What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.



Similar documents
QRadar SIEM and Zscaler Nanolog Streaming Service

QRadar SIEM and FireEye MPS Integration

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

IBM QRadar as a Service

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Magic Quadrant for Security Information and Event Management

How To Buy Nitro Security

Q1 Labs Corporate Overview

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and Event Management

How to Choose the Right Security Information and Event Management (SIEM) Solution

Log management & SIEM: QRadar Security Intelligence Platform

Scalability in Log Management

Find the intruders using correlation and context Ofer Shezaf

Ability to Execute. 1 von :55. What You Need to Know

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

What s New in Security Analytics Be the Hunter.. Not the Hunted

Magic Quadrant for Security Information and Event Management

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Vendor Landscape: Security Information & Event Management (SIEM)

IBM Security Intelligence Strategy

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Magic Quadrant for Security Information and Event Management

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

Security Information Event Management (SIEM) solutions

Magic Quadrant for Security Information and Event Management

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

What is Security Intelligence?

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

Information & Asset Protection with SIEM and DLP

The SIEM Evaluator s Guide

Magic Quadrant for Security Information and Event Management

Caretower s SIEM Managed Security Services

Magic Quadrant for Security Information and Event Management

Magic Quadrant for Security Information and

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

High End Information Security Services

Critical Capabilities for Security Information and Event Management 7 May 2013 ID:G Analyst(s): Mark Nicolett, Kelly M. Kavanagh VIEW SUMMARY

Log Management and SIEM Evaluation Checklist

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

IBM Security IBM Corporation IBM Corporation

Security Information and

QRadar Security Intelligence Platform Appliances

IBM QRadar Security Intelligence April 2013

SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

The webinar will begin shortly

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

How to Define SIEM Strategy, Management and Success in the Enterprise

Security strategies to stay off the Børsen front page

The Purview Solution Integration With Splunk

SAP Security Monitoring with agilesi. agilesi tm Solution Brief Product Specification July 2012 Version 1.1

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions

Securing your IT infrastructure with SOC/NOC collaboration

Magic Quadrant for Security Information and Event Management

Changing the Enterprise Security Landscape

Ecom Infotech. Page 1 of 6

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

IBM SECURITY QRADAR INCIDENT FORENSICS

Решения HP по информационной безопасности

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Enabling Security Operations with RSA envision. August, 2009

Information Technology Policy

IBM QRadar Security Intelligence Platform appliances

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

IBM Security QRadar SIEM Product Overview

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Security Operation Centre 5th generation

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2

INSERT COMPANY LOGO HERE

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

White paper. Security Check: 7 Things to Consider When Evaluating Vendor Solutions for SIEM

Security Intelligence Solutions

Configuring an ArcSight Smart- Connector to collect events from Kaspersky Admin Kit 8.0

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

End-user Security Analytics Strengthens Protection with ArcSight

Converting Security & Log Data into Business Intelligence: Art or Science? Phone Conference

McAfee Security Information Event Management (SIEM) Administration Course 101

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Braindumps QA

Enterprise Security and Risk Management

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

From the Bottom to the Top: The Evolution of Application Monitoring

Transcription:

Ross Spooner Cyber Security for Government Conference 6 August 2013

What is SIEM? Security Information and Event Management Centralised security log management Long term storage, analysis and reporting Real-time monitoring, alerting, correlation and dashboards Comes in a software format or as an appliance. Source: www.compushare.com/solutions/network-security/

Fundamentals Security Monitoring Process Collection Analysis Escalation EVENTS Investigate Incident Mgmt Monitor ALERTS Assess Incident Response Which security events and alerts require my attention? How do I obtain meaningful information from the events collected from the ever-increasing number of devices across my enterprise?

Evaluation Process Where to look for Inspiration? Industry Analysts and Market Observations Within Gov t and Private Sector with similar technology What do we really trying to achieve? Requirements Who are we trying to satisfy? Software vs Appliances? Proof Of Concept Realistic Multiple Log Sources and Use Cases

Drivers Requirements Functional and Non-Functional Requirements Log Sources Platforms, Systems and Applications Deployment Scale Budget Resources Real-time Monitoring and Reporting Administration and Analytics

Home Team Duties SIEM Stakeholders are IT Security, Technical Operations, Audit, Compliance Functional requirements and Scalability must be known at Purchase time Road Map into the future Solution to match your capabilities Identify what you don t know services to cover capability gaps. Use Case development

Vendor Selection Event Collection and Management Monitoring, Analysis and Alerting Built-in Functionality Scalability and Storage Minimal Performance Impact Ease of Use with User Friendly Interface Support within Australia Software or Appliance

M i l l i o n s $ P e r c e n t a g e G r o w t h Revenue and Growth Revenue Growth 1100 1000 1000 950 1000 1050 90 80 900 800 800 850 70 60 700 600 50 50 40 500 400 400 30 30 25 30 20 300 200 15 15 15 2006 2007 2008 2009 2010 2011 2012 Data Sources : Frost & Sullivan, the Growth Partnership Company. Gartner Core Research Notes. Gartner Inc. 10 0

Gartner Magic Quadrant Niche Players Smaller or regional vendors More specific or narrow focus May have small or shrinking user base

Gartner Magic Quadrant Challengers Well funded, good revenue Strong execution capabilities Typically haven't demonstrated rich capability or track record

Gartner Magic Quadrant Visionaries Good functional match to market requirements Lower execution capabilities, well funded Smaller installed base, revenue, viability or growth.

Gartner Magic Quadrant Leaders Good functional match to market requirements Good installed base and revenue stream and growth Superior execution of anticipated requirements and service

Retrospective Look 2008 2013 Source : Magic Quadrant for Security Information and Event Management. Gartner Core Research Notes. Gartner Inc. 2008, 2009, 2010, 2011, 2012, 2013.

HP ArcSight 2013 2008 2013 2008 ArcSight acquired in 2010 ESM for large scale deployments Express appliance for midsized Connector and Logger appliances CORR replacing Oracle Feature rich but most complex Complete set of capabilities

IBM QRadar 2013 2008 2013 2008 IBM acquired Q1 Labs in late 2011 Juniper appliances (STRM) Good general SIEM capabilities Straightforward to deploy and maintain Behaviour analysis for NetFlow and log events

McAfee ESM 2008 2013 2013 Acquired NitroSecurity 2011 Integration within Stable High-performance analytics under highevent-rates Network-based packet inspection 2008

LogRhythm 2008 2013 2008 2013 Appliances and software Scalability Light and Nimble Good fit for limited deployment and support resources Wizards for fast deployment

Symantec SSIM 2013 2013 2008 2008 Integrates with SEP DeepSight provides threat and vulnerability data. Narrow Fit Modest Development

EMC-RSA 2013 2008 2013 2008 Early success Now most replaced EnVision to Security Analytics Based on NetWitness platform Watch this space!

NetIQ Sentinel 2013 2013 2008 2008 Acquired Novell in late 2010 Based on Sentinel Agent and content technology from Security Manager Integration within Stable Large-scale processing in highly distributed environments

Log Management Poor Log Management Predates SIEM Log Management Issues Still Exist Big Data Sets and Archival Incomplete captures Auditing turned off Log format standards and specifications Applications security logging SIEM dependant upon Audit and Logging Regime

Distilling Events Three layers of Architecture Event Collectors Event Indexing and Storage Processing/Mgt/Admin/Console Collection/Storage is High Volume Ranging up to 100K EPS. Event Processing against a subset Collection Storage Processing Aggregation and Filtering consolidate to 10-20% What you collect isn t what you keep nor use!!

Event Collection Built-In Support for Most Common Devices Poor Back-End Systems Capability (e.g. Mainframe) Custom Log Sources Cost and Expertise Events Normalised into Proprietary Format Makes Migration Difficult Raw Logs Still Needed Adoption of a Standard (CEF)

Filtering Correlation Faster Against Known Bad Events Log Volumes Can Overwhelm SIEM systems SIEM licences often based on EPS Filtering at Source Best approach for Log Filtering Control know what you log Lower System Resources utilization Filtering at Destination Most practical and easiest to implement SIEM takes care of filtering Source Devices will be generating tons of logs Higher System Resources and Bandwidth Utilization

Correlation is a Vital and Powerful Analysis of : Attack Vectors Threat Scenarios specific to You Start with Built-In Rules Correlation Understand, Investigate, Tune and then Build

SIEM is Only as Good as the Administrator Ecosystem Maintenance and Care Technical Skills Across ALL Platforms and Systems Across O/S and Applications SIEM Itself Training Mentoring Specialist Skills Managed Service Offerings

Hired Help

Now we ve got SIEM we can get rid of archiving native logs other similar software, like Splunk alert me whenever fraud occurs generate Web Application Analytics Reports we can tick that Compliance box

Bandwidth/CPU Fails Uncompressed Syslog over NW DNS Lookups

Dashboard Fails Beware, the colour, Red Default colours may send the wrong signals Dashboards MUST give Info at a Glance Clarity of Alerts Drive Behaviour Not there to just look colourful!!

Dashboard Fails Don t be over-awed by Sheer Numbers! Forest and Trees Syndrome The Devil is often in the Detail

Return on Investment Managing SIEM is Not Simple Poor People Investment = Poor Return SIEM is not a Silver Bullet Identifies security issues Needs Response and Remediation resources

SIEM is not about acquiring a tool, but about gaining intimacy with your logs and events, your configuration and business goals, commensurate with your environment and requirements. People, not Product is the Key to Success