Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence



Similar documents
IBM QRadar Security Intelligence April 2013

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

IBM Security IBM Corporation IBM Corporation

IBM Security Intelligence Strategy

The webinar will begin shortly

Security strategies to stay off the Børsen front page

IBM SECURITY QRADAR INCIDENT FORENSICS

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

AMPLIFYING SECURITY INTELLIGENCE

Strengthen security with intelligent identity and access management

Under the Hood of the IBM Threat Protection System

Protecting against cyber threats and security breaches

IBM Security QRadar SIEM Product Overview

IBM Advanced Threat Protection Solution

QRadar SIEM and FireEye MPS Integration

Security Intelligence

IBM Security QRadar Risk Manager

QRadar SIEM and Zscaler Nanolog Streaming Service

How to Choose the Right Security Information and Event Management (SIEM) Solution

Security Intelligence Solutions

Introducing IBM s Advanced Threat Protection Platform

Breaking down silos of protection: An integrated approach to managing application security

IBM Security X-Force Threat Intelligence

IBM Security QRadar Risk Manager

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Risk-based solutions for managing application security

What is Security Intelligence?

IBM Security QRadar QFlow Collector appliances for security intelligence

Extending security intelligence with big data solutions

IBM Security QRadar Vulnerability Manager

Safeguarding the cloud with IBM Dynamic Cloud Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

The Current State of Cyber Security

Leverage security intelligence for retail organizations

Addressing Security for Hybrid Cloud

Q1 Labs Corporate Overview

IBM QRadar Security Intelligence Platform appliances

Data Security: Fight Insider Threats & Protect Your Sensitive Data

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Win the race against time to stay ahead of cybercriminals

and Security in the Era of Cloud

Boosting enterprise security with integrated log management

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Let s talk about assets in QRadar

IBM Security Intrusion Prevention Solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

How To Create An Insight Analysis For Cyber Security

Application Security from IBM Karl Snider, Market Segment Manager March 2012

Applying IBM Security solutions to the NIST Cybersecurity Framework

Cloud Security. Vaughan Harper IBM Security Architect

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

IBM Security Framework

QRadar SIEM 7.2 Flows Overview

Powering Security and Easy Authentication in a Multi-Channel World

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Continuous Network Monitoring

Stay ahead of insiderthreats with predictive,intelligent security

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

How To Manage Security On A Networked Computer System

IT executive guide to security intelligence

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

The Benefits of an Integrated Approach to Security in the Cloud

Managing security risks and vulnerabilities

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Extreme Networks Security Analytics G2 Vulnerability Manager

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Combating a new generation of cybercriminal with in-depth security monitoring

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

IBM Security Privileged Identity Manager helps prevent insider threats

End-user Security Analytics Strengthens Protection with ArcSight

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

RSA Security Analytics

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Preemptive security solutions for healthcare

IBM QRadar as a Service

IBM Security re-defines enterprise endpoint protection against advanced malware

Cybersecurity and internal audit. August 15, 2014

Reducing the cost and complexity of endpoint management

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Ecom Infotech. Page 1 of 6

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

IBM Security. Managed Security Services. SOC Poland / GSOC. Damian Staroscic Security Operations Center (SOC) Manager.

Attachment A. Identification of Risks/Cybersecurity Governance

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Transcription:

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation

Securing Information Resources is a Multi-Dimensional Puzzle People Employees Hackers Outsourcers Suppliers Consultants Terrorists Customers Data Structured Unstructured At rest In In motion Applications Systems applications Applications Web Applications Web 2.0 Mobile Applications Mobile apps Infrastructure It is no longer possible to define and protect the perimeter, but demands a focus on protecting data. Point products are not sufficient to protect the enterprise. JK 2012-04-26 2

Getting Intimate with Your Computing Environment How well do you know: Applications? Owners? Activity patterns? Where sensitive data resides? Network activity patterns? 3

Why Take the Red Pill? What s normal? what s suspect? 4

How to Get There: Security Intelligence Users & Identities Security Devices Servers & Hosts Network & Virtual Activity Vulnerability Info Application Activity Database Activity Event Correlation Logs IP Reputation Flows Geo Location Activity Baselining & Anomaly Detection User Activity Database Activity Application Activity Network Activity Offense Identification Credibility Severity Relevance Configuration Info Suspected Incidents Extensive Data Sources Deep + Intelligence = Exceptionally Accurate and Actionable Insight 5

What is Security Intelligence? Security Intelligence --noun collection normalization analytics 1.the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the IT security and risk posture of an enterprise Security Intelligence provides actionable and comprehensive insight for managing risks and threats from protection and detection through remediation 6

Activity and Data Access Monitoring Visualize Data Risks Automated charting and reporting on potential attacks Correlate System, Application, & Network Activity Enrich security alerts with anomaly detection and flow analysis Detect suspicious activity before it leads to a breach 360-degree visibility helps distinguish true breaches from benign activity, in real time 7

Top Events by Log Type and Count 8

Top Flows by Application and Total Bytes 9

and Bottom Flows 10

Data Leakage Who is responsible for the data leak? Alert on data patterns, such as credit card number, in real time. 11

Passively Discover & Profile Assets with NetFlow & QFlow 12

Enrich the Asset Database with VA Scans, Manually, CMDB Import 13

Update Rules Automatically 14

Customize Your Network Landscape for Contextual Visibility Customize Segment & System Names for Quick Identification 15

Pivot by Geography 16

Dashboards & Reporting, Customized per Role 17

User Activity Monitoring to Combat Advanced Persistent Threats User & Application Activity Monitoring alerts on a user anomaly for Oracle database access. Identify the user, normal access behavior, and the anomaly behavior with all source & destination information to quickly resolve the threat. 18

Baselining Complex Patterns Complex patterns can be baselined Anomalies take into account historical data continuously May incorporate seasonality 19

Configuration & Risk Network topology and open paths of attack add context Rules can take exposure into account to: Prioritize offenses and remediation Enforce policies Play out what-if scenarios 20

Security Intelligence Timeline Prediction & Prevention Risk Management. Vulnerability Management. Configuration Monitoring. Patch Management. X-Force Research and Threat Intelligence. Compliance Management. Reporting and Scorecards. Reaction & Remediation SIEM. Log Management. Incident Response. Network and Host Intrusion Prevention. Network Anomaly Detection. Packet Forensics. Database Activity Monitoring. Data Loss Prevention. 21

Security Intelligence Wrap-Up Monitor all activity and correlate in real time Reduce cost & complexity, lower TCO, compliance Detect policy violations Baseline against reality (CMDB) Social media, P2P, etc. Detect suspicious behavior Privileged actions from a contractor s workstation DNS communications with external system Detect APTs File accesses out of the norm behavior anomaly detection Least used applications or external systems; occasional traffic Detect fraud Baseline credit pulls or trading volumes, and detect anomalies Correlate ebanking PIN change with large money transfers Forensic evidence for prosecution Impact analysis Change & configuration management 22

IBM s Security Intelligence, Analytics and Big Data portfolio 4 IBM SPSS unified product family to help capture, predict, discover trends, and automatically deliver high-volume, optimized decisions 3 IBM i2 Analyst Notebook helps analysts investigate fraud by discovering patterns and trends across volumes of data 1 IBM QRadar Security Intelligence unified architecture for collecting, storing, analyzing and querying log, threat, vulnerability and risk related data 2 IBM Big Data Platform (Streams, Big Insights, Netezza) addresses the speed and flexibility required for customized data exploration, discovery and unstructured analysis 23

View the Study Here: http://ibm.co/se6ieo Thank You! 24

ibm.com/security Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will 25 necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT 2012 IBM Corporation THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.