Security Information & Event Management (SIEM) Sri Carlyle Country Manager



Similar documents
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Ecom Infotech. Page 1 of 6

Compliance Management, made easy

A COMPLETE APPROACH TO SECURITY

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Obtaining Enterprise Cybersituational

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Safeguarding the cloud with IBM Dynamic Cloud Security

Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

IBM Security QRadar Risk Manager

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

SANS Top 20 Critical Controls for Effective Cyber Defense

SORTING OUT YOUR SIEM STRATEGY:

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Security Issues in Cloud Computing

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

The SIEM Evaluator s Guide

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Critical Controls for Cyber Security.

The session is about to commence. Please switch your phone to silent!

IBM Security IBM Corporation IBM Corporation

IBM Security QRadar Risk Manager

Best Practices to Improve Breach Readiness

integrating cutting-edge security technologies the case for SIEM & PAM

The webinar will begin shortly

IQware's Approach to Software and IT security Issues

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

How To Manage Security On A Networked Computer System

Securing and protecting the organization s most sensitive data

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Den strategiske og operationelle cyber platform. Jesper Zerlang, CEO

Basics of Internet Security

Evolution Of Cyber Threats & Defense Approaches

Bio-inspired cyber security for your enterprise

Verve Security Center

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Win the race against time to stay ahead of cybercriminals

The Next Generation Security Operations Center

The Four-Step Guide to Understanding Cyber Risk

FIVE PRACTICAL STEPS

Overcoming Five Critical Cybersecurity Gaps

Redefining SIEM to Real Time Security Intelligence

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

State of Security Monitoring of Public Cloud

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

End-user Security Analytics Strengthens Protection with ArcSight

IBM Security QRadar Vulnerability Manager

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Attack Intelligence: Why It Matters

Bridging the gap between COTS tool alerting and raw data analysis

Combating a new generation of cybercriminal with in-depth security monitoring

Extreme Networks Security Analytics G2 Risk Manager

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

Intrusion Detection from Simple to Cloud

Internet Safety and Security: Strategies for Building an Internet Safety Wall

IBM Security QRadar SIEM Product Overview

Meeting the Challenges of Virtualization Security

Privileged Session Management Suite: Solution Overview

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Discover Security That s Highly Intelligent.

Working with the FBI

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Continuous Network Monitoring

Paxata Security Overview

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

IBM QRadar Security Intelligence April 2013

Defending Against Data Beaches: Internal Controls for Cybersecurity

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell


LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

SCADA SYSTEMS AND SECURITY WHITEPAPER

A strategic approach to fraud

McAfee Database Security. Dan Sarel, VP Database Security Products

IBM QRadar as a Service

CFIR - Finance IT 2015 Cyber security September 2015

SecureVue Product Brochure

Transcription:

Security Information & Event Management (SIEM) Sri Carlyle Country Manager

LogPoint Introduction Founded i 2001, Copenhagen, Denmark 100 % Danish ownership Yearly growth: 100 percent 70 employees: 20 Sales/admin + 50 development Business Model Partner focus - Partners covering the globe Supporting European sales offices: DK, SE, UK, DE, FR Focus 2001: Focus on vulnerability scans and IT consultancy 2008: Purchase Immune focus on log management 2

Selected References 3

Selected References 4

Danish software company partners with Boeing Per Beith, Director, Information Security Solutions Network and Space Systems, Boeing, highlights the importance of access to the best of the best within the type of technology ImmuneSecurity [LogPoint red.] delivers even for a company like Boeing. Read more: www.logpoint.com/en/press 5

SCADA Risks: 3 rd Generation SCADA exposed to Internet Complex software applications Built on open standards & commercial available hardware COTS Don t meet The Commom Criteria (EAL) standards Legacy Products are end of Life are not supported 6

Why Risks No longer separation on corporate and plant networks Weak passwords Availability of 3rd party products Security documentation not in place Not enough internal training 7

SCADA Systems Global Map 8

SCADA Systems 9

SCADA Systems 10

11

12

13

14

15

16

17

18

19

20

21

22

Why SIEM and LogPoint? (1/3) Today, the majority of our communication takes place digitally travelling through various networks, and across enterprises, organisations, nations and continents. This very communication is now susceptible to crime, espionage and terrorism. Cyber security is now an essential part of our lives and business operations. So while digital communication has become our global lifeline, breakdowns and intrusions in our networks are bringing global threats to our economy and society. 23

Why SIEM and LogPoint (2/3) With racing volumes of increasingly complex data coursing through our networks, effectively monitoring such digital crimes seems an impossible task. At the same time, we all have a fundamental need for privacy. No one likes the idea that someone else may be watching our information. But our digital communication leaves a log a trail of critical information about time, place and routes. LogPoint monitors the behavior of this log traffic without invading privacy. 24

Why SIEM and LogPoint (3/3) LogPoint is a tool that collects and organises logs from activities anywhere on our networks, from applications to computers to servers to switches, routers and mobile devices. LogPoint makes log analysis and information assessment an easy, swift process to help you track and reveal security breaches in your network in real time. LogPoint constantly monitors your network's overall condition, identifying traffic bottlenecks and detecting attempts of intrusion so you can take prompt action to prevent future disruption and protect your assets. 25

Tool or Business Critical Application? What many enterprises think when they hear about LogPoint: We already have sufficient control of our logs! We don t want another monitoring tool! No demand from the business units consequently: nice-to-have! BUT An Enterprise without SIEM = A community without law enforcement! SIEM protects business assets SIEM creates overview SIEM discovers anomal behaviours SIEM is the Enterprise Business Intelligence platform for IT Security at the same level as e.g. SAP og SalesForce etc 26

LogPoint Unique Points: True enterprise application that scales globally Complete multi-tenancy for hosted solutions (ISP s) Flexibility, scaling and fully distributed One common language across the entire IT infrastructure Secure storage of secured logs (forensics) Real time analysis and alarming Advanced correlation across the enterprise environment EASY to install and maintain User interface is unique and Scandinavian License model is simple and transparent

Market Analytics Market size/year: Licenses: USD 1,6 billion Services: USD 1,2 billion EU = 30% Bottom Line: Enterprise architects have to plan for IT deployments of ever-increasing complexity and deal with increasing threats and risks. These and other trends create the need to expand security visibility throughout the entire stack of IT tools and technologies. Security information and event management (SIEM) is a pivotal technology that currently provides security visibility, and it is likely to hold the same role for the next two to three years. SIEM faces opportunities for growth in five core areas: new types of log and context data, shared intelligence, novel analytic algorithms, monitoring of emerging environments, and application security monitoring. Gartner Report (SIEM Futures) 28

Captures Events from the Entire Network 29

SIEM in Simple Terms 30

Security Operations Center View 31

Security Operations Center View 32

Real-tids dashboards og alarmer 33

Visit and Download 34