GETTING MORE FOR LESS AS LOG MANAGEMENT AND SIEM CONVERGE



Similar documents
SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS

Converting Security & Log Data into Business Intelligence: Art or Science? Phone Conference

How To Manage Log Management

How To Buy Nitro Security

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

Scalability in Log Management

Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm s Security Analytics Platform

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Detect & Investigate Threats. OVERVIEW

Securing your IT infrastructure with SOC/NOC collaboration

Security Information/Event Management Security Development Life Cycle Version 5

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Network Security Monitoring: Looking Beyond the Network

Discover & Investigate Advanced Threats. OVERVIEW

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

The SIEM Evaluator s Guide

Bridging the gap between COTS tool alerting and raw data analysis

Ecom Infotech. Page 1 of 6

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Guide to Information Governance: A Holistic Approach

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

SANS Top 20 Critical Controls for Effective Cyber Defense

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

The Sumo Logic Solution: Security and Compliance

Exporting IBM i Data to Syslog

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Achieving PCI Compliance with Log Management

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

White paper. Security Check: 7 Things to Consider When Evaluating Vendor Solutions for SIEM

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

IBM QRadar as a Service

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

THE GLOBAL EVENT MANAGER

Information Technology Policy

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

RSA Security Analytics Security Analytics System Overview

Boosting enterprise security with integrated log management

BlackStratus for Managed Service Providers

LogRhythm and NERC CIP Compliance

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

QRadar SIEM and FireEye MPS Integration

Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No

2012 North American Managed Security Service Providers Growth Leadership Award

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Introduction to Records Management in SharePoint 2013

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

THE BLUENOSE SECURITY FRAMEWORK

QRadar SIEM 6.3 Datasheet

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

I D C A N A L Y S T C O N N E C T I O N

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Compliance Management, made easy

CONTINUOUS LOG MANAGEMENT & MONITORING

Cloud and Data Center Security

Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

PCI Requirements Coverage Summary Table

Become a hunter: fi nding the true value of SIEM.


Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Safeguarding the cloud with IBM Dynamic Cloud Security

Log management & SIEM: QRadar Security Intelligence Platform

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

GOOD PRACTICE GUIDE 13 (GPG13)

The Comprehensive Guide to PCI Security Standards Compliance

Server Monitoring: Centralize and Win

Best Practices for Database Security

IBM Security IBM Corporation IBM Corporation

nfx One for Managed Service Providers

TORNADO Solution for Telecom Vertical

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

What is Security Intelligence?

Transcription:

GETTING MORE FOR LESS AS LOG MANAGEMENT AND SIEM CONVERGE AN IANS INTERACTIVE PHONE CONFERENCE FEBRUARY 11, 2009 CHRIS PETERSON, CTO, FOUNDER, LOGRHYTHM NICK SELBY, IANS FACULTY SUMMARY OF FINDINGS Underwritten By:

Chris Peterson, LogRhythm CTO, Founder Chris brings a unique and diverse background in information security, audit, product development, and product management to his role as Chief Technology Officer/Founder of LogRhythm. Chris has spoken at numerous conferences, been quoted in numerous publications, and was a faculty member with IANS. Chris has a degree in Accounting/ Information Systems from Colorado State University. Nick Selby IANS Faculty Nick is a member of the IANS faculty. He has worked as an IT security consultant to small and mid-sized firms subject to regulatory compliance and strict confidentiality. He has also covered emerging technologies such as open source, wireless, and software piracy when based in Europe and Eastern Europe. He was editor-at-large for Amsterdam-based Tornado Insider/Tornado Investor, and reported for the International Herald Tribune. Selected statements by Chris Peterson of LogRhythm Context In this Interactive Phone Conference, IANS faculty member Nick Selby moderated a conversation with LogRhythm CTO/Founder Chris Peterson about the evolution toward one product addressing both log and event management needs. Chris also responded to numerous phone and email questions from participants. Briefing Summary The market is demanding a single solution for both log and event management. A single solution has lower investment and maintenance costs as well as faster incident response. Also, reporting is faster and less expensive. A single solution supports forensics and e-discovery. LogRhythm is unique in that it was created to provide a single log and event management solution. Its architecture has separate collection and processing layers. Overview LogRhythm has several differentiating capabilities. These include the collection infrastructure, the correlation capabilities, the online and archiving abilities, the sharing and visualization capabilities, and the ability to access logs in custom applications. The future of log and event management will focus on analysis. More robust analytical capabilities will derive even greater value from the logs and data that are collected, bringing greater insights to problems such as insider threats. Log management and event management have evolved as separate and distinct solutions. But customers would prefer and are demanding a single log and event management solution. A single solution would cost less to implement and maintain, would provide faster incident response, and would result in better reporting (among other things). LogRhythm is the single solution that the marketplace is looking for. It is a best-of-breed log management solution and a very good event management solution. LogRhythm is unique in that from its inception it was designed to be both a log and an event management solution. The result: LogRhythm s architecture has separate collection and processing layers, which provides multiple benefits. LogRhythm is highly scalable, has a great user interface, and has many other unique and differentiating capabilities. Key Points Instead of separate log and event management solutions, the market is demanding one solution that does both. The problem SIEM was invented to solve was data overload, primarily from IDSs. The idea was take IDSs, firewall logs, and more pieces of data and boil this information down into a highly correlated single event. Boiling down has great value, but in this data reduction process SIEMs threw away a lot of valuable forensic material; the information was simply discarded. It was lost and not available to a SIEM user. For additional information contact LogRhythm or IANS. Page 1 of 6

In contrast to SIEM, log management was developed to collect and store all of the underlying forensic information, and to have this data available. Keeping all of the log data in its original, unfiltered, unmodified state which SIEM solutions don t do also has tremendous value. Customers are smart and are asking, Why should I deploy two technologies? What evolved were two different types of solutions: log management solutions that collect and store logs in their original form, and event management solutions (SIEMs) that boil information down to view a single event. Yet increasingly users are asking, Why should I deploy two technologies and two infrastructures that collect the same data? Customers are saying that they would prefer one product that collects and keeps all of their logs, provides a correlated view of events, and allows access to the raw data when it is needed. By having a single solution, when an IDS alarm goes off, it is possible to then pull all of the raw logs from a web server around that attack and corroborate what the IDS is saying. The ability to corroborate high-level events against lower-level log data enables much more effective truth in corroboration in terms of understanding What just happened here? Wouldn t it be nice if a single solution could identify what I care about in real time when an event occurs, and could also provide the ability to immediately access other log data to help corroborate or understand other information around that attack? A single solution that combines log and event management has many advantages. Among the many advantages of a single log and event management solution are: Lower investment. Instead of investing to implement and maintain two separate solutions, just one is needed, lowering the upfront investment and ongoing maintenance expenses. Faster incident response time. By having one solution with normalized data, incident response time related to operations, compliance, and security issues should be significantly reduced. Lower system downtime. The ability to respond to intrusions faster and more effectively will decrease system downtime, which will lower costs. Decreased reporting costs. The automated capabilities of a single solution support reporting associated with compliance and do so in a low-cost way. Support for forensic investigations. Access to raw log data supports after-the-fact forensic investigations. It provides the ability to get to log data that is needed whenever it is needed. Easier e-discovery. As with forensics, the ability to access vast amounts of log data in one system makes the entire e-discovery process easier. LogRhythm is unique in that it was created as a single solution. When LogRhythm was founded, the basic premise was to integrate log management and SIEM in a single solution. In some ways, LogRhythm had an advantage in that it was late to market. The company had the For additional information contact LogRhythm or IANS. Page 2 of 6

opportunity to observe and learn from the existing players in the market all of which were either pure SIEM or log management solutions. We architected a solution where we separated the collection layer and the processing layer. If you are a log management vendor, you need to keep the log in its original state. That is something the SIEM vendors have not done. LogRhythm was unique in embracing a single solution philosophy. This philosophy led the company to architect a solution which separated the collection layer and the processing layer. Collection layer. Any type of log data can be collected in its native, raw form. This raw data is not modified, but it is normalized and time stamped. It is then stored within a log manager which is a general purpose data repository and managed effectively for compliance purposes. Processing layer. On top of the collection layer is a separate processing layer. Processing is done through a rules engine that has the ability to look at any type of log data. This has broader capabilities than a typical SIEM. Specifically, this means looking into a log message text and identifying metadata. LogRhythm has several differentiating characteristics. Unlike most of the other players in the space, which started as SIEM solutions and over time have tried to add log management capabilities, LogRhythm was focused on having both capabilities from its outset. Because of this, LogRhythm s technology is more effective in terms of delivering a integrated platform. While this was the company s vision, most of the company s early R&D investments were focused on log management. As a result, LogRhythm is a true best-of-breed solution for log management, with very good event management capabilities. Among LogRhythm s differentiating capabilities are: Our solution is the best of both worlds. You have the original or raw log, which is critical to keep, plus you have all of the metadata for correlation, analysis, and more effective reporting. The collection infrastructure. How LogRhythm collects data is different from other solutions, and much more flexible. LogRhythm has extensive agentless collection capabilities, collecting logs from Cisco, Netflow, Windows event logs, and more. These agentless capabilities allow for the remote collection of logs such as database logs, Cisco IDS logs, and Checkpoint logs. In addition, LogRhythm also has agents, which make sense in some cases. For example, if a retailer has a POS system in its remote stores, it can be valuable to put an agent on the POS. The agent can reach out and pull logs from the POS and send data to a datacenter over SSL communications in compressed form. That is very valuable in providing an extension to the data collection infrastructure that is managed and maintained by the same vendor. Having the ability to use an agent is a distinct advantage for LogRhythm versus vendors that are 100% agentless. In the POS example above, a customer that used an agentless solution would have to find some open source software or shareware to get the POS For additional information contact LogRhythm or IANS. Page 3 of 6

data to them. So, they would still be using agents but the agents would not be managed by the log management solution. I consider LogRhythm to be best in class. Having both agentless and agents when they re required is really a big differentiator for us. It s pretty easy to get to any data regardless of the age. We win a lot of business because of our user interface. It seems like once people see our UI, we re immediately short-listed. Correlation. A LogRhythm user can create an alarm rule on any of the fields that the solution parses out, and can correlate on any of the roughly 35 metadata fields. Also, LogRhythm can take multiple alerts on the same event and correlate these into a single event. Online data. Data is kept online as long as a user wants; 90 days is common. When data is online it is immediately accessible through analysis, tools, and reports. When the data expires it gets purged, which keeps the database at a reasonable size. Archiving. When data is no longer accessible online, it is still archived. LogRhythm has a unique log data management archiving technology. Every log is collected and is written into a purpose-built archiving system. This is a file-based archiving solution where a file contains a log source and log messages for that day, and all files are compressed and cryptographically sealed. This makes it possible to verify that a file hasn t been tampered with. All log data is kept in the archives for as long as the user wants it there. The archived data can be written to an appliance or a SAN, or to wherever the user wants to write it. LogRhythm has developed an archive search tool called Second Look. This tool finds any logs that meet specific criteria and pulls these logs back online. Collecting and accessing logs in custom applications. This is another big advantage of the separation in the collection and processing layers. For a custom application, as long as data can be received through a collection interface, the data can come into LogRhythm. This means that if an application logs to a flat file, if it will send out via SysLog, if it writes to a database, or it if writes to Windows Event Log, then the data can be collected in LogRhythm. When logs from custom applications are brought in, LogRhythm has no idea what the logs mean. But LogRhythm has the ability to bring these logs into a tool called Investigator. This provides the ability to look at the logs and copy them into a rule builder where a user can write their own rules. User interface and visualization. LogRhythm uses a great deal of visualization. These capabilities complement what is seen as a great user interface. Data sharing. LogRhythm has created a capability for users who want to take the data that is collected and build their own visualization, or share data with other users. This capability is called Log Distribution Services. LogRhythm wants to be the infrastructure for data management, but recognizes there are other uses for data that require sharing. For additional information contact LogRhythm or IANS. Page 4 of 6

The future for log and event management will focus on analysis. When asked about his vision for the future of log and event management, Chris Peterson said, I think analysis is still the key in terms of where a lot of innovation will occur. Analysis will continue to be more important. We want to be the infrastructure in terms of log data management. Solutions like LogRhythm that bring in all of this data are the key to identifying some of the things that we just cannot detect today. The value of collecting huge amounts of data doesn t reside in the act of collection; it is in the analysis of what has been collected. Effective analysis and algorithms will enable looking for anomalous things, such as insider threat. Other Important Points Scalability. LogRhythm s sweet spot tends to be enterprises with 500 to 5,000 servers. Not many customers have fewer than 500 servers. Many started with 500 and then added more servers over time. An important consideration when evaluating log and event management solutions is how well and how easily they scale. Users should look for a building block architecture that they can continue to build on. LogRhythm is highly scalable; scaling simply entails adding log managers. Time required. Typically it takes 1-2 weeks to implement LogRhythm. The ongoing maintenance time varies based on exactly what a user wants to do. Roughly 1 to 2 days per month of maintenance wouldn t be an unreasonable amount of time. Usage auditing. One participant mentioned that many log and event management products fail to have an ability to demonstrate (for compliance purposes) that people are actually going in and looking at the logs. LogRhythm implemented a feature called Usage Auditing to address this specific need. Everything that a user does is logged every report that is run, every search, every alarm that is drilled down on. That information is available in Usage Auditing reports. A process, not a tool. Log and event management is not a product; it is an operational process. A tool will only do so much. Tools make the processes possible and more efficient, but they are just tools. A complete solution involves tools, processes, and people. For additional information contact LogRhythm or IANS. Page 5 of 6

About LogRhythm LogRhythm provides a comprehensive, fully integrated, enterprise-class log management, log analysis, and event management solution that empowers organizations to comply with regulations, secure their networks, and optimize IT operations. By automating the collection, organization, analysis, archival, and recovery of all log data, LogRhythm enables enterprises to easily comply with log data retention regulations while simultaneously gaining valuable, timely, and actionable insights into security, availability, performance, and audit issues within their infrastructure. LogRhythm solutions are noted for their completeness, useful analytics, ease of use, and rapid time to value. Learn more at www.logrhythm.com About IANS IANS is the premier membership organization for practicing information security professionals. IANS mission is to provide key technical and business insights to help members solve their most pressing professional challenges. IANS achieves this mission through a broad offering of services provided to its members insightful events, thought-provoking publications, best-practice research, and unique networking opportunities. Learn more at www.ianetsec.com For additional information contact LogRhythm or IANS. Page 6 of 6