Security Analytics in Big Data Alexandre F Moraes, CISSP



Similar documents
HP Converged Cloud Speaker s name / Month day, 2012

Od virtualizácie až po Cloud Build and manage infrastructure services with HP

ICT and Internet of Things (IoT) as focal point in the transforming energy markets. Pim de Groot Director Utilities 8 march2016

Kieran Towey October2013. Big Data, Data Analytics & GI

HP Software - Big Data Challenges February 2015

The changing world HP Today of Technology

Mice, Elephants, Turtles Dimes & Dollars HPC & Big Data Marc Hamilton Hyperscale Business Unit HP Enterprise Group March, 2013

A Proposal for a MySQL Cloud Database Integrating OpenStack Technology Sandro Mazziotta / April 12, 2012

Software EMEA Performance Tour London, UK 2 July

Big Data is the future of ITSM tools

Nowy Styl IT. Ponieważ Klienci nigdy nie czekają Piotr Zacharek/ 26 wrzesień, 2014

Intelligent Archiving

Cloud computing (and Wireless Communication) Flattening the World of ICT for All!

Master your cloud from planning to delivery: HP Converged Cloud Services

(S4.2) Software Defined Networking (SDN) in action and why SDN becomes the key to managing networks by Johannesburg

Making Wearables and Sensors Work in the Enterprise

OUTSOURCERY PLC CAPITAL MARKETS DAY

Solving Big Data Issues with Big Data Based Solutions

Copyright 2012 Vivit Worldwide. Embracing Cloud with HPSW: HP Cloud Service Automation

Transforming the Server Industry Project Moonshot

HP Software Big Data overview

Business white paper. Big security for big data

How can we help you become the Most Interesting Man in the Datacenter

Ausblicke The New Style of IT. Ausblicke in die Zukunft. IT-Services Menükarte für Ruf Kunden. Verwaltungsprozesse mit IT unterstützen.

HP Converged Storage. Storage for the next era of IT. Marian Galik HP Storage Pre-Sales Consultant

Cloud Workshop. Seminario Universita Tor Vergata. Rome Jan 30, 2015

The Ultimate HP Storage Overview for Insight

Big Data Analytics: Today's Gold Rush November 20, 2013

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Discover 2014 Update Big Data changes everything. Roy Ritthaler Vice President, IT Operations Management

HP Vertica at MIT Sloan Sports Analytics Conference March 1, 2013 Will Cairns, Senior Data Scientist, HP Vertica

HP Converged Systems Update. Tom Joyce Senior Vice President, Converged Systems August, 2013

Digitization of Enterprise - New Style of IT

CLOUD ADOPTION & RISK IN FINANCIAL SERVICES REPORT

Doing Multidisciplinary Research in Data Science

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing

How To Make Sense Of Data With Altilia

CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science

HP HAVEn: See the big picture in Big Data

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Now, Next and the Future: IT, Big Data and other Implications for RIM. Presented by Michael S. Smith /

CLOUD ADOPTION & RISK IN GOVERMENT REPORT

Big Data ça change tout. Colin Mahony SVP & GM, HP Software Big Data

CLOUD ADOPTION & RISK IN EUROPE REPORT. Q Published Q3 2015

AGENDA. What is BIG DATA? What is Hadoop? Why Microsoft? The Microsoft BIG DATA story. Our BIG DATA Roadmap. Hadoop PDW

BI in the Cloud Sky is the limit

Changing the Enterprise Security Landscape

Innovation Session. BIG DATA Jeff Veis. Vice President, Marketing Protect Solutions HP Autonomy. HP EMEA Software Performance Tour 2014

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Quick guide: Using the Cloud to support your business

Find the intruders using correlation and context Ofer Shezaf

End-user Security Analytics Strengthens Protection with ArcSight

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 02 Issue: 05 Aug p-issn:

HP Big Data & Analytics for CSPs and Customers. Fouad Bendris / Big Data Lead Enterprise Group PreSales & Strategic Pursuits - EMEA

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Big Data: What You Should Know. Mark Child Research Manager - Software IDC CEMA

Building HTML5 and hybrid mobile apps using cloud services. Andrei Glazunov

HP and the Intelligent Service Desk (SPM Product Updates) March 6, 2014

Cloud Adoption & Risk Report Q3 2013

CIS 4930/6930 Spring 2014 Introduction to Data Science Data Intensive Computing. University of Florida, CISE Department Prof.

Cloud Computing for Health Yes or no? 2 August 2012 Sandy Aitken

From the Bottom to the Top: The Evolution of Application Monitoring

U.S. IT Buyer Survey Shows Outsourcers Bring Strength to Cloud

Решения HP по информационной безопасности

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

Il mondo dei DB Cambia : Tecnologie e opportunita`

Building Out Your Cloud-Ready Solutions. Clark D. Richey, Jr., Principal Technologist, DoD

Connected Intelligence and the 21 st Century Digital Enterprise

WHAT IS BIG DATA? David Bechtold

Gain Meaning from the Mess: Consume and understand unstructured data with HP Autonomy

USE OF CLOUD COMPUTING BY SMALL AND MEDIUM ENTERPRISES

CLOUD ADOPTION & RISK IN HEALTHCARE REPORT

CLOUD COMPUTING OVERVIEW

TRANSITION TO THE CLOUD

Big Data Buzzwords From A to Z. By Rick Whiting, CRN 4:00 PM ET Wed. Nov. 28, 2012

HP Helion Cloud. 鄭 凱 元, Jim Cheng 惠 普 科 技, 雲 端 事 業 處

What happens when Big Data and Master Data come together?

Bezpečnosť dát v HP Cloude

Leveraging the Cloud for Your Business

Outlook for Cloud technology in Big Data and Mobility

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

August Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

Enterprise Resource Planning (ERP) 2014 Trends

Security Operation Centre 5th generation

Global Cloud Based Digital Asset Management Market

ITP 140 Mobile Technologies. Mobile Topics

Driving Better Marketing Results with Big Data and Analytics David Corrigan, IBM, Director of Product Marketing

Component 4: Introduction to Information and Computer Science. Topic III: Cloud Computing. Distributed computing

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

However, there has still been one serious limitation until now.

CLOUD ADOPTION & RISK REPORT

Cloud Computing Now and the Future Development of the IaaS

Mind Commerce. Commerce Publishing v3122/ Publisher Sample

Oracle Middleware as Cloud Foundation. Filip Huysmans Contribute Group

World Cloud Computing Market

Transcription:

Security Analytics in Big Data Alexandre F Moraes, CISSP Solutions Architect Manager Latin America HP Enterprise Security afmoraes@hp.com 1 Copyright Copyright 2013 2013 Hewlett-Packard Development Company, Company, L.P. L.P. The information The information contained contained herein herein is subject is subject to change to change without without notice. notice.

HP Enterprise Collect Consolidate Correlate Security SaaS Hybrid Cloud Finance PaaS APP IaaS Public Cloud Division A Division A Private Cloud Division B - Vulnerability Awareness - Vulnerability Scanning - Source Code Analysis - Software Security Assurance - Proactive Defense - Flexible Security-Zone Segmentation - Well-Known- and Zero-Day-Exploit Protection - Adaptive Network Defense - Visibility - Security-Information and Event Management System - Event Correlation - Context-Visibility 2

New! NGFW 1 3 5 7 CONSOLE 115200 N, 8, 1 10#0F STATUS CFast Card 2 4 6 HA 8 MGMT RESET ALERT POWER 12 80##F 1 3 5 7 9 11 13 15 17 19 12 CONSOLE 115200 N, 8, 1 STATUS 2 4 6 8 10 12 14 16 18 20 CFast Card HA 1 HA 2 MGMT ALERT 3 S1050F 500Mbps / 250Mbps (FW+AppID / FW+IPS) S3010F 1Gbps / 500Mbps (FW+AppID / FW+IPS) S8005F 5Gbps / 2.5Gbps (FW+AppID / FW+IPS) S8010F 10Gbps / 5Gbps (FW+AppID / FW+IPS) S3020F 2Gbps / 1Gbps (FW+AppID / FW+IPS) S8020F 20Gbps / 10 Gbps (FW+AppID / FW+IPS)

Accelerating innovation & time to value Burroughs IBM NEC Unisys Hitachi Product Configurator Mainframe Kilobytes Fijitsu Bull Claim Processing Payroll Sales tracking & Marketing Commissions Bills of Material SCM Costing ERP Database Manufacturing Projects CRM Quality Control HCM SAP Engineering HP MRM Inventory EMC Cost Management Cash Management Time and Expense Accounts Receivable Billing Activity Management Training Time & Attendance Data Warehousing Service Order Entry Joyent Client/Server Megabytes Rostering HCM Fixed Assets PLM Intacct DCC Saba CCC IntraLinks Adobe Microsoft Cornerstone ondemand Softscape Plex Systems ebay Quickbooks NetSuite OpSource Hosting.com Tata Communications Datapipe PPM NetDocuments Microsoft Corel Saba Softscape Volusion Google Ariba Alterian ADP VirtualEdge Kenexa OpenText Workscape Yahoo Quadrem Xerox SugarCRM FinancialForce.com Avid NetReach Zoho Serif Yahoo! CyberShift Sage Sonar6 Hyland Music Qvidian kaggle SuperCam SLI Systems Elemica SCM Kinaxis Xactly CyberShift SmugMug ihandy The Internet Gigabytes NetSuite Exact Online PaperHost Sonar6 Facebook Fring Rackspace SolidFire Snapfish GoGrid Atlassian Paint.NET Amazon DocuSign Dragon Diction buzzd Cookie Doodle Ah! Fasion Girl Hootsuite Renren Education Flickr UPS Mobile salesforce.com Bromium Scanner Pro Foursquare nebula Zynga ischedule Pandora Khan Academy BrainPOP MobileFrame.com myhomework Toggl Xing MailChimp Amazon Web Services LimeLight News LinkedIn Workday Navigation SuccessFactors Associatedcontent MobilieIron Twitter AppFog PingMe cloudability CloudSigma HP eprint RightScale Fed Ex Mobile SmugMug YouTube Business Amazon Utilities Scribd. Zillabyte Reference Games Productivity TripIt Twitter Atlassian Baidu Atlassian Tumblr. New Relic Urban Parse Yandex Finance Workbrain Yandex Mozy Zynga Entertainment Jive Software Qzone Travel box.net Mixi Heroku CYworld BeyondCore Taleo Lifestyle Splunk ScaleXtreme Pinterest Sport Mobile, Social, Big Data & The Cloud Zettabytes Photo & Video Yammer Answers.com Viber Social Networking dotcloud PingMe Every 60 seconds 98,000+ tweets 695,000 status updates 11million instant messages 698,445 Google searches 168 million+ emails sent 1,820TB of data created 217 new mobile web users Yottabytes 4

Big Data Walmart : 1 Million of Transactions per Hour: 2.56 Terabytes / day Facebook: 50 Billions of pictures in the database 50 % of the data is non structured: video, images, audio... 5

Big Data landscape Annual Growth ~100% Machine Data 90% of Information Human Information ~10% Business Data 10% of Information

Business challenge Opportunities lost Competitive advantage in the digital universe in 2012 Massive amounts of useful data are getting lost % of data that would be potentially useful IF tagged and analyzed 23% 3% % actually being tagged for Big Data Value (will grow to 33% by 2020) ¹Source: IDC The Digital Universe in 2020, December 2012 0.5% % of the Digital Universe that actually is being tagged and analyzed

Technology challenge Legacy techniques have fallen short. Stale technologies Talent shortage 86% of corporations cannot deliver the right information, at the right time to support enterprise outcomes all of the time³ ³Source: Coleman Parkes Survey Nov 2012 IT frustration Lack of insight

HAVEn the #1 Big Data platform HAVEn Hadoop / HDFS Scale Autonom y IDOL Source Vertic a Speed Enterpris e Security Secure n Apps Powering HP Software + your apps Transactional Social media Video Audio Email Texts Mobile data Documents IT/OT Search engine Images hp.com/haven

Proactive Protection - Security Analytics Turning events & logs into actionable intelligence Powered by HP HAVEn Harness the power of ArcSight SIEM and Vertica Analytics Reduce false positives Minimize impact of security breach Transform security from defense to proactive protection Hadoop Autonomy Vertica Enterprise Security n-apps 10

Business Weather Org structure TX data Threat feeds Security Log s App2 App 3 App1 Vertica ArcSight ESM 11 Intelligence Events + context + analytics

ArcSight Security Alert Spikes in logins: Johnp 12

13

Invoke Vertica with event context Right click Integration command 14

Login by Site 10000 8000 6000 4000 2000 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Login by Role 10000 8000 6000 4000 2000 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 15

Proactive Protection - Security Analytics Detecting Information Leakage Powered by HP HAVEn Harness the power of ArcSight SIEM and Autonomy IDOL Distill meaning and make decisions based on it, not just match keywords or tags judge events based on their context Hadoop Autonomy Vertica Enterprise Security n-apps 16

Sample Usecase: Detecting Information Leakage 1 3 IDOL ESM 5 2 1. Data access (file, email) 2. Event sent to ESM 3. Query sent to IDOL 4. Context sent to ESM 5. Rules fired 4 17

Sample Usecase: Information at Risk 1 3 IDOL ESM 5 2 1. Attack target 2. Events sent to ESM 3. Query sent to IDOL 4. Context sent to ESM 5. See next slide 4 18

Sample Usecase: Data under Attack (cont ) Information Store Information Store Information @ Risk Patents 19

Sample Usecase: Threat Monitoring through Sentiment Analysis Intelligence has a long history of providing pivotal information to decisionmakers Monitoring the spiraling amount of user generated content on the internet (social media) and analyze it for sentiment 20

Sample Usecase: Threat Monitoring through Sentiment Analysis 21

hp.com/haven Develop Operate Monetize HAVEn Secure Govern 22