Assuria from ZeroDayLab

Similar documents
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

GPG13 Protective Monitoring. Service Definition

Caretower s SIEM Managed Security Services

PSN Protective Monitoring. Service Definition

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

GOOD PRACTICE GUIDE 13 (GPG13)

How To Buy Nitro Security

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

IBM QRadar as a Service

CyberArk Privileged Threat Analytics. Solution Brief

High End Information Security Services

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Log Management, Compliance and Auditing

Compliance Guide: PCI DSS

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

XpoLog Competitive Comparison Sheet

IBM QRadar Security Intelligence April 2013

FISMA / NIST REVISION 3 COMPLIANCE

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

QRadar SIEM 6.3 Datasheet

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Compliance Guide: ASD ISM OVERVIEW

Service Definition Document

How To Manage Security On A Networked Computer System

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

TRIPWIRE NERC SOLUTION SUITE

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Log Management and SIEM Evaluation Checklist

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Strategic Plan On-Demand Services April 2, 2015

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Q1 Labs Corporate Overview

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

What is Security Intelligence?

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

What s New in Security Analytics Be the Hunter.. Not the Hunted

SANS Top 20 Critical Controls for Effective Cyber Defense

Information Technology Policy

CNS Security and Network Monitoring. Managed Services Description

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection

Clavister InSight TM. Protecting Values

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

IBM QRadar Security Intelligence Platform appliances

SecureVue Product Brochure

Vulnerability Management

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

CYBER SECURITY TRAINING SAFE AND SECURE

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

IT Security Testing Services

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Continuous Network Monitoring

The Sumo Logic Solution: Security and Compliance

Guardium Change Auditing System (CAS)

Automation Suite for. GPG 13 Compliance

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

Monitoring Windows Workstations Seven Important Events

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Complete Patch Management

Technology Blueprint. Optimize Log Management. How to collect and store logs securely

White Paper Integrating The CorreLog Security Correlation Server with BMC Software

Meeting Federal Information Assurance (IA) Monitoring Requirements with SecureVue

The SIEM Evaluator s Guide

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

55004A: Installing and Configuring System Center 2012 Operations Manager

Information Security Management at the Olympics: Finding the Needle in the Haystack

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

CLOUD GUARD UNIFIED ENTERPRISE

2015 Vulnerability Statistics Report

Scalability in Log Management

FIVE PRACTICAL STEPS

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

End-user Security Analytics Strengthens Protection with ArcSight

Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

2012 North American Managed Security Service Providers Growth Leadership Award

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Adobe Systems Incorporated

Select the right security information and event management solution

McAfee Security Architectures for the Public Sector

Meeting Federal Information Assurance (IA) Monitoring Requirements with SecureVue

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Transcription:

Passionate about Total Security Management Assuria from ZeroDayLab Forensic Log Management SIM/SIEM2 As one of Europe s leading IT Security Consulting companies, ZeroDayLab has been carrying out Security Testing engagements combined with complimentary Security solutions for a broad range of public and private sector companies with over 100+ engagements per year. Our depth and breadth of experience enables us to deliver high quality projects that both identify all areas of your IT Security posture whilst also providing appropriate remediation and recommendations so that you can tighten your overall security strategy on time and in budget with consistent quality and return on your investment. ZeroDayLab has a strong set of testimonials across a broad range of industries and sectors. If you are as passionate as we are about Total Security Management, then our team of highly skilled and experienced Security Consultants will be happy to discuss your requirements in more depth and define an appropriate IT security strategy suitable for all of your business needs. Our experienced management team consistently delivers timely and accurate IT consulting services to our clients and retain trusted advisor status in UK and across EMEA.

Log Management, Analysis & Alerting, Protective Monitoring, Forensic Readiness, CESG CCTM Accredited Security Intelligence Just about every IT system, application and device has the ability to create an audit log (a detailed record of system activity). These logs are a primary source of cyber security intelligence. Securing and retaining them for forensic purposes is a mandatory compliance requirement within most IT security standards, including PCI-DSS and GPG-13. Protective Monitoring Audit logs are also vital for improving IT security. Automated monitoring and analysis of these logs can provide complete visibility of all IT system activity, enabling powerful protective monitoring and SOC (Security Operations Centre) services. SIM/SIEM solutions such as Assuria Log Manager (ALM) are designed to meet these needs. ALM is CCTM accredited. Scalable & Flexible With a fully scalable software architecture that allows small initial implementations to be incrementally scaled up to enterprise wide deployment, ALM s impeccable and almost unique design heritage provides a perfect platform to satisfy the SIEM/Log Management needs of government agencies and commercial enterprises of any size. ALM provides automated log management, secure log collection and storage, integrity monitoring, data analysis, anomaly detection, reporting and alerting of critical events from across the whole IT infrastructure. ALM collects, manages and analyses logs from almost any system, application or device from across the whole IT infrastructure. ALM Basic Architecture (Fig 1) Forensic integrity of log data Security incidents are hard to spot in real-time and SIM/SIEM solutions must enable forensic investigation of log data at any time. For this, critical logs must be secured and retained in complete and original form. However, most SIEM solutions don t collect complete logs at all, collecting only selected events and worse, reformatting and storing them in proprietary format. But ALM, designed from the outset to meet stringent forensic security needs, collects and stores log files in complete and original form, with a verifiable chain of custody. Role Based Access Control Privilege control is provided by built-in RBAC features. Multiple users can log into the ALM Console to manage security policies, agents, log collection policies, agent policies, and syslog forwarding, as well as to create archives, generate reports and many other processes. Agent based efficiency ALM resident agents provide the highest levels of forensic integrity, efficiency and automation and are available for most Windows, Unix and Linux systems. For agentless operations, via its own built-in Syslog server, using Tcl/Python scripted plug-ins, ALM can collect logs from just about any source. Out of the box, ALM supports a wide range of log sources and formats. Even logs with voice, video and image content can be managed and secured. ALM also comes with a large library of standard reports, such as for PCI-DSS and GPG-13 compliance. A powerful analysis engine and report generator allows easy generation of highly customised views of event and log data.

ALM Features: Enterprise Wide Log Collection Secure and forensically sound collection of logs from almost any system into a central store. Log Management Enterprise wide automated log management, including log rotation. Forensic Readiness Logs are collected in a secure and forensically sound manner, retaining their original form, complete with relevant meta data, thus allowing repeated examination and re-analysis and use of the logs by other applications and processes. Real-time Event Alerting Configurable to specific log events, sent via Email and/or SNMP traps. Agent Based Log Management Ensures the security, continuity and integrity of all collected logs and alerting at source. Digitally Signed An RSA/SHA256 digital signature is calculated and the log digitally signed before transfer. Transfer is authenticated and encrypted using TLS. Secure Storage Log cataloguing, chain of custody records, archive creation and management. Archive to secure long term storage, complete with a digitally-signed manifest. Scalable and Modular Architecture Designed to support almost any sized IT environment up to thousands of log sources. Supports multiple collection points, with load balancing and resilience built-in. Analysis Collected logs are processed by a rules-driven analysis and anomaly detection engine. Flexible and extensible analysis rules allow interesting events to be tagged and written to a database for further analysis and reporting. Unstructured Querying ALM provides facilities to analyse and report on stored original log data, allowing unstructured Google type searches on any item, providing effective interactive analysis and learning features. Reporting Flexible analysis, correlation, aggregation and reporting in HTML, PDF, XLS, XML and CSV. Data Export Export of collected log data to external systems in various forms raw logs, form normalised or content normalised.

About ZeroDayLab At ZeroDayLab, every day is spent helping make our client s infrastructure and applications, and data more secure through the intelligent combination of highly trained consultants and leading edge, complimentary security technologies. We are passionate about IT Security and believe in Total Security Management. At ZeroDayLab we take a holistic approach to Total Security Management. Our skilled and experienced consultants can provide help, advice, training and support on a whole range of IT security solutions such as: IT Security review of policies, planning, continual improvement, mitigation, risk assessment, financial modelling, social engineering, vendor review. Vulnerability Assessment of your desk top, servers and infrastructure Penetration Testing of all your internal and external web applications Architecture and Infrastructure review with recommendation and remediation ISMS, SIEM 2; Governance, Risk & Compliance Forensic analysis Business continuity, Brand Protection Source code review Education & Training Technical support, knowledge transfer, Privileged User Management, Traceability, Access control Advanced Threat Protection, White and Black listing, End point protection ZeroDayLab is the trusted advisor to many of Europe s leading organisations and Government agencies. We have a passion for IT Security borne out of 100s of successful and complex customer engagements in the UK, Ireland, Europe, Middle East, North America and Asia Pac over the last 10 years. We understand how important security is to you and how tight current budgets are. So we will maximise your ROI by delivering value for money, practical services and solutions of the highest and most consistent quality to surpass your project needs. My team looks forward to sharing our vision with you and helping you to defend against the malicious attacks that come from both inside and outside of your environment. Kevin Roberts Managing Director Office number - +44(0)207 979 2067 Mobile number - +44(0)778 626 6158 kroberts@zerodaylab.com www.zerodaylab.com

All of our consultants hold a wide range of industry standard qualifications to the highest level, such as CREST, CHECK, CISSP, RSE, IA Certification (CLAS) CESG Approved, and where appropriate are fully security cleared to Government standards to work on projects of all natures.