Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Similar documents
SecureVue Product Brochure

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

End-user Security Analytics Strengthens Protection with ArcSight

Extreme Networks Security Analytics G2 Vulnerability Manager

The Benefits of an Integrated Approach to Security in the Cloud

The SIEM Evaluator s Guide

1 Introduction Product Description Strengths and Challenges Copyright... 5

Continuous Network Monitoring

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

IBM QRadar Security Intelligence April 2013

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

How To Manage Security On A Networked Computer System

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

The Sophos Security Heartbeat:

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

What is Security Intelligence?

REVOLUTIONIZING ADVANCED THREAT PROTECTION

IBM Security QRadar Vulnerability Manager

IBM Security IBM Corporation IBM Corporation

Combating a new generation of cybercriminal with in-depth security monitoring

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

SORTING OUT YOUR SIEM STRATEGY:

Q1 Labs Corporate Overview

Overcoming Five Critical Cybersecurity Gaps

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

How To Buy Nitro Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CyberArk Privileged Threat Analytics. Solution Brief

Detect & Investigate Threats. OVERVIEW

Cybersecurity and internal audit. August 15, 2014

How To Create Situational Awareness

Endpoint Threat Detection without the Pain

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cyber Security Metrics Dashboards & Analytics

CloudCheck Compliance Certification Program

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

24/7 Visibility into Advanced Malware on Networks and Endpoints

Continuous Cyber Situational Awareness

Discover & Investigate Advanced Threats. OVERVIEW

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Caretower s SIEM Managed Security Services

Advanced Threats: The New World Order

THE EVOLUTION OF SIEM

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

WHITE PAPER: THREAT INTELLIGENCE RANKING

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Best Practices for Building a Security Operations Center

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

BeyondInsight Version 5.6 New and Updated Features

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

IT Security Strategy and Priorities. Stefan Lager CTO Services

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Incident Response. Six Best Practices for Managing Cyber Breaches.

Italy. EY s Global Information Security Survey 2013

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

The Cloud App Visibility Blindspot

Find the needle in the security haystack

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Analyzing HTTP/HTTPS Traffic Logs

ThreatSpike Dome: A New Approach To Security Monitoring

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

How To Secure Your Store Data With Fortinet

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

TRIPWIRE NERC SOLUTION SUITE

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Cisco Cyber Threat Defense - Visibility and Network Prevention

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Carbon Black and Palo Alto Networks

Cisco Advanced Malware Protection

Cyber Situational Awareness for Enterprise Security

Transcription:

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding Security Fingerprints Today s headlines don t promote a strong sense of confidence among consumers, business owners, or even information security professionals. Organizations across the public and private sectors are being successfully hacked both from outside and within at what seems like an exponentially increasing rate, and the result is a series of data breaches that include cardholder and other financial data, private healthcare information, classified government data, confidential intellectual property, and more. Why are these attacks becoming so much more prominent and attackers apparently more bold? Historically, organizations previously relied entirely on signature-based technologies to detect threats to their environment. Tools such as firewalls, anti-virus, intrusion detection sensors, and others were responsible for protecting the perimeter of the network. These signature-based tools were a giant fingerprint database for attackers and malware. Unfortunately, today s malicious attackers and programs are very intelligent and rely on tactics such as evading signature detection and disabling security tools to provide stealthy access to critical business data. That means the fingerprint databases provided by signature-based technologies are no longer sufficient; organizations need to look beyond signatures to discover the new fingerprints left by attackers, both inside the organization and out. The way to achieve that visibility is through fullcontext forensic analysis. What Is Full-Context Forensic Analysis? Full-context forensic analysis differs from other, more simplistic security activities such as scanning or monitoring log files. Forensic analysis requires: 12 Post Office Square, Boston, MA 02109 Tel: +1.617.337.4880 Fax: +1.978.266.0004 eiqnetworks.com ForensicVue provides fast access to the root cause of information security incidents and anomalies by evaluating all security data in context Advanced threats, including insiders, APTs, and other cyber attacks, can sometimes leave only very light fingerprints that take detailed security information to detect ForensicVue is an integrated component of the SecureVue unified situational awareness platform ForensicVue provides complete, full-context analysis, correlation, and reporting on security data across any period of time Visibility Across All Security Data. In order to truly see the full context of information -- for example, how security events relate to the configuration state of the system on which the events were triggered. It s critical to have access to all security-related information. This includes not only event-based data (such as logs from devices, hosts, applications, and databases) but also asset and configuration state, network traffic analysis, known vulnerabilities, performance metrics, file integrity changes, and more. Without access to all data, it becomes difficult or impossible to piece together activity to discover the true root cause of anomalies and other security issues.

Automated Visualization. A full-context forensic analysis solution must provide access to all security-related information, but present it in a highly visual, uncluttered, and minimally complex manner in order to significantly reduce the time to discover the root cause of security-related issues. This is typically achieved through automated normalization and categorization of security data to make it easier to view similar activity, as well as via dynamic visualization of large quantities of data through dashboards and other visual elements. User Context. Almost all security activity from network traffic, to running processes and system changes can be tied back to the context of a specific user. For this reason, it is critical to ensure that security analysts can identify the users associated with specific actions. As importantly, this means being able to mine and normalize user accounts not only across individual systems and databases, but also directory services and identity management systems. ForensicVue: Deep Analysis Across All Security Data ForensicVue from EiQ Networks is an integrated component of SecureVue, the industry s first unified situational awareness platform. ForensicVue provides unparalleled visibility into the complete chain of security activity across the enterprise. Unlike forensic and other analytic components in log management and SIEM tools, ForensicVue provides analysis of all security data, not just event-based activity. ForensicVue s range of support data is vast, and includes events, asset and configuration changes, network traffic data (including both raw connection information and profiled data), known vulnerabilities, performance metrics, system availability, file integrity changes, and much more. Using ForensicVue, security analysts and other stakeholders can quickly identify the true root cause of security problems. ForensicVue searches are done using a fast, Googlelike user interface with support for both point-andclick and regular expressions ForensicVue reduces the time to root cause discovery with fast, autonomic searching and categorization of security information Using the same proprietary, performance-driven database as the rest of SecureVue, ForensicVue maintains unparalleled speed when searching across days, weeks, months, and even years worth of data ForensicVue supports enterprise forensic analysis across all security data, including events, asset and configuration changes, network traffic data, known vulnerabilities, performance metrics, system availability, file integrity changes, and much more

ForensicVue completely visualizes security data, providing a clear, simple and straightforward understanding of collected data. ForensicVue s normalization engine provides dynamic results of searches across unlimited periods of data, allowing security analysts to quickly determine their next course of action. Simultaneously, ForensicVue provides comprehensive drill-down support for rapid access to raw data. ForensicVue s autonomic capabilities ensure that security professionals minimize the time required to find their target. ForensicVue s autonomic capabilities include dynamically normalized data elements within search criteria (on the left), as well as visualization of security data over time. ForensicVue collects and identifies the context of users across all security activity. Working in seamless concert with the rest of the SecureVue platform (including UserVue, which can normalize multiple accounts into a single identity), ForensicVue provides comprehensive evaluation of users who are responsible for activity across the enterprise, and can be used to profile whether a potential data breach or other attack is the responsibility of a malicious insider or an outsider who has compromised user accounts. ForensicVue helps security professionals quickly identify all activity associated with a specific user, including activity that spans multiple operating system, database, and application accounts

ForensicVue: The Fast and Efficient Workhorse of Unified Situational Awareness ForensicVue gives information security professionals the fast access they need to correlate all information security data, identify the sometimes complex relationships between security-related activities across the enterprise, and act immediately to ensure that unauthorized activity and incorrect security controls are addressed without delay. Based on EiQ Networks proprietary database, which provides the fastest search times in the industry, ForensicVue dramatically reduces the time required to discover the true root cause of anomalies and other security activity. Coupled with comprehensive autonomic capabilities and support for complete user context, ForensicVue represents the most advanced security monitoring analysis tool available on the market today. Best of all, ForensicVue is an integrated component of SecureVue, the first situational awareness platform, providing additional capabilities beyond forensic analysis including continuous security monitoring, configuration auditing and assessment, and compliance automation -- all within a single, unified console! About EiQ Networks EiQ Networks, a pioneer in security hybrid SaaS and continuous security intelligence solutions and services, is transforming how organizations identify threats, mitigate risks, and enable compliance. EiQ offers SOCVue, a security hybrid SaaS offering, and provides 24x7 security operations to Small to Medium enterprises who need to protect themselves against cyber attacks but lack resources or on-staff expertise to implement an effective security program. SecureVue, a continuous security intelligence platform, helps organizations proactively detect incidents, implement security best practices, and receive timely and actionable intelligence along with remediation guidance. Through a single console, SecureVue enables a unified view of an organization s entire IT infrastructure for continuous security monitoring, critical security control assessment, configuration auditing, and compliance automation. For more information, visit: http://www.eiqnetworks.com.