DEMONSTRATING THE ROI FOR SIEM



Similar documents
Demonstrating the ROI for SIEM: Tales from the Trenches

Securing your IT infrastructure with SOC/NOC collaboration

UNIVERSE. Protect Your. with ArcSight

Scalability in Log Management

HP and netforensics Security Information Management solutions. Business blueprint

Protect Your Universe with ArcSight

Boosting enterprise security with integrated log management

HIGH-RISK USER MONITORING

Clavister InSight TM. Protecting Values

Achieving Regulatory Compliance through Security Information Management

High End Information Security Services

Find the intruders using correlation and context Ofer Shezaf

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Log Management Solution for IT Big Data

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

HP Service Manager software. The HP next-generation IT Service Management solution is the industry-leading consolidated IT service desk.

HP Service Manager software

access convergence management performance security

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations

HP Fortify Software Security Center

The Impact of HIPAA and HITECH

Compliance Management, made easy

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

A universal log management solution

ARCSIGHT LOGGER. The Universal Log Management Solution. HP Enterprise Security Business Whitepaper

Security Information Lifecycle

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

The Business Case for Network Security Policy Management Quantifying the Annual Savings with the AlgoSec Security Management Suite

2012 North American Managed Security Service Providers Growth Leadership Award

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Enterprise Security and Risk Management

Business white paper. Top ten reasons to automate your IT processes

Continuous Network Monitoring

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT

NEC Managed Security Services

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

SecureVue Product Brochure

Cisco SAFE: A Security Reference Architecture

HP Change Configuration and Release Management (CCRM) Solution

Caretower s SIEM Managed Security Services

TRIPWIRE NERC SOLUTION SUITE

White paper September Realizing business value with mainframe security management

How To Buy Nitro Security

FIVE PRACTICAL STEPS

Total Protection for Compliance: Unified IT Policy Auditing

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Managed Security Service Providers vs. SIEM Product Solutions

Best Practices for Building a Security Operations Center

Best practices in project and portfolio management

Enterprise Business Service Management

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Fortify. Securing Your Entire Software Portfolio

SIMPLIFIED. HP Software Premier Services Service Brief. The next generation of HP Software Premier Services

How To Manage A Privileged Account Management

Security and Privacy of Electronic Medical Records

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Payment Card Industry Data Security Standard

Cyber Governance Preparing for the Inevitable Perimeter Breach

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Metrics that Matter Security Risk Analytics

Extreme Networks Security Analytics G2 Risk Manager

Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER

Detect & Investigate Threats. OVERVIEW

IBM Security QRadar Risk Manager

Q1 Labs Corporate Overview

What is Security Intelligence?

Master big data to optimize the oil and gas lifecycle

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

QRadar SIEM 6.3 Datasheet

CA Oblicore Guarantee for Managed Service Providers

Extreme Networks Security Analytics G2 Vulnerability Manager

Privileged Identity Management for the HP Ecosystem

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

Self-Service SOX Auditing With S3 Control

How To Manage Log Management

HP NonStop Server Security and HP ArcSight SIEM

PCI Compliance for Cloud Applications

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Actionable Security Intelligence: Preparing for the Next Threat with a Proactive Strategy

Vulnerability. Management

IBM Tivoli Netcool Configuration Manager

Feature. Log Management: A Pragmatic Approach to PCI DSS

Sarbanes-Oxley Compliance for Cloud Applications

Cloud and Data Center Security

AlienVault for Regulatory Compliance

HP Security Solutions for Microsoft

White Paper. Imperva Data Security and Compliance Lifecycle

Manage projects effectively

Transcription:

DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper

Introduction Security professionals sometimes struggle to demonstrate the return on investment for new solutions. Showing clear long-term cost savings or conducting a total cost of ownership (TCO) comparison is a very effective way to show the value of a security investment. Doing so also allows the security team to align with management to make a positive contribution to the business. In this whitepaper, we look at several examples where significant cost savings are demonstrated and the cost of purchase of security information and event management (SIEM) technology has been realized in short periods of time following the SIEM implementation. Calculating ROI for Security Investments Making a business justification for investing in SIEM technology is often the hardest part of the security project. The value of security investments can be realized in the form of soft benefits, such as increased situational awareness, reduced organizational risk, broader security visibility and better brand awareness benefits that are hard to compute. However, hard figures can often be calculated up front and verified over time. The business justification of a SIEM investment can be quantified by looking at cost break-even points, and the costs avoided with the SIEM technology. SIEM technology can help by: Removing inefficiencies through automation Avoiding infrastructure expansion costs Preventing expenditures for compliance penalties Reducing loss through fraud Averting losses due to system outages By taking this approach, the security team is able to demonstrate the monetary value of SIEM investment, and align with business units to build a business case. We will describe several real-world examples of how organizations have seen quick break-even points, reduced their total cost of ownership and realized efficiencies with the help of their SIEM investment. ROI Examples Prevent Personnel Expansion As a company s size and reliance on technology increases, so does the volume of logs it needs to collect, store and analyze. This was the case with a regional health insurance and care provider, who was generating over four terabytes of operating system, database and application log data each quarter. To maintain their security and ensure HIPAA compliance, the company needed a staff of six analysts to manually review the activity logs, and another two to manage the alerts and notifications at a cost of about $1.4 million per year. The requirements and increasing demands placed on these individuals caused a high turnover in the team, adding to the complexity of the situation. To combat the challenges, the healthcare group decided to automate security and compliance monitoring tasks with ArcSight ESM. At the heart of their decision was a TCO analysis over a three-year period. By implementing ArcSight ESM they concluded they would reduce their security and compliance expenditure by about 85% over three years, and their ArcSight ESM investment would be recovered through cost savings in just over three months. Prevent Personnel Expansion Healthcare Insurance and Services Provider Savings of $3.5 million over three years from staff reallocation 3 months, 12 days Better enterprise visibility Faster incident response Less employee turnover Reduce Critical Incident Rate Managed security service providers (MSSPs) have large IT footprints and can generate hundreds of millions, even billions, of events per day. Successful threat mitigation depends on being able to quickly identify the critical events so that they can be handled before they can cause a big impact. In a traditional MSSP monitoring 250 enterprise customers, they had to analyze 3000 incidents per hour. Many of these alerts were prioritized incorrectly, were repeat alerts about already handled events or false positives. As a result, a substantial security team was required to process the alerts. To help them bring the critical event volume under control, the MSSP turned to ArcSight. They used the ArcSight ESM correlation and rule building framework to optimize their security alerts. With the appropriate correlation rules and alerts, ArcSight ESM was able to reduce the number of false positives the MSSP saw and remove the redundant alerts through aggregation. The MSSP was also able to fine-tune the priorities of critical events, allowing security analysts to see the most important items first and provide better service to their customers. The MSSP was able to reduce the critical incident rate to fewer than 200 per hour, a decrease of over 93%. They were also able to repurpose 75% of their security staff to strategic efforts and improved service. With these savings, their ArcSight SIEM platform investment broke even in just over six months. 2

Reduce Critical Incident Rate Managed Security Services Provider (MSSP) Annual savings of $1 million from staff reduction and reallocation 6 months, 20 days Better incident prioritization Focused alert resolution Improved customer service Reduce SOX Compliance Reporting Effort Preparing for audits manually is usually a timeconsuming, resource intensive process. One regional publicly traded utility company estimated that it took them 8,500 man-hours at a cost of roughly $1.5 million to prepare for their SOX audit. They used an external consulting firm teamed with internal staff to test controls, document processes and compile all the results into reports for auditors. The organization conducted a study of the three-year total cost of ownership of SIEM solutions. They selected the ArcSight SIEM platform to automate many of the manual tasks involved with preparing for their SOX audit. The benefits they accomplished with ArcSight ESM were a drastic reduction of costs and labor involved. ArcSight ESM was able to execute all their control testing and reporting with only 900 man-hours of work a reduction of nearly 90% with a total payback period of just 39 days. The organization also experienced soft benefits, gaining better, unprecedented awareness of their compliance status at any given moment. Reduce SOX Compliance Reporting Effort Regional Electric Utilities Company Savings of $4.6 million over three years from elimination of 7,600 work-hours 39 days Fewer compliance violations Proactive compliance program More consistency in controls and processes Extend Useful Life of Legacy Applications Shared accounts often are utilized to access internal systems and data stores, and in some cases, legacy applications. This is a material violation for many compliance mandates, and organizations fail their audits because accounts are shared between individuals. One of the largest Canadian credit unions was faced with a material compliance violation because their financial reporting systems had generic usernames and passwords hard coded into legacy applications. There was no way to identify which individual performed what specific transaction on the financial systems. Faced with the daunting task of rewriting their applications to include individual accountability at a cost of $8 million over a year s time, the credit union solicited help from ArcSight. For a fraction of the cost, ArcSight ESM, coupled with ArcSight IdentityView, allowed the organization to extend the life of their legacy applications by correlating user information with activity logs. ArcSight ESM also enabled real-time alerts when users would access financial systems without authorization. The credit union was not only able to avoid a major application redevelopment expense, but saw their ArcSight ESM investment recouped in just five weeks. Extend Useful Life of Legacy Applications Credit Union Savings of $8 million by deferring software rewrite 3 weeks Audit violations removed Avoided risk of technology replacement Gained visibility into user activity Prevent Internal Resource Abuse Using SIEM solutions, organizations often accomplish other operational benefits and savings that are unrelated to security or compliance. A global telecommunications provider initially implemented ArcSight products to monitor their 4500 seat call center. Call centers generally have lower skilled employees and high turn over rates; add in easy access to customer data and you have a propensity for data theft. While monitoring call center representative behavior, ArcSight discovered an unusually heavy use of printing resources roughly a million pages at a cost of about $100,000 in printer lease, paper and toner cartridges each month. A quick investigation unveiled the fact that most of the employees were also students and were using the organization s resources to print textbooks, papers and a host of material unrelated to their job. This analysis alone demonstrated an ArcSight ESM investment payback period of just 2 ½ months, and the on-going savings have paid back the initial SIEM outlay many times over. 3

Prevent Internal Resource Abuse Global Telecommunications Company WHAT Historical Analysis WHAT Asset Value Savings of $3.6 million over three years from office supplies usage reduction WHERE Contextual Analysis WHEN Time Window 2 months, 15 days Increased call center productivity Improved recruiting processes New visibility into user activity HOW Correlation Engine Prevent Funds Transfer Fraud A regional bank in the Midwestern United States using ArcSight ESM for compliance monitoring and reporting was facing a growing fraud problem that they could not keep up with. The fraudulent activity involved moving funds around different accounts within and outside the bank, and using long time frames and knowledge of the bank transfer approval process to conduct the transactions. The bank expanded their existing ArcSight ESM solution to include rules and alerts for fraud monitoring. Using the new intelligence the firm s anti-fraud team was able to stop illegitimate bank transfers worth nearly $900,000 within the first week. The combination of real-time correlation and pin-point accuracy allowed the bank to find and stop these transactions, translating to a payback period of less than a week. Prevent Funds Transfer Fraud Regional Financial Institution Prevent fraud worth $900K Less than 1 week Increased visibility into transfer operations Proactive, not reactive, fraud prevention Additional use cases ArcSight Products for Security and Compliance ArcSight provides a complete, integrated set of products to address security and compliance needs. With ArcSight SIEM and log management solutions, organizations are able to easily demonstrate the value brought to the organization in the form of real cost savings. The ArcSight SIEM platform includes the following products: ArcSight ESM Enterprise Event Correlation ArcSight ESM is a SIEM solution that brings total environment visibility. ArcSight ESM collects event information from every system and device and categorizes it for analysis. With the ArcSight ESM correlation capability, analysts are able to focus on the events that matter most. It allows security, compliance and anti-fraud personnel to quickly identify and prevent network security attacks, compliance violations and fraudulent business transactions. The ArcSight common event format (CEF) allows customers to reduce their training costs, gain real-time visibility into their security and compliance status and scale to the needs of the organization. ArcSight Logger Efficient and Self-Managing Storage and Compliance Reporting ArcSight Logger provides a complete, market-leading log management solution for long-term data retention. Compliance mandates usually require companies to retain event log data for long periods of time, making storage efficiency and compression format very important. Demonstrating compliance also means the data must be readily available for fast searching, reporting and analysis. With ArcSight Logger, enterprises are able to efficiently collect, centrally store and provide interactive search and analysis capabilities across all log data. ArcSight Logger also allows easy compliance reporting, historical data analysis and fast forensic search. ArcSight Logger delivers search rates in the range of 3,000,000 events per second without any significant tradeoff on collection rates or storage efficiency. ArcSight Logger eliminates the tradeoffs seen in competing log management products, which require customers to trade off between fast data capture, fast search and high compression. ArcSight Logger provides a unique data storage architecture that captures logs at high speeds, supports high speed simultaneous search, and compresses data at an average ratio of 10:1. 4

ArcSight SmartConnectors In order to understand the overall security posture of the organization, it is necessary to collect event logs from all devices across the network. ArcSight allows out-of-the-box event log collection from over 275 devices through pre-built ArcSight Connectors. These connectors collect event logs in their native format and then normalize and categorize them to the ArcSight CEF for easy correlation and analysis. The ArcSight Connector architecture enables future-proof monitoring, as the system will continue to work even when network technologies are swapped out and replaced with those from new vendors. By relying on ArcSight CEF, ArcSight Connectors insulate your analysis from your product and vendor choice. For example, ArcSight allows an organization to swap its Cisco firewall infrastructure with Checkpoint without impacting the rules, reports, alerts and dashboards that have already been built. ArcSight Compliance Insight Packages ArcSight Compliance Insight Packages (CIPs) provide the deep and focused resources needed to efficiently demonstrate compliance. CIPs help minimize the labor and human error component of compliance initiatives. By automating real-time monitoring and reporting across the full range of audit, business and security controls, companies can dramatically lower the cost of compliance. ArcSight CIPs collect relevant enterprise events across all locations and sources, and then correlate this data in real time to detect compliance violations, data breaches or other fraudulent activity. All audit-relevant information is stored in accordance with mandated retention policies, and visualized through dashboards and reports that simplify and automate audits while providing continuous visibility into the compliance posture. With ArcSight CIPs in place, organizations can not only achieve ongoing compliance, but also safeguard their assets and enforce corporate policies and processes. ArcSight CIPs are available for a variety regulations, industry mandates and control frameworks including SOX, PCI, FISMA, HIPAA, NERC, Basel II and European Data Privacy Directive. ArcSight Express Your Expert In a Box for Security Monitoring ArcSight Express is a fully contained, appliance-based SIEM solution geared to the mid-market customer. It focuses on the needs of corporations with limited resources for installation and ongoing administration. With ArcSight Express, the mid-market organization can easily detect problems by consolidating security information to one central location. ArcSight Express comes with the necessary best practices and security expertise built in, including rules, alerts, reports and dashboards that are focused on the common areas of risk. Summary SIEM can deliver tremendous value to an organization, as demonstrated by the examples in this whitepaper. This whitepaper clearly demonstrates that the benefits of SIEM far outweigh the acquisition cost, and the expense is usually paid off within a few weeks or months. Hard benefits are most often quantified through total cost of ownership comparisons between on-going manual security tasks and the cost of deploying SIEM automation. In addition, organizations that deploy SIEM technology gain soft benefits in the form of better security situational awareness, reduced risk and other operational benefits. Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. All other product and company names may be trademarks or registered trademarks of their respective owners. ESP-BWP018-101409-02, Created August 2011