IBM Security QRadar Risk Manager



Similar documents
IBM Security QRadar Risk Manager

Extreme Networks Security Analytics G2 Risk Manager

IBM Security X-Force Threat Intelligence

Strengthen security with intelligent identity and access management

Boosting enterprise security with integrated log management

IBM Security QRadar Vulnerability Manager

IBM QRadar Security Intelligence Platform appliances

Safeguarding the cloud with IBM Dynamic Cloud Security

IBM QRadar Security Intelligence April 2013

IBM Security Intrusion Prevention Solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Simplify security management in the cloud

Leverage security intelligence for retail organizations

Breaking down silos of protection: An integrated approach to managing application security

Applying IBM Security solutions to the NIST Cybersecurity Framework

Managing security risks and vulnerabilities

Reducing the cost and complexity of endpoint management

Risk-based solutions for managing application security

IBM Security Privileged Identity Manager helps prevent insider threats

IBM Security Intelligence Strategy

IBM Security IBM Corporation IBM Corporation

IBM Security QRadar QFlow Collector appliances for security intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM QRadar as a Service

Security Intelligence

Win the race against time to stay ahead of cybercriminals

Security strategies to stay off the Børsen front page

The webinar will begin shortly

FIVE PRACTICAL STEPS

Stay ahead of insiderthreats with predictive,intelligent security

Under the Hood of the IBM Threat Protection System

IBM Security Network Protection

Securing the mobile enterprise with IBM Security solutions

IT executive guide to security intelligence

What is Security Intelligence?

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM Tivoli Netcool network management solutions for enterprise

Securing and protecting the organization s most sensitive data

SANS Top 20 Critical Controls for Effective Cyber Defense

Introducing IBM s Advanced Threat Protection Platform

IBM Security Network Protection

IBM Unstructured Data Identification and Management

Q1 Labs Corporate Overview

IBM Security QRadar SIEM Product Overview

IBM SmartCloud Monitoring

QRadar SIEM 6.3 Datasheet

IBM Endpoint Manager for Mobile Devices

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Gaining the upper hand in today s cyber security battle

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Extreme Networks Security Analytics G2 Vulnerability Manager

Move beyond monitoring to holistic management of application performance

Addressing Security for Hybrid Cloud

IBM Endpoint Manager for Core Protection

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

For healthcare, change is in the air and in the cloud

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

How To Create An Insight Analysis For Cyber Security

How To Buy Nitro Security

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

IBM Software Four steps to a proactive big data security and privacy strategy

IBM Software Cloud service delivery and management

IBM Endpoint Manager for Server Automation

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Taking control of the virtual image lifecycle process

Selecting the right cybercrime-prevention solution

Preemptive security solutions for healthcare

Protecting against cyber threats and security breaches

IBM Advanced Threat Protection Solution

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

How to Choose the Right Security Information and Event Management (SIEM) Solution

Empowering intelligent utility networks with visibility and control

Develop enterprise mobile applications with IBM Rational software

QRadar SIEM and Zscaler Nanolog Streaming Service

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

IBM Tivoli Directory Integrator

Extending security intelligence with big data solutions

IBM Tivoli Federated Identity Manager

QRadar SIEM and FireEye MPS Integration

Automated, centralized management for enterprise servers

Security Intelligence Solutions

1 Introduction Product Description Strengths and Challenges Copyright... 5

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Business-driven governance: Managing policies for data retention

and Security in the Era of Cloud

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Transcription:

IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns with a network topology model, based on security device configurations Quantify and prioritize risk with a policy engine that correlates network topology, asset vulnerabilities and actual network traffic, enabling risk-based remediation and facilitating compliance Centralize network security device management to help reduce configuration errors and simplify monitoring of firewall performance Model threat propagation and simulate network topology changes to help improve security Log management and security information and event management (SIEM) have become trusted solutions for network and security operators, enabling them to quickly detect and isolate security incidents and meet specific compliance requirements, as well as a growing number of regulatory mandates. And while the information provided by SIEM is critical for network and compliance security management efforts, it primarily detects exploits as they occur, rather than prioritizing what actions can be taken to prevent them from happening in the first place. IBM Security QRadar Risk Manager is an integral component of a complete security intelligence solution that can help security professionals stay ahead of advanced threats. The ability to proactively quantify risk from vulnerabilities, configuration errors, anomalous network activity and threats can help organizations prevent exploits that target high-value assets and data. QRadar Risk Manager correlates network topology information with data from IBM Security QRadar SIEM including asset configurations, vulnerabilities, network events and flow patterns. This provides valuable insights revealing, for example, which assets and vulnerabilities are causing the most risk, so IT staff can prioritize their remediation tasks. The IBM solution can also help identify firewall and intrusion prevention system (IPS) misconfigurations that may allow attackers into the network and create inefficiencies in devices. QRadar Risk Manager automates risk management functions in missioncritical areas, helping security professionals safeguard their organizations against an ever-growing spectrum of attacks, vulnerabilities and compliance mandates. On today s smarter planet, organizations require better visibility into their security policies, postures and practices than ever before, because instrumented, interconnected and intelligent businesses collect and use more information.

The QRadar Risk Manager topology viewer enables users to view network devices and relationships, including subnets and links. Automated risk management for greater control Government regulations, industry guidelines and corporate policies can all dictate specific network traffic and firewall policies that an organization must deploy, monitor, audit and enforce. At a high level, the security objectives are normally pretty clear. These plans exist to achieve the desired security state, but the devil is as usual in the details. Many network attacks succeed simply due to inconsistent network and security configuration practices, highlighting the need for automated network configuration monitoring and alerts for policy breaches. Other attacks succeed because unpatched vulnerabilities allow unfettered access to systems. Using traditional log management and SIEM solutions, where data typically exists in separate silos, organizations often lack the ability to easily correlate events and assess when network configurations are allowing traffic that is out of policy. QRadar Risk Manager offers an integrated, policy-based approach that can greatly improve organizations abilities to assess information security risk through a single console shared with QRadar SIEM and IBM Security QRadar Vulnerability Manager. QRadar Risk Manager leverages a broad range of risk indicators, including asset, network and security configuration data; network activity data; network and security events; and vulnerability scan results. It also provides other key capabilities that include: Vulnerability risk assessment Quantification of risk: Helps assess vulnerabilities and asset configurations, based on industry standards and environmental factors, to help prioritize remediation Correlation of known vulnerabilities with network topology: Helps deliver a prioritized list of vulnerabilities to better assess which systems are most vulnerable to attack and should be remediated first Advanced threat modeling, simulation and visualization: Simulates potential spread of threats through the network by leveraging vulnerability, network topology and connection data 2

Network security configuration Detailed configuration audit: Helps improve consistency of firewall rules, including detection of shadowed rules, rule usage and other configuration errors Security-focused network topology model: Enables automated monitoring of configuration rules Configuration change comparison and auditing: Alerts users to risky or out-of-compliance configurations Network activity monitoring Advanced monitoring and analysis of network activity: Quickly flags out-of-policy traffic based on security events and network flow data Fast and efficient search of network activity: Greatly reduces forensics efforts Intuitive visualization tool: Provides interactive analysis of current and historical network activity Network security event and configuration correlation Correlation of firewall accept and deny events with rules: Quantifies rule usage and effectiveness Scheduled or on-demand collection of device configuration data: Provides a historical configuration change record Advanced asset database correlation: Leverages information from a wide variety of network and security events and configuration sources, improving accuracy of results Vulnerabilities represent the various types of weaknesses that can be exploited by a threat. While an analysis of information system vulnerabilities reveals a variety of potential causes, many vulnerabilities can be traced to software flaws and misconfigurations of information system components. 1 Policy monitoring to improve compliance QRadar Risk Manager features an automated policy engine that simplifies the assessment of a wide spectrum of information security and compliance policies. With an intuitive questionbased interface, the policy engine integrates previously siloed risk indicators through regular monitoring of network assets for defined conditions. For example, the solution enables the correlation of asset vulnerability, configuration and network activity, dynamically increasing or decreasing risk scores based on environmental factors, and enabling risk-prioritized remediation. With the policy engine in QRadar Risk Manager, risk scores can be dynamically adjusted based on environmental factors. 3

The Policy Monitor feature allows active evaluation of multiple security policies. QRadar Risk Manager provides out-of-the-box policy templates to assist with identifying risk across regulatory mandates and information security best practices. These templates are easily extended to align with an organization s internal information security policies, and as exceptions are discovered, QRadar Risk Manager can send email, display notifications, generate a syslog event or create an offense within QRadar SIEM. In addition, compliance reports include both policy exceptions and successes. Device configuration management to detect changes and profile future risks QRadar Risk Manager provides automated collection, monitoring and auditing of device configurations across an organization s switches, routers, firewalls and intrusion detection system (IDS)/intrusion prevention system (IPS) devices. Through an ability to normalize cross-vendor device configuration data, QRadar Risk Manager provides detailed comparisons across security devices including firewall rules and policies to quickly identify when network traffic is inconsistent with a regulation, corporate mandate or industry best practice. QRadar Risk Manager maintains a history of configuration changes and enables users to audit this history across the network. This powerful capability allows users to compare normalized or raw device configurations, over time, across a single device or multiple devices through a single user interface. The collection of device configuration data is also instrumental in building an enterprise-wide representation of a network s topology. Topology mapping can help an organization understand allowed and denied application activity across the network, resulting in improved consistency of device configuration. Modeling and simulation of attacks and network configuration changes QRadar Risk Manager helps organizations identify and prioritize their most significant risk areas. Simulations can help organizations understand the risk impact of proposed network configuration changes before they are implemented. For example, simulations can check network connectivity before and after a proposed network configuration change, such as adding a firewall rule to one or more devices. QRadar Risk Manager also offers threat modeling capabilities to simulate the potential spread of an exploit across the network by performing multi-step correlations of at-risk systems with network traffic and topology data. Security teams can select a starting point for the attack, such as the Internet or an untrusted network, and then specify risk criteria, such as known system vulnerabilities or the protocol and port being used for the exploit. QRadar Risk Manager then graphically displays the potential spread of the attack across multiple network tiers. 4

including the ability to search on connections between hosts and networks using specific protocols and applications, as well as analyzing traffic to and from specific countries or geographical regions. This can speed forensic and network traffic analyses. Security intelligence to minimize risk QRadar Risk Manager provides organizations with a comprehensive network security solution that not only enables them to access forensics during and after an attack, but also to proactively detect, prioritize and remediate areas of high risk before they can be exploited. The QRadar Risk Manager attack simulation screen shows the potential spread of an exploit across the network. The powerful security analytics, simulation and visualization of QRadar Risk Manager provide a unique opportunity for organizations to move away from day-to-day security firefighting and to adopt a proactive, risk-based methodology that greatly strengthens network and security offenses while minimizing exploit risk. Advanced tools to investigate network topologies, traffic and forensics QRadar Risk Manager offers two network visualization security tools that provide unique, risk-focused, graphical representations of the network. The end result of both of these visualizations offers network and security teams a revolutionary investigative capacity by providing vulnerability information before, during and after an exploit. The first visualization tool, called the Topology Viewer, delivers detailed network topography views from both a routing and firewall configuration perspective. This insight comes from a unique combination of data sources, including device configuration, network activity data and security events. IT teams can review the entire network or a portion of the network, and they can export views to image or Microsoft Visio formats. The second visualization tool, called the Connection Monitor, quickly and efficiently analyzes historical network activity by automatically summarizing all firewall event and network flow data. Connection Monitor enables advanced traffic searches, Log management and SIEM are necessary for a good network defense. By adding QRadar Risk Manager, organizations gain additional security intelligence enabling them to go on the offensive against those who wish to exploit their assets and networks. Why IBM? IBM operates the world s broadest security research, development and delivery organization. This comprises 10 security operations centers, 10 IBM Research centers, 17 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM solutions empower organizations to reduce their security vulnerabilities and focus more on the success of their strategic initiatives. These products build on the threat intelligence expertise of the IBM X-Force research and development team to provide a preemptive approach to security. As a trusted partner in security, IBM delivers the solutions to keep the entire enterprise infrastructure, including the cloud, protected from the latest security risks. 5

For more information To learn more about IBM Security QRadar Risk Manager, contact your IBM representative or IBM Business Partner, or visit: ibm.com/security Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing Copyright IBM Corporation 2014 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America January 2014 IBM, the IBM logo, ibm.com, QRadar, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml Microsoft is a trademark of Microsoft Corporation in the United States, other countries, or both. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. 1 NIST Special Publication 800-128: Guide for Security-Focused Configuration Management of Information Systems Please Recycle WGD03024-USEN-01