Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!



Similar documents
Best Practices for a BYOD World

Cybercrime Security Risks and Challenges Facing Business

Protecting the Infrastructure: Symantec Web Gateway

ORGANIZADOR: APOIANTE PRINCIPAL:

Cyber and Mobile Landscape, Challenges, & Best Practices

MANAGED SECURITY SERVICES (MSS)

MANAGED SECURITY SERVICES (MSS)

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Find the needle in the security haystack

Symantec Managed Security Services The Power To Protect

Symantec Cyber Security Services: DeepSight Intelligence

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT

Symantec Security Information Manager 4.8 Release Notes

Securing OS Legacy Systems Alexander Rau

Better Together: Microsoft Office 365 & Symantec Office 365

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Cyber Security Services: Data Loss Prevention Monitoring Overview

Best Practices in Virtualization & Cloud Security with Symantec DCS

Payment Card Industry Data Security Standard

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager

Security strategies to stay off the Børsen front page

Managed Security Service Providers vs. SIEM Product Solutions

Risk and threats everywhere, all the time

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Center Enterprise 3.0. Release Notes

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Unified Security, ATP and more

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

The Case for Managed Security Services for Log Monitoring and Management

How To Get A Cloud Service For A Small Business

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security X-Force Threat Intelligence

How To Monitor Your Entire It Environment

Symantec Critical System Protection Agent Event Viewer Guide

UP L13: Leveraging the full protection of SEP 12.1.x

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Control Compliance Suite. Overview

1 Introduction Product Description Strengths and Challenges Copyright... 5

Integrating MSS, SEP and NGFW to catch targeted APTs

How to Choose the Right Security Information and Event Management (SIEM) Solution

Continuous Network Monitoring

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

#ITtrends #ITTRENDS SYMANTEC VISION

IBM QRadar Security Intelligence April 2013

Symantec ServiceDesk 7.1

SIEM AND THE ART OF LOG MANAGEMENT Trustwave Holdings, Inc.

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

INFORMATION PROTECTED

Safeguarding the cloud with IBM Dynamic Cloud Security

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Caretower s SIEM Managed Security Services

Real-Time Security for Active Directory

Leveraging a Maturity Model to Achieve Proactive Compliance

Intelligence Driven Security

IBM Security Intelligence Strategy

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Managing SSL Certificates with Ease

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Solving the Security Puzzle

THE TOP 4 CONTROLS.

Symantec Residency and Managed Services

Overview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)

Ecom Infotech. Page 1 of 6

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

McAfee Next Generation Firewall

Countering Insider Threats Jeremy Ho

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Become a hunter: fi nding the true value of SIEM.

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

8 Key Requirements of an IT Governance, Risk and Compliance Solution

Selecting a Managed Security Services Provider: The 10 most important criteria to consider

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

CORE Security and GLBA

IBM Security Strategy

Host-based Protection for ATM's

How To Buy Nitro Security

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1

Trend Micro Cloud Security for Citrix CloudPlatform

Transcription:

Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both! Matteo Masserini Steven Kulley Tarun Sondhi Emerging Region Sales Specialist Regional Product Manager - EMEA Group Product Manager Choosing Between Managed Security Services or In-house SIEM 1

Is IT Security Keeping Pace? Source: Symantec 2011 Threat Management Survey 2

Key Customer Challenges How do I demonstrate due care around security incident handling? How do I meet compliance needs? How can I manage both broad and targeted threats? How do I stay on top of emerging threats? How do I meet both needs affordably with the same staff? Am I running in place or innovating? Choosing Between Managed Security Services or In-house SIEM SYMANTEC VISION 2012 3

Common Decision Drivers Multiple Compliance Regulations Establish IT Controls Monitoring and Incident Response Reporting and Metrics Security Challenges Threats from hackers: Casual to Targeted Shinking Vulnerability disclosure to exploit window Malicious and Criminal Motivation Cost Challenges CapEx vs. OpEx Buy vs. Build Planning for Growth 4

Operations Structure Security Strategy Planning and Design Execution/Implementations Operations Change Management Incident Management Monitoring Ticketing systems Escalation processes Moves/Adds/Changes etc Service Improvement/Optimization People Tools Process 5

Cost Center Are you a Cost Center or Profit Center? Worst Case Best Case 20% Innovating 80% Sustaining and Running Increase Value Creation Decrease Low Value Operations 80% Innovating 20% Sustaining and Running Profit Generator 6 Choosing Between Managed Security Services or In-house SIEM SYMANTEC VISION 2012

What makes up the 80 % Incident Monitoring Out-Tasking 80% Performance Management Availability Monitoring Problem Management Capacity Management Change Management Patch Management Configuration Management Availability Management MAC s Symantec Customer Confidential SYMANTEC VISION 2012 7

Traditionally Two Silos Characteristics MSSPs SIEMs Location Cloud Delivered On Premise Primary Use Case Compliance & Security Compliance & Security Technologies Comprehensive Comprehensive Customizability Limited Extensive Time to Value Faster Slower Global Visibility Broad Limited Cost Opex + Capex + 8

Investment in Outcome MSSP s Drivers: Staffing challenges - 24x7 coverage - Recruiting and retention - Headcount restrictions Skills gaps - Threat expertise Higher priority projects Urgency to deliver outcomes Advantages Out-tasked 24/7/365 solution Offers offsite log retention Minimum Build - faster time to value Cautions Effort to transfer domain knowledge Customization options are limited Choosing Between Managed Security Services or In-house SIEM SYMANTEC VISION 2012 9

Invest In Effort - SIEM Drivers: Specific regulations prevent exporting log data to third parties Already have investments in internal staff/expertise High customization needs Advantages Flexible and customizable Enables effective management of security incidents Local log storage Cautions Time to value is steep Substantial infrastructure requirements Significant effort to sustain long term Choosing Between Managed Security Services or In-house SIEM SYMANTEC VISION 2012 10

Security Security Management Maturity Model E D A B C Functional Maturity A B C D E Labor Centric Tools Based Integrated Picture Dynamic Defense Agile Management Use of individual tool consoles to manage and monitor the environment Investment in smart tooling, integration intensive with reporting benefits Centralized tool platform, automated processes Change in emphasis from reactive to proactive, understanding security risk posture Becoming threat aware, efficient and effective granular controls to focus on specific threats 11

Security Security Management Maturity Model Current State Current State Target State E X X D A B C Functional Maturity A B C D E Labor Centric Tools Based Integrated Picture Dynamic Defense Agile Management Use of individual tool consoles to manage and monitor the environment Investment in smart tooling, integration intensive with reporting benefits Centralized tool platform, automated processes Change in emphasis from reactive to proactive, understanding security risk posture Becoming threat aware, efficient and effective granular controls to focus on specific threats 12

Security Security Management Maturity Model Step 1 SIEM Target State E A B C X D X MSSP Functional Maturity A B C D E Labor Centric Tools Based Integrated Picture Dynamic Defense Agile Management Use of individual tool consoles to manage and monitor the environment Investment in smart tooling, integration intensive with reporting benefits Centralized tool platform, automated processes Change in emphasis from reactive to proactive, understanding security risk posture Becoming threat aware, efficient and effective granular controls to focus on specific threats 13

Security Security Management Maturity Model Step 2 SIEM Target State E A B C X D X MSSP Functional Maturity A B C D E Labor Centric Tools Based Integrated Picture Dynamic Defense Agile Management Use of individual tool consoles to manage and monitor the environment Investment in smart tooling, integration intensive with reporting benefits Centralized tool platform, automated processes Change in emphasis from reactive to proactive, understanding security risk posture Becoming threat aware, efficient and effective granular controls to focus on specific threats 14

Security Security Management Maturity Model Step 3 SIEM Target State E X X A B C D MSSP Functional Maturity A B C D E Labor Centric Tools Based Integrated Picture Dynamic Defense Agile Management Use of individual tool consoles to manage and monitor the environment Investment in smart tooling, integration intensive with reporting benefits Centralized tool platform, automated processes Change in emphasis from reactive to proactive, understanding security risk posture Becoming threat aware, efficient and effective granular controls to focus on specific threats 15

MSSP and SIEM A combined Approach Policy Violation & Compliance 8x5 Attack Monitoring 24x7 Choosing Between Managed Security Services or In-house SIEM SYMANTEC VISION 2012 16

Thank you! Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Choosing Between Managed Security Services or In-house SIEM 17

Symantec Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland San Francisco, CA Mountain View, CA Culver City, CA Austin, TX Pune, India Chengdu, China Chennai, India Taipei, Taiwan Tokyo, Japan Worldwide Coverage Global Scope and Scale Rapid Detection 24x7 Event Logging MSS Monitoring 4 SOC s 1,100+ MSS Customers, 15 billion logs a day Preemptive Security Alerts Malware Intelligence 180M Norton client Botnet Command & Control Servers Information Protection Email/Web.Cloud 5M decoy accounts 8B+ email messages/day 1B+ web requests/day Threat Triggered Actions Vulnerabilities SecurityFocus / BugTraq 45,000+ vulnerabilities 105,000 technologies 18