CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security



Similar documents
Find the intruders using correlation and context Ofer Shezaf

Решения HP по информационной безопасности

Changing the Enterprise Security Landscape

Securing your IT infrastructure with SOC/NOC collaboration

Security Operation Centre 5th generation

Protect Your Universe with ArcSight

(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg

The Evolution of Application Monitoring

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

IBM QRadar as a Service

IBM Security Intelligence Strategy

All about Threat Central

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

QRadar SIEM and FireEye MPS Integration

HP Fortify Software Security Center

UNIVERSE. Protect Your. with ArcSight

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

DEMONSTRATING THE ROI FOR SIEM

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Q1 Labs Corporate Overview

Digitization of Enterprise - New Style of IT

Enterprise Security and Risk Management

How To Buy Nitro Security

IBM QRadar Security Intelligence April 2013

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

HP HAVEn: See the big picture in Big Data

The SIEM Evaluator s Guide

Braindumps QA

Splunk: Using Big Data for Cybersecurity

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

QRadar SIEM and Zscaler Nanolog Streaming Service

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

Modular Network Security. Tyler Carter, McAfee Network Security

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

High End Information Security Services

Connected Intelligence and the 21 st Century Digital Enterprise

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Cybersecurity: What CFO s Need to Know

IBM SECURITY QRADAR INCIDENT FORENSICS

HP NonStop Server Security and HP ArcSight SIEM

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

The webinar will begin shortly

Ahead of the threat with Security Intelligence

Increase insight. Reduce risk. Feel confident.

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

SANS Top 20 Critical Controls for Effective Cyber Defense

What is Security Intelligence?

BeyondInsight Version 5.6 New and Updated Features

Vendor Landscape: Security Information & Event Management (SIEM)

Splunk Company Overview

10 Key Steps for a Sustained DDoS Protection Plan. Stephen Gates Chief Technology Evangelist - Corero

Log management & SIEM: QRadar Security Intelligence Platform

IBM Security IBM Corporation IBM Corporation

Mucho Big Data y La Seguridad para cuándo?

Simple, scalable and secure unified wired and wireless networking

How to Choose the Right Security Information and Event Management (SIEM) Solution

Security Information & Event Management (SIEM)

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

State of the Market for Security Information Event Management and Log File Management Solutions

Session 3: IT Infrastructure Security Track ThreatExchange Winning through collaboration. Tomas Sander HP Labs

VMware Integrated Partner Solutions for Networking and Security

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

Don t let your SIeM become your Nightmare!

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

DDoS ATTACKS: MOTIVES, MECHANISMS AND MITIGATION

Discover 2014 Update Big Data changes everything. Roy Ritthaler Vice President, IT Operations Management

Vulnerability Management

HP Security Research Tour 2014 If you want better security, think like a bad guy.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

CASE STUDY. Global Airline Empowers Mobile Workforce for SaaS Apps while Reducing Risk

SourceFireNext-Generation IPS

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

SIEM and IAM Technology Integration

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

IBM Security QRadar Risk Manager

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Bezpečnosť dát v HP Cloude

EnCase Endpoint Security Product Overview

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

From the Bottom to the Top: The Evolution of Application Monitoring

REVOLUTIONIZING ADVANCED THREAT PROTECTION

HP Business Service Management 9.2 and

Combating a new generation of cybercriminal with in-depth security monitoring

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

TECHNOLOGY INTEGRATION GUIDE

How To Make Money On Security For A Large Organization

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

The Sophos Security Heartbeat:

Ecom Infotech. Page 1 of 6

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Transcription:

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

2 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HACKTIVIST INSIDER CYBER CRIMINAL

5 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP Security Research Efforts Worldwide Malware Research HP Security Research (HPSR) Software Security Research Field Intelligence Fortinet 9% MICROSOFT PUBLIC VULNERABILITY ACKNOWLEDGEMENTS 2006-2013 Cisco/ Checkpoint SourceFire 1% 1% Palo McAfee Alto Stonesoft Networks 3% 8% IBM 8% Juniper 0% HP Tipping Point [PERCENT AGE] 6 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Threat Central Partners InQuest Open Source Feeds Threat Central Threat DB Private TC Forum Private Community Sector Community Threat Central Threat Central enables Bi-directional collaboration Actionable and Automated Standards-based open sharing Integrated directly with ArcSight and TippingPoint HP Security Research TC Portal Global Community HP Confidential. This information is not to be shared without the approval from HP. 7 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

8 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

84% of breaches occur at the application layer 9/10 mobile applications are vulnerable to attack 9 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP Application Defender Application Security Simplified Visibility Actionable information through interactive dashboards and alerts HP Application Defender 1,2,3 Simplicity Install quickly and easily with a three-step deployment, get protection up and running in minutes Protection Stop attacks from inside the application. 10 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

11 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

229days average time to detect breach 2014 January February March April May June July August September October November December 2015 January February March April 12 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP ArcSight, act with laser clarity against threats that matter Collect Analyze Prioritize Transform Big Data into actionable security intelligence Real-time correlation of data across devices to find threats Cyber forensics, fix what matters most first 13 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

14 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

16 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP HAVEn helps you monitor the assets that matter HP ArcSight with IDOL People generate data IDOL Machines generate data ESM 17 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

18 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

19 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Mulţumesc! Petr Hněvkovský hnevky@hp.com Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Thank you Petr Hněvkovský hnevky@hp.com Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Key drivers Massive growth of machine data, regulations and transformation SECURITY How will you detect and investigate cybersecurity incidents? COMPLIANCE How will you pass your audits? IT OPERATIONS How will you troubleshoot your network? 22 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Transactional Impact of Use-Cases Transformational HP ArcSight Use Cases We cover the spectrum of use-cases and growth paths for Security Risk Management Advanced SI & OC Security Monitoring & Response Compliance Get me something that lets me check the box and meet requirements. We just got breached and we are in the news. Get someone in here to help me. I need to secure my company in the new world of cloud, mobility and social. I want to start thinking about risk more broadly and how I should be looking at IT risk. Operational Management Stakeholder Involvement C-Level 23 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Data to security intelligence Data Collection See Integration Analytics Understand Monitor & Respond Act A methodical, iterative approach Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP ArcSight Security Intelligence Platform A comprehensive platform for monitoring modern threats and risks, augmented by services expertise and the most advanced security user community, Protect724 Event Correlation Establish complete visibility User Monitoring Fraud Monitoring Data Capture Log Management Controls Monitoring App Monitoring Analyze events in real time to deliver insight Respond quickly to prevent loss Measure security effectiveness across people, process, and technology to improve over time 25 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Benefits Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP ArcSight delivers 4 hours to respond to a breach ArcSight enables forensic investigation and a quick response to a data breach that otherwise would take 24 days 10 minutes to fix an IT incident Full-text searching of any data enables incident resolution that otherwise would take 8 hours 5 minutes to generate IT GRC report ArcSight content generates IT GRC reports that otherwise would take 4 weeks 3 days to run an IT audit Search results yield audit-quality logs that otherwise would take 6 weeks 2 days to fix a threat vulnerability Seamless integration allows faster remediation, that otherwise would take 3 weeks 27 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

With ArcSight Get Control Get Efficient Get Compliant Transform Big Data into actionable intelligence Faster resolution with fewer resources Automate your compliance out-ofthe box 28 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP ArcSight is also loved by critics HP; 23,6% Point solutions, 45% #1 Gartner s magic quadrant in 2013 ranks ArcSight in top quadrant for the 10 th consecutive time IDC 2012 report: HP s revenue is more than that of next two vendors combined in worldwide SIEM market Gartner s critical capability in 2012 ranks ArcSight as #1 in meeting customer s requirement; Ranked #1 in 8 out of 12 categories 29 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.