VISIBLY BETTER RISK AND SECURITY MANAGEMENT



Similar documents
Security Information & Event Management (SIEM)

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Redefining SIEM to Real Time Security Intelligence

How To Buy Nitro Security

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

IBM Security IBM Corporation IBM Corporation

Concierge SIEM Reporting Overview

Secure Cloud Computing

IBM Security Strategy

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

McAfee Network Security Platform

Advanced Threats: The New World Order

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Leading The World Into Connected Security. Paolo Florian Sales Engineer

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

McAfee Security Information Event Management (SIEM) Administration Course 101

First Line of Defense

REVOLUTIONIZING ADVANCED THREAT PROTECTION

First Line of Defense

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

IBM QRadar Security Intelligence April 2013

End-user Security Analytics Strengthens Protection with ArcSight

The Hillstone and Trend Micro Joint Solution

The webinar will begin shortly

Q1 Labs Corporate Overview

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2

Bridging the gap between COTS tool alerting and raw data analysis

Next Generation Enterprise Network Security Platform

What s New in Security Analytics Be the Hunter.. Not the Hunted

SourceFireNext-Generation IPS

AccelOps NOC and SOC Analytics in a Single Pane of Glass Date: March 2016 Author: Tony Palmer, Senior ESG Lab Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Is your SIEM ready.???

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Security Operation Centre 5th generation

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Detect & Investigate Threats. OVERVIEW

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Решения HP по информационной безопасности

APPLICATION PROGRAMMING INTERFACE

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

ENABLING FAST RESPONSES THREAT MONITORING

QRadar Security Management Appliances

FROM PRODUCT TO PLATFORM

RSA Security Analytics

A HELPING HAND TO PROTECT YOUR REPUTATION

Find the needle in the security haystack

QRadar Security Intelligence Platform Appliances

Discover & Investigate Advanced Threats. OVERVIEW

SIEM Orchestration. How McAfee Enterprise Security Manager can drive action, automate remediation, and increase situational awareness

How To Build Security By Silo

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Combating a new generation of cybercriminal with in-depth security monitoring

The Purview Solution Integration With Splunk

Enabling Security Operations with RSA envision. August, 2009

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Extreme Networks: A SOLUTION WHITE PAPER

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

Security strategies to stay off the Børsen front page

The SIEM Evaluator s Guide

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

Agenda , Palo Alto Networks. Confidential and Proprietary.

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

From the Bottom to the Top: The Evolution of Application Monitoring

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

High End Information Security Services

The Need for Intelligent Network Security: Adapting IPS for today s Threats

QRadar SIEM and FireEye MPS Integration

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Hillstone Intelligent Next Generation Firewall

Find the intruders using correlation and context Ofer Shezaf

Secure Cloud-Ready Data Centers Juniper Networks

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Changing the Enterprise Security Landscape

Brian Albrecht, MIS, CISSP Senior Knowledge Engineer LogRhythm, Inc.

Caretower s SIEM Managed Security Services

Introducing IBM s Advanced Threat Protection Platform

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

What is Security Intelligence?

Bio-inspired cyber security for your enterprise

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

HP ESP 2013 Solution Roadmap

SIEM is only as good as the data it consumes

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Dealing with Big Data in Cyber Intelligence

Meeting PCI Data Security Standards with

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Comprehensive Advanced Threat Defense

Protecting the un-protectable Addressing Virtualisation Security Challenges

Transcription:

VISIBLY BETTER RISK AND SECURITY MANAGEMENT Mason Hooper Practice Manager, SIEM Solutions, McAfee APAC December 13, 2012

Oct 17 10:00:27, Application=smtp, Oct 17 10:00:27, Application=smtp, Event='Email Status', Event='Email Status', From=billf1223@gmail.com, size=25140, From=billf1223@gmail.com, size=25140, source=(66.55.23.4), reputation=49, source=(66.55.23.4), reputation=49, tls=1tls=1 10/17/2011 10:00:27, TRAFFIC, end, 66.55.23.4, 192.168.46.15, Monitor 10/17/2011 10:00:27, TRAFFIC, end, 66.55.23.4, 192.168.46.15, Monitor SPAN Port, Tap Zone, ethernet1/12, SPAN Port, Tap Zone, ethernet1/12, 83752, 83752, 1, 59404, 25,25,tcp, allow, 1, 59404, tcp, allow, anyany 10/17/2011 10:02:52 10:02:52 PM,PM, Deleted 10/17/2011 Deleted (detection isn't cleanable), (detection isn't cleanable), W7MANG\host35 C:\Program W7MANG\host35 C:\Program Files\VMware\Infrastructure\Virtual Infrastructure Client\4.1\vmwareFiles\VMware\Infrastructure\Virtua vmrc.exe, Infrastructure Client\4.1\vmwareC:\Users\brogers\Desktop\455_23_setu vmrc.exe, p.exe Generic.dx!bbfq C:\Users\brogers\Desktop\455_23_se up.exe Generic.dx!bbfq Oct Oct 17 17 10:00:26, Src66.55.23.4, 66.55.23.4, 10:00:26, Src s_port 4523, dst 192.168.46.15, s_port 4523, dst 192.168.46.15, service smtp, proto tcp, xlatesrc service smtp, proto tcp, xlatesrc RESPOND

The State of SIEM SIEM Promise: Turns Security Data Into Actionable Information Provides an Intelligent Investigation Platform Supports Management and Demonstration of Compliance Legacy SIEM REALITY: 00001001001111 11010101110101 10001010010100 00101011101101 VS Antiquated Architectures Force Choices Between Speed and Intelligence Events Alone Do Not Provide Enough Context to Combat Today s Threats Complex Usability and Implementation Have Caused Costs To Skyrocket 3 December 13, 2012

History of SIEM Originally designed to correlate events from IDS and Firewalls Authentication and IAM VA Scan Data Events from Security Devices and Endpoints Network Flows Time User Identity + Device and Application Log Files OS Events Location SEM Traditionally RDBMS SIM Traditionally Flat File Based 5 December 13, 2012

Legacy Intelligent and Slow SIEM (COTS DB Based) What are we filtering? Database Queries? Firewall Allows? Infection Indicators User Events? Information access? Filtering 95,000 EPS 8.208 Billion per Day! ESM Appliance Max 5000 EPS Logging Appliance Max 100,000 EPS 6 December 13, 2012

Legacy Fast and Unintelligent SIEM Hybrid Flat File Relational Database Model Traditional Log Manager with Database to provide correlation. Fast at log management and collection Slow reporting over expanded periods Inflexible correlation Basic analysis capability 7 December 13, 2012

The Big Security Data Challenge APTs Cloud Data Insider Anomalies Billions of Events Multi-dimensional Active Trending; Analysis Large Volume Analysis Compliance Historical Reporting Perimeter Thousands of Events Correlate Events Consolidate Logs 8

ESM: Delivering on the Promise Meaningful Intelligence Rapid Response Big Security Data DB Continuous Compliance Exceptional Value 9 December 13, 2012

Gartner 2012 McAfee Enterprise Security Manager is a good choice for organizations that require highperformance analytics under high-event-rate conditions. Customer references have validated very high scalability and query performance levels for the McAfee Enterprise Security Manager event data store. The McAfee Enterprise Security Manager ADM component provides application and data access monitoring from network-based packet inspection, which augments log-based monitoring. 10 December 13, 2012

ESM Fulfills Today s SIEM Needs See log frequencies Search for logs Correlate events What data is involved? Who is doing it? Are they a bad actor? What is the risk of the system? What is the risk of the user? GLOBAL THREAT LANDSCAPE Threat intelligence feed Immediate alerting Historical Analysis Visualize, Investigate, Respond Advanced Correlation Engine ENTERPRISE RISK LANDSCAPE Vulnerabilities Countermeasures Individuals Risk Advisor epolicy Orchestrator Dynamic Content Content Aware Traditional Context Log Management 11 December 13, 2012

ESM Fulfills Today s SIEM Needs See log frequencies Search for logs Correlate events What data is involved? Who is doing it? Are they a bad actor? What is the risk of the system? What is the risk of the user? GLOBAL THREAT LANDSCAPE Threat intelligence feed Immediate alerting Historical Analysis Visualize, Investigate, Respond Advanced Correlation Engine ENTERPRISE RISK LANDSCAPE Vulnerabilities Countermeasures Individuals Risk Advisor epolicy Orchestrator OPTIMIZED Dynamic Content 1.Shut down bad actor 2.Analyze last years events 3.Compliance issue identified 4.Investigate high risk system Content Aware Big Security Data DB Applications Traditional Context Log Management Database High Speed Intelligent Correlation 12 Scalable Architecture

Compliance Based Reporting and Analysis Sorting Through a Sea of Events Have I Been Communicating With Bad Actors? 200M events Which Communication Was Not Blocked? 18,000 alerts and logs What Specific Servers/Endpoints/ Devices Were Breached? Dozens of endpoints Which User Accounts Were Compromised? Handful of users RESPOND What Occurred With Those Accounts? How Should I Respond? Specific files breached (if any) Optimized response 13 December 13, 2012

Compliance Based Reporting and Analysis Integration of NitroView normalization with UCF Provides quick access to compliance based data Allows for filtering based on both UCF normalization and specific compliance frameworks Events NitroView Normalization UCF Normalization Compliance Frameworks 14 December 13, 2012

Single Pane-of-Glass Device and Application Log Files Application Contents Authentication and IAM Events from Security Devices User Identity Database Transactions OS Events VA Scan Data Location

Demo 1 - Identify Slow and Low Data Exfiltration Content-Aware SIEM Feature: Utilize the capability of a Content-Aware SIEM to easily compare current events with weeks, months and even years of data to detect anomalous behavior 19 December 13, 2012

Identify Slow and Low Data Exfiltration Weak Investigate Passwords Policy Top Top Offender Violations Normalized 20 December 13, 2012

Identify Slow and Low Data Exfiltration Associated Interesting Investigate Events Filtered Large File by IP Normalized Transfer 21 December 13, 2012

Identify Slow and Low Data Exfiltration Geo-IP Large File Transfer to China 22 December 13, 2012

Identify Slow and Low Data Exfiltration HTTP POST Pivoting Events and Flows Filter Still Applied Bytes Transferred Advanced Details Large File Session Details Transfer to China Large File Session Details Transfer to China Session Details Misspelled User Agent 23

Identify Slow and Low Data Exfiltration Flows Summary by Total Bytes Pattern: Every Night At 1:00 AM Flows Summary by Total Bytes Bytes Transferred to China 24 December 13, 2012

Situational Awareness and Response Threat Intelligence Real-Time Command & Control High Performance Database SIEM Correlation Engine EVENT LOG AUDIT/COMP. CONTEXT 11 001 100 010011 100 10010001 100110 11 1 100 110100110 10 110 100 1001 100110 100 001111010011 11 100 CONTENT COUNTER MEASURES 58 December 13, 2012

Summary Put us to the test - Talk to your McAfee Account Manager or Reseller Organise a demonstration Read about McAfee ESM in the 2012 Gartner Magic Quadrant http://www.mcafee.com/siemmagicquadrant Visit the McAfee SIEM webpage http://www.mcafee.com/us/products/siem Email: mason_hooper@mcafee.com 59 December 13, 2012