can automate security operations by taking enforcement actions when Norse IPQ scores exceed a certain threshold. Norse can also be a good investment for security around the emerging Internet of things (IoT) because its security platform is able to detect compromised, embedded, and connected devices and provide organizations with via API, identifying IP addresses of sensors and actuators that are malicious or high risk. Given its scale, scope, and real-time feeds, Norse can be used for a number of high-priority security use cases including automating perimeter protection, providing cloud-based for fraud protection, and adding a layer of defense against advanced and targeted malware threats. The Bigger Truth As Albert Einstein once said, The definition of insanity is doing the same thing over and over again and expecting different results. Regrettably, many CISOs are doing exactly that believing that status quo and security controls can protect them against today s advanced threats. Prevention is still important, but enterprise organizations must accept the fact that they will likely suffer security breaches in spite of all of their investments and efforts with security controls. This simply means that CISOs must bolster their capabilities around incident detection and response, and doing so must include better internal and external security as well as advanced security analytics. Armed with the right data at the right time, CISOs can then make better and timelier risk management, incident detection, and remediation decisions. Moving forward, enterprise organizations must build an information security architecture capable of reacting to changes in the threat landscape as they occur. This type of design must be based upon timely security and security operations automation, helping to take the lag time and guesswork out of security decisions. Of course, advanced cybersecurity capabilities like these must be based upon real-time, accurate, and pertinent security as a foundation for security policy enforcement. Norse is one of a handful of independent security providers that is designing and building its services with this design for emerging enterprise security requirements. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at 508.482.0188.