LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE



Similar documents
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Tivoli Security Information and Event Manager V1.0

Clavister InSight TM. Protecting Values

The SIEM Evaluator s Guide

TRIPWIRE NERC SOLUTION SUITE

Detect & Investigate Threats. OVERVIEW

QRadar SIEM and Zscaler Nanolog Streaming Service

BlackStratus for Managed Service Providers

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

QRadar SIEM and FireEye MPS Integration

Securing your IT infrastructure with SOC/NOC collaboration

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

IBM SECURITY QRADAR INCIDENT FORENSICS

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

10 Reasons Your Existing SIEM Isn t Good Enough

Information Technology Policy

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

QRadar SIEM 6.3 Datasheet

Extreme Networks Security Analytics G2 Risk Manager

Discover & Investigate Advanced Threats. OVERVIEW

TRIPWIRE REMOTE OPERATIONS: STOP OPERATING, START ANALYZING

Boosting enterprise security with integrated log management

QRadar Security Intelligence Platform Appliances

White Paper Integrating The CorreLog Security Correlation Server with BMC Software

Extreme Networks Security Analytics G2 Vulnerability Manager

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

Continuous Network Monitoring

Scalability in Log Management

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

nfx One for Managed Service Providers

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

RSA Security Analytics Security Analytics System Overview

IBM QRadar Security Intelligence April 2013

Vulnerability Management

What is Security Intelligence?

IBM Security IBM Corporation IBM Corporation

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

PCI DSS Reporting WHITEPAPER

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

QRadar Security Management Appliances

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

North American Electric Reliability Corporation (NERC) Cyber Security Standard

IBM Tivoli Compliance Insight Manager

Best Practices for Building a Security Operations Center

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

IBM QRadar as a Service

Payment Card Industry Data Security Standard

IBM QRadar Security Intelligence Platform appliances

IBM Security QRadar Risk Manager

Trend Micro. Advanced Security Built for the Cloud

Aspen InfoPlus.21. Family

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Information & Asset Protection with SIEM and DLP

CALNET 3 Category 7 Network Based Management Security. Table of Contents

How To Buy Nitro Security

Q1 Labs Corporate Overview

Safeguarding the cloud with IBM Dynamic Cloud Security

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Cyber Security Services: Data Loss Prevention Monitoring Overview

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

What s New in Centrify DirectAudit 2.0

Best Practices in File Integrity Monitoring. Ed Jowett, CISSP ITIL Practitioner Sr. Systems Engineer, Tripwire Inc.

Desktop Activity Intelligence

The IDG 9074 Remote Access Controller

Symantec Security Information Manager Administrator Guide

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

CA Service Desk Manager

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Find the needle in the security haystack

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

IBM Security QRadar Risk Manager

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Attack Intelligence: Why It Matters

ObserveIT User Activity Monitoring

Enabling Security Operations with RSA envision. August, 2009

V1.4. Spambrella Continuity SaaS. August 2

Vendor Landscape: Security Information & Event Management (SIEM)

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

How To Protect Your Network From Attack From A Network Security Threat

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

End-user Security Analytics Strengthens Protection with ArcSight

AssurX Makes Quality & Compliance a Given Not Just a Goal

Transcription:

PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach activity by combining suspicious activity from Tripwire Log Center with change information and business context from Tripwire Enterprise. As part of the Tripwire VIA platform, Tripwire Log Center offers tight integration with Tripwire Enterprise to deliver this unique capability, allowing you to prioritize risk and protect your organization s high value, mission-critical assets. Organizations of all sizes need to secure their valuable IT infrastructure and data and achieve compliance with regulations and standards. As security breaches continue to increase, this need has never been more critical. Log collection, retention and reporting are mandatory requirements of most regulatory policies and an accepted best practice for security. For years, though, log management solutions have generated a lot of noise without helping detect threats. To reduce noise and better identify threats, organizations began deploying SIEM solutions. SIEMs were said to offer a centralized view of threats, alerts of suspicious activities, and reports for security investigations or proof of compliance. So while they were purchased on the promise that they could help organizations detect breaches, security actually rarely improved the solutions were simply too complex. Organizations are now seeking solutions that both help them meet compliance requirements and improve security. Log and security event data together can significantly improve security by identifying critical threats before the damage is done but only if the data is analyzed in the context of risk to the business. Tripwire Log Center provides these capabilities with an easy-to-use, flexible and affordable log and event management solution. When integrated through the Tripwire VIA TM platform, it provides unique system state intelligence by combining context of suspicious events to change data from Tripwire Enterprise. You can install it within minutes and begin capturing log data and identifying events that threaten security. WHAT DISTINGUISHES TRIPWIRE LOG CENTER FROM OTHER SIEMS? Tripwire Log Center differs from traditional SIEMs in a variety ways. Most notably is its ability as a Tripwire VIA solution to help you bring together both changes and events of interest that impact your security posture and affect regulatory compliance.»» System State Intelligence for Incident Detection As a Tripwire VIA solution, Tripwire Log Center joins forces with Tripwire Enterprise to help you identify and address suspicious activity on your high-value assets. Tripwire Enterprise analyzes system configurations for vulnerabilities, hardens weak configurations, detects all system changes, shows which changes threaten security, and provides additional details about those changes. By adding Tripwire Log Center s log and security event management, you see the relationships between suspicious events and system changes, which lets you better identify risk and prioritize your security efforts. This is the strength of system state intelligence.

»» Simplified Security Intelligence Tripwire Log Center makes it easy for you to gain critical security intelligence. Its standards-based classification of log and event activity supports simple searches across platforms and devices that yield more comprehensive and accurate results. Use these valuable results for security forensic evidence or in compliance reports. Plus, easy-touse, but advanced event correlation, dashboards and trending analysis give a quick, high-level view of your state of security. It also allows easy access to older forensic data because active data is not separated from archived data. As a result, managing activity logs is easier and costs less compared to using the two-tiered data scheme of other log management solutions. +..: FIG. 1 Tripwire Log Center lets you define complex combinations of events by easily creating correlation rules with a graphical drag and drop rule creator.»» User and Business Context The majority of organizations monitor user access through Microsoft Active Directory. The new integration of Tripwire Log Center with Active Directory lets you use user entitlements, groups, roles and other user attributes from Active Directory in Tripwire Log Center. You can use these attributes to monitor specific users and user groups. Tags from the Asset View in Tripwire Enterprise can be used to identify..: FIG. 2 Security dashboards and trending analysis views help you manage your security risks and dynamically drill down on areas requiring greater scrutiny.

your highest value assets. You can then combine the two capabilities to refine your monitoring based on user and business context for example, monitor activity of contractors with access to your highest value assets. Correlating suspicious events with threatening changes detected by Tripwire Enterprise, enhances system state intelligence by further prioritizing risk.»» An All-in-One Solution Most SIEMs make you choose between either strong log management or strong event management because these capabilities are offered as separate products. Tripwire Log Center was built from the ground up as an easy-to-use integrated log and event management solution.»» A Fit with Existing Workflow Many enterprise organizations use additional systems to get real-time alerts on suspicious events. For example, they may have a SIEM in their Security Operations Center (SOC) or rely on a hosted SIEM. These systems often keep only a subset of the log data they collect and only for as long as needed. For this reason, organizations often require their compliance and operations departments to have a log management solution that serves as the trusted and primary collector of all logs. Tripwire Log Center can pass raw log data and events to additional systems for further analysis and investigations. This allows compliance and operations departments to autonomously collect and analyze log data and also send logs to an enterprisewide SIEM or GRC tool. With its Active Directory integration, Tripwire Log Center seamlessly gathers user entitlement, groups, roles and other attributes that already exist in your Active Directory environment to help you more accurately detect suspicious activities.»» Flexibility for Convenience and Cost-savings Tripwire Log Center offers its efficient log management capabilities as a software-based solution. That lets you deploy it on your own lowcost hardware, consistent with your organization s standards. Because Tripwire Log Center software is modular, you locate functionality where you need it. This approach ensures you only pay for the capacity you need rather than purchasing special-purpose appliances in capacity increments that may exceed (or fail to meet) your needs. Top 10 Multiple Logon Events by Asset Name..: FIG.3 Obtain leading indicators of breach activity by adding business and user context to your incident detection efforts

HOW CAN YOU USE TRIPWIRE LOG CENTER? Because of Tripwire Log Center s from the ground up integration of log and event management capabilities as well as it s flexibility in integrating with other solutions, Tripwire Log Center can be used in a variety of ways. DETECT INCIDENTS AND THREATS SOONER Tripwire Log Center supports incident and threat detection in several key ways. It lets you use drag and drop functionality to easily set up advanced correlation rules that detect and alert on suspicious activity around your high-value assets. By using Tripwire Log Center with Tripwire Enterprise, you can even create rules that detect and alert on suspicious events related to changes that affect the security and compliance state of your systems and provides an additional layer of business context. investigations and lets you share that data with other SIEMs and GRC tools. That meets log compliance requirements and helps those systems better detect incidents by eliminating false positives. With standards-based event classification, you more easily build complex, accurate reports based on cross-platform and -device queries. Efficient and tamper-proof log data storage further ensures the integrity of the data for forensic investigations. ADD RISK CONTEXT TO EVENTS BY INTEGRATING WITH TRIPWIRE ENTERPRISE Tripwire Log Center helps reduce noise in the volumes of log activity and events that organizations generate each day. And as a Tripwire VIA solution, it lets you correlate events of interest with suspicious changes identified by Tripwire Enterprise the gold standard for detecting change. Tripwire Log Center further helps you identify and prioritize security risk by forwarding log and event data aggregated from additional security controls to other SIEMs or GRC solutions. For example, it can forward events from controls like intrusion-detection You also see the security information you need at the required level of detail using flexible and customizable dashboards with drill-down capabilities. Use it to identify incidents with intelligent data visualization and trend analysis. Plus, easily search across platforms and devices and obtain accurate and comprehensive results with standardsbased classification of log messages and events. With Tripwire Log Center, you more quickly and easily see the events that threaten your organization most. GENERATE EVIDENCE FOR SECURITY AND COMPLIANCE Tripwire Log Center provides everything you need to meet the log compliance requirements of most regulatory policies and industry standards. It aggregates and archives all log sources from network devices to servers, operating systems, applications, and more. It also provides efficient access to raw log data for your own security.:. FIG. 4 Tripwire VIA solutions include Tripwire Log Center for log and event management, and Tripwire Enterprise for security configuration management. With Tripwire VIA you gain system state intelligence that lets you prioritize risk and protect your high value, mission-critical assets.

systems (IDS), file integrity monitoring (FIM) solutions, and security configuration management (SCM) solutions. GAIN SYSTEM STATE INTELLIGENCE Integrating Tripwire Log Center with Tripwire Enterprise through the Tripwire VIA platform arms you with valuable security and business context around activity on your systems so you can prioritize and address the threats that matter most. For example, monitor, detect and alert upon anomalous activity occurring around your highest value assets. Do this by using Tripwire Enterprise Asset view to tag and classify assets based on criteria such as their criticality, risk, business impact, geographic locations and departments. Then filter the highest value assets based on their tags and use that information when building correlation rules in Tripwire Log Center. Further prioritize these threats by examining suspicious activity based on user entitlement with the Active Directory integration. Plus, easily leverage system state and change information as part of your incident detection efforts. Because Tripwire's Event Integration Framework allows more detailed state and change information from Tripwire Enterprise to flow into Tripwire Log Center, you gain even more robust user and business context. For example, you can detect when critical files on a high value asset have changed, whether files were changed by an account that was supposedly disabled, or if file changes degraded compliance or security scores. By prioritizing threats according to who they're associated with and their impact on your most critical assets, you can quickly execute the most effective response...: FIG. 5 With out-of-the box reports, Tripwire Log Center helps quickly and efficiently prove compliance. +..: FIG. 6 Tripwire Log Center allows users to create customized dashboards...: FIG. 7 Event relationship diagram displaying color-coded links between the nodes, showing the highest priority events that flowed over each link. +

TRIPWIRE LOG CENTER COMPONENTS Tripwire Log Center offers its key capabilities log and event management through Tripwire Log Center Manager. LOG MANAGEMENT Tripwire Log Center offers a complete log compliance solution that collects, retains and reports on log data from countless IT infrastructure devices. When it collects log data, it compresses, encrypts, and applies a checksum to the data to ensure its integrity. It then stores the data as a flat file. With its fast indexing and standardsbased event classification, each manager provides the ability to perform complex queries easily and accurately and to deliver full, cross-platform reports for compliance reporting and forensic analysis. Each manager also includes real-time, conditional alerting, so you know about suspicious activities immediately. You access all the features and functionality of a Tripwire Log Center Manager through a Log Center Console. EVENT MANAGEMENT Because Tripwire Log Center is an all-in-one log and event management solution, you access the event management capabilities through the Log Center Console. This means that security analysts can search across archived logs or respond to a dashboard alert from a single management interface. Tripwire Log Center s event management capabilities include an event database that stores alerts, events of interest and vulnerability data, and allows you to correlate those sources. It also provides near real-time views of current security events through the security dashboard. It even supports deep forensic analysis of that information. Plus, the Tripwire Log Center Manager provides a security event ticketing system so you can prioritize responses to security events. SECONDARY LOG CENTER MANAGER Sometimes you may wish to collect, store and forward log data from remote locations or distribute processing across multiple systems when you have high-volume sites. In both cases, you can deploy secondary managers to serve as log aggregators. In this role, secondary managers compress and encrypt the log data for highly efficient, secure transmission. You can upload data to a central, primary manager immediately, or schedule upload for times when network traffic is low. When using log aggregators, you get the same real-time, conditional alerting that a centralized, primary manager offers. Plus, you can filter the stream of log data for events of interest and immediately transmit them to the event database even if the manager doing the log concentration is holding the compressed log data for later transmission. Tripwire Log Center Log Center Console Reports Alerts Security Event Manager Log Manager Data Collectors Event Database (Relational DB) Log File Storage (Flat Files) File Systems Network Devices Databases Directory Services Desktops Hypervisors Applications.:. FIG. 8 Tripwire Log Center collects activity logs from anywhere in the IT infrastructure, compressing, encrypting, indexing and storing them quickly into flat files. Plus, Tripwire Log Center s security event management capabilities helps reduce security risk by getting near real-time dashboard visibility to security events and correlating events of interest, alerts and vulnerability data.

TRIPWIRE LOG CENTER FEATURES AND BENEFITS FEATURE System State Intelligence BENEFIT Through the Tripwire VIA platform, combines details of suspicious events with in-depth knowledge of system state from Tripwire Enterprise to deliver system state intelligence. That lets you better prioritize security threats based on the real risks they pose to your essential business functions. Provides state-based incident detection and better analysis by correlating change, event and vulnerability data through the Tripwire VIA platform. This provides greater visibility into possible security events. Security Dashboard and Event Views Business Context User Context Drag-and-Drop Correlation Rule Creator Event Flow Visualization Conditional Alerting Compliance and Management Reports Device and Application Support Log and Event Management in One Solution Accurate and Comprehensive Correlation Searches Event Collection Deep Forensic Analysis Security Event Ticketing System Affordable and Extensible Solution Helps you better manage your security risks and dynamically drill down on areas requiring greater scrutiny through a centralized, customizable dashboard view of alerts, events and vulnerabilities. Lets you identify suspicious activity based on the criticality, risk and business impact of your most valued assets by leveraging Asset View tags in Tripwire Enterprise. Integrates with Active Directory to provide the context of user entitlement, groups, roles and other attributes that already exist in your Active Directory environment so that you can more accurately detect suspicious activities. Lets you define complex combinations of events that you need to be alerted on by easily creating and customizing correlation rules with a graphical, drag and drop rule creator. Helps you pinpoint the parts of your IT infrastructure affected by a particular incident by automatically generating a graphical event relationship diagram. Shows how an attack entered and infiltrated the network by supporting replay of events. Delivers immediate notification of suspicious activity with real-time alerting based on complex sequences of events. Supports your compliance auditing or management needs with simple and customizable reports to visualize log and event information. Offers comprehensive support for almost any device and application in your data center with pre-defined normalization rules for the devices and applications most organizations use. Reduces complexity, costs, training time and set-up time by offering log and event management capabilities in a single solution. Lets you easily perform sophisticated searches across all event data using standards-based event classification and provides accurate and comprehensive results. Use these results for security investigations or to meet your compliance needs. Provides for your event collection needs with a unique architecture that supports a sustained capture rate of tens of thousands of events per second (EPS). Allows quick investigation of suspicious incidents and attacks, including their root cause, impact and ongoing effects. It does this with easy search capabilities that yield accurate, comprehensive results. Supports prioritizing and tracking incident response by letting you generate event tickets. Lets you pay only for the volume of log data you need on an enterprise basis rather than purchasing appliances that are only offered in expensive and large, pre-set increments. Reduces costs by letting you install a software-only log and event management solution on your own hardware, sized for the log volume needed for each location.

..: Tripwire is a leading global provider of IT security and compliance solutions for enterprises, government agencies and service providers who need to protect their sensitive data on critical infrastructure from breaches, vulnerabilities, and threats. Thousands of customers rely on Tripwire s critical security controls like security configuration management, file integrity monitoring, log and event management. The Tripwire VIA platform of integrated controls provides unprecedented visibility and intelligence into business risk while automating complex and manual tasks, enabling organizations to better achieve continuous compliance, mitigate business risk and help ensure operational control..:. LEARN MORE AT WWW.TRIPWIRE.COM OR FOLLOW US @TRIPWIREINC ON TWITTER. 2012 Tripwire, Inc. Tripwire, Log Center, VIA and ChangeIQ are trademarks or registered trademarks of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. TLCPB661n 201208