with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief



Similar documents
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

Enabling Security Operations with RSA envision. August, 2009

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

White paper. Creating an Effective Security Operations Function

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

SANS Top 20 Critical Controls for Effective Cyber Defense

How To Manage Security On A Networked Computer System

IBM QRadar Security Intelligence April 2013

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

White paper. Four Best Practices for Secure Web Access

White paper. Security Check: 7 Things to Consider When Evaluating Vendor Solutions for SIEM

IBM Security Intelligence Strategy

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Vulnerability Management

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

How To Buy Nitro Security

Securing SharePoint 101. Rob Rachwald Imperva

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

How to Secure Your SharePoint Deployment

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

What is Security Intelligence?

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Symantec Control Compliance Suite. Overview

Payment Card Industry Data Security Standard

RSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief

The SIEM Evaluator s Guide

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Detect & Investigate Threats. OVERVIEW

Security management solutions White paper. Extend business reach with a robust security infrastructure.

8 Key Requirements of an IT Governance, Risk and Compliance Solution

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM Security IBM Corporation IBM Corporation

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy

Metrics that Matter Security Risk Analytics

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Q1 Labs Corporate Overview

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

What s New in Security Analytics Be the Hunter.. Not the Hunted

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond

Implement a unified approach to service quality management.

QRadar SIEM and FireEye MPS Integration

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Total Protection for Compliance: Unified IT Policy Auditing

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Discover & Investigate Advanced Threats. OVERVIEW

How To Manage Log Management

Strengthen security with intelligent identity and access management

North American Electric Reliability Corporation (NERC) Cyber Security Standard

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

ALERT LOGIC FOR HIPAA COMPLIANCE

Breaking down silos of protection: An integrated approach to managing application security

The Cloud App Visibility Blindspot

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

RSA Solution Brief. Platform. The RSA envision. A Single, Integrated 3-in-1 Log Management Solution. RSA Solution Brief

QRadar SIEM and Zscaler Nanolog Streaming Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

White Paper: Consensus Audit Guidelines and Symantec RAS

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Scalability in Log Management

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

SecureVue Product Brochure

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

RSA Identity Management & Governance (Aveksa)

Securing and protecting the organization s most sensitive data

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

REVOLUTIONIZING ADVANCED THREAT PROTECTION

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

I D C A N A L Y S T C O N N E C T I O N

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Security QRadar Risk Manager

Best Practices for Building a Security Operations Center

RSA SECURITY MANAGEMENT. An Integrated approach to risk, operations and incident management. Solution Brief

Endpoint Security for DeltaV Systems

How To Secure Your System From Cyber Attacks

Data Loss Prevention Best Practices for Healthcare

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Unified Security, ATP and more

Transcription:

RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1

Who is asking for this? A Brief on the Security Operations Center user The job of Security Operations team, whether in a large organization with dedicated staff and resources, or in a small company with one person assuming multiple responsibilities, is to keep information assets secure by continuously monitoring the organization s IT environment, anticipating and responding to immediate threats and long term vulnerabilities and providing advice and guidance on security matters to both senior management and business units. To be effective, security operations professionals must draw on tools that, day in and day out, turn a myriad of real-time events into actionable data. They need an efficient closed-loop process for handling incidents and mitigating risk. They also need the visibility necessary to assess the effectiveness of security policies, processes and resources and the controls necessary to fine-tune them. Drivers for Information Discovery There is a growing shift in IT from perimeter-focused security measures to information-centric security. Information is the backbone of business and in an uncertain economy it is more important than ever to focus management efforts on securing this information. This is even more apparent when viewed in contrast with traditional perimeter security measures that have become ineffective and increasingly expensive to scale with the universal expansion of information across an enterprise. One of the key problems that security operations professionals face is the gap between business operations use of information technology and corporate security policy. This gap and the resulting organizational barriers often make traditional security measures hard to implement. As a result, security operations professionals are increasingly turning to tools such as Data Loss Prevention (DLP) to identify critical information within the enterprise and Security Information and Events Management (SIEM) solutions to provide much-needed information risk discovery and management.- 2 RSA Solution Brief

What is the RSA envision platform? The RSA envision platform collects, analyzes, correlates and alerts based on log data from all event sources across the network and IT infrastructure. It also intelligently combines real-time threat, vulnerability, IT asset and environmental data. This helps organizations to respond quickly and thoroughly to high-risk security issues and to pinpoint the places where problems are likely to appear. By automating manual processes and increasing productivity, the RSA envision platform delivers increased security while reducing cost. With over 1600 production customers world-wide across every industry, including 5 of the Fortune 10 and 40% of top global banks, the RSA envision platform: Provides real-time, actionable security information for quick and accurate threat detection and alerting by combining event data, asset and vulnerability information. Utilizing intelligent correlation capabilities, security professionals can prioritize and focus on the issues that support the business needs. Improves analyst productivity by streamlining the incident handling process by providing access to real, empirical data and offering a built-in workflow from initial identification and prioritization of an incident to investigation with contextual information, escalation, resolution, closure and archiving. Security professionals can efficiently and effectively accelerate problem resolution. Increases the effectiveness of security measures and resources by giving security professionals visibility into their enterprise, the status of an incident, the vulnerability and risk of high-priority assets and the use of security resources. Through comprehensive reporting and easy to use dashboards, security organizations can focus staff on high-risk issues and adapt and adjust policies, procedures and investments in order to mitigate risk. Simplifying Compliance Enhancing Security Optimizing IT & Network Operations Compliance reports for regulations and internal policy Real-time security alerting and analysis IT monitoring across the infrastructure Reporting Auditing Forensics Alert / correlation Network baseline Visibility Purpose-built database (IPDB) RSA envision Log Management platform Security devices Network devices Applications / databases RSA envision Information Management Platform for Network, Compliance & Security Operations Servers Storage RSA Solution Brief 3

What is RSA Data Loss Prevention? The RSA Data Loss Prevention (DLP) Suite is an integrated suite of data security products that provides a proactive approach to managing your business risk associated with the loss of sensitive data. Together, the RSA DLP Datacenter, Network and Endpoint modules, which comprise the DLP Suite, create a comprehensive data loss prevention solution that: Discovers and protects sensitive data in the data center, on the network and on the end points while leveraging common policies across the infrastructure. DLP helps locate sensitive data no matter where it resides, including file systems, databases, e-mail systems, large SAN/NAS environments, and end points. Mitigates risk through identity aware policy based remediation and enforcement. RSA DLP leverages Active Directory Groups on the network and at the end point. Integration with Microsoft Rights Management Service (RMS) provides groupspecific controls and enables protection beyond the company s boundaries. Reduces total cost of ownership with industryleading scalability, incident handling and workflow, and a comprehensive policy library. A dedicated information classification and policy research team provides finely-tuned policies, content types and classification modules, resulting in very high accuracy ratings. The result is less time required to set up and tune policies and faster value delivery from the DLP system. RSA DLP scales across the enterprise and offers great flexibility, including optional temporary agents and grid scanning. The lowest possible TCO is achieved by leveraging existing customer hardware for DLP and requiring fewer hours for set-up and ongoing maintenance. Combined Data Loss Prevention and envision Deployment Scenario In order to initially detect and audit sensitive data, the customer first configures policies and content detection modules in RSA DLP. The Enterprise Manager module receives events from the DLP components whenever a policy violation is detected. As events are generated, the Enterprise Manager forwards the relevant event and user information to the envision platform. The customer uses the envision platform to collect, correlate, analyze and alert on this information in combination with asset and user information from other sources. The feedback from that analysis is used to fine-tune DLP policies to ensure sensitive data is stored and used appropriately. DLP Datacenter DLP Network DLP Endpoint RSA Data Loss Prevention Suite Dashboard Incidents Reports Policies Admin Enterprise Manager The RSA DLP Suite gives you insight into the risk status and trends of sensitive data in your enterprise based on policies regardless of whether the data resides in a data center, on a network or out at the endpoints. 4 RSA Solution Brief

DLP Network DLP Datacenter Enterprise Manager RSA envision platform DLP Endpoint RSA Data Loss Prevention Combined deployment applies the powerful analysis and correlation features of the RSA envision platform to the content-aware information discovery provided by RSA Data Loss Prevention. The integration brings envision log parsing and reporting to all DLP events, which are forwarded to envision via syslog by the DLP Enterprise Manager. Beginning with RSA envision 4.0 and RSA Data Loss Prevention 7.0, this capability is offered out-of-the-box, with no complex setup required in either product. This feature will be offered to all RSA envision platform customers via the monthly content update package. Use Cases Use Case: Security Incident Impact Classification A security operations center (SOC) professional has to monitor and respond to many different types of security incidents such as malware attacks, vulnerability exploits and access spoofing. Via an integrated envision and DLP solution, efficient correlation of security and DLP event logs can help the analyst quickly determine the severity and impact of a potentially urgent incident. By providing insight into the type and sensitivity of information involved in the incident, DLP can help the SOC analyst decide when and how to remediate it and assess what damage has been done. Use Case: Watchlisting The SOC user may receive an alert from the envision platform that indicates suspicious user activity but does not in itself represent a security breach. In this case, the analyst may want to correlate the suspicious activity with all of the other activity by the same user. Using the RSA envision platform with event input from DLP, the SOC user can quickly gather all of that user s information and find a pattern of actions that, when taken as a whole, could represent a much more severe incident than the original alert. For instance, a user sending a financial spreadsheet to a personal e-mail account may generate an alert, but it may become much more serious if the analyst discovers that same user has also been copying numerous other sensitive documents to a personal thumb drive. Use Case: Data Movement Forensics As the SOC analyst uses the event data from DLP to make real-time decisions about security breaches, the forensic analyst uses the same data to strengthen an internal investigation. Incorporating DLP events into the envision platform allows an analyst to look beyond what data repositories a user had access to. The analyst can now see exactly what types of data the user could access, how sensitive that data was, and what actions the user took or attempted with that information. Whereas previously the analyst could only determine that a user under investigation had access to a given SharePoint site, he can now prove that the SharePoint site contained a sensitive customer list that the user then copied to a USB thumb drive and also e-mailed to a competitor all within the same envision interface. This level of detailed information gives the SOC user an unparalleled ability to investigate security incidents. RSA Solution Brief 5

Use Case: Critical Business Information Discovery Discovery of where sensitive data resides and how it is protected is the first step in securing that data. Through the integration between DLP and the envision platform, all information about critical security assets and sensitive corporate data can be stored and analyzed in one place. Now, the envision platform can become the centralized tool for monitoring the vulnerability status of various IT assets and correlating it with the critical business information they contain. There are numerous benefits to creating this centralized information store, ranging from a simplified report generation process the result of a single interface to an improved feedback loop, allowing for precise tuning of existing security measures. A firewall, for instance, may be modified to be more restrictive once the data that it protects is learned to be extremely sensitive. It is the combination of DLP and the envision platform that makes this type of holistic analysis feasible. Use Case: Privileged User Reporting Information and its users change frequently, which requires compliance reporting to be an ongoing pursuit. On its own, the RSA envision platform offers per-user alerting and reporting regarding what data was accessed. With the addition of DLP events into the envision platform, the security specialist can add a new layer of reporting that indicates not only what data was accessed but also what the sensitivity or confidentiality of that data was. The analyst can now generate compliance reports to show what types of data privileged users can access, as well as what data is actually being accessed and which movements of that data are affecting compliance. FEATURE Out-of-the-box integration of RSA Data Loss Prevention with the envision event stream BENEFIT Enrich SOC environment in real time with business sensitivity metrics. Report security violations by user, department, information and infrastructure Discover sensitive data and all related information to enable action on faulty business processes Query user or asset incident by information sensitivity Prioritize and remediate security incidents by information sensitivity Execute data movement forensics including user access activity, data movement, asset & information criticality. 6 RSA Solution Brief

Conclusion The integration of RSA Data Loss Prevention and the RSA envision platform combines the powerful analysis, correlation, and reporting features of the envision platform with the comprehensive information discovery capabilities of RSA DLP. Together, RSA DLP & the RSA envision platform become part of a compelling solution to deliver business-centric information security. By enhancing traditional auditing methods with content-aware information discovery, customers can gain critical insight into where their sensitive data lives and how well it is being protected, allowing them to fine-tune controls and report on access more effectively than ever before. RSA Data Loss Prevention Suite and RSA envision together can identify business risk and report on it in the most efficient way possible. DLP events are natively sent to the RSA envision platform to streamline the process of understanding security risk across information, identities and infrastructure. Policies and classification templates are configured in DLP Security operations team receives the alerts and takes necessary actions to reduce business risk DLP Enterprise Manager receives events when policies are violated and forwards them to the envision platform as they occur The envision platform collects, analyzes, correlates and alerts on events from many sources RSA Solution Brief 7

RSA is your trusted partner RSA, The Security Division of EMC, is the expert in information-centric security, enabling the protection of information throughout its lifecycle. RSA enables customers to cost-effectively secure critical information assets and online identities wherever they live and at every step of the way, and manage security information and events to ease the burden of compliance. RSA offers industry-leading solutions in identity assurance & access control, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit www.rsa.com and www.emc.com. 2009 RSA Security Inc. All Rights Reserved. RSA, RSA Security, envision and the RSA logo are either registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. SharePoint and Microsoft are registered trademarks or trademarks of the Microsoft Corporation in the U.S. and/or other countries. EMC is a registered trademark of EMC Corporation. All other products and services mentioned are trademarks of their respective companies. DLPENV SB 0409