Redefining SIEM to Real Time Security Intelligence



Similar documents
Security Information & Event Management (SIEM)

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Enabling Security Operations with RSA envision. August, 2009

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Symantec Endpoint Protection

McAfee Network Security Platform

FIVE PRACTICAL STEPS

Combating a new generation of cybercriminal with in-depth security monitoring

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Concierge SIEM Reporting Overview

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

IBM Security Strategy

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

RSA Security Analytics

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Modular Network Security. Tyler Carter, McAfee Network Security

Top 20 Critical Security Controls

Secure Cloud Computing

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Symantec Endpoint Protection

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

How To Buy Nitro Security

Effective Methods to Detect Current Security Threats

IBM QRadar Security Intelligence April 2013

Integrating MSS, SEP and NGFW to catch targeted APTs

Unified Security, ATP and more

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Ecom Infotech. Page 1 of 6

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Caretower s SIEM Managed Security Services

End-user Security Analytics Strengthens Protection with ArcSight

A Case for Managed Security

ThreatSpike Dome: A New Approach To Security Monitoring

ORGANIZADOR: APOIANTE PRINCIPAL:

THE EVOLUTION OF SIEM

Effective Methods to Detect Current Security Threats

Security Analytics for Smart Grid

How To Manage Security On A Networked Computer System

Software that provides secure access to technology, everywhere.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

High End Information Security Services

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Zak Khan Director, Advanced Cyber Defence

Vulnerability Management

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Detect & Investigate Threats. OVERVIEW

McAfee Security Information Event Management (SIEM) Administration Course 101

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Introducing IBM s Advanced Threat Protection Platform

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

WHITE PAPER: THREAT INTELLIGENCE RANKING

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Cisco Security Intelligence Operations

The SIEM Evaluator s Guide

APPLICATION PROGRAMMING INTERFACE

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

How Lastline Has Better Breach Detection Capabilities. By David Strom December 2014

Defending Against Cyber Attacks with SessionLevel Network Security

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

24/7 Visibility into Advanced Malware on Networks and Endpoints

Security Operations Metrics Definitions for Management and Operations Teams

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

The webinar will begin shortly

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM SECURITY QRADAR INCIDENT FORENSICS

Netzwerkvirtualisierung? Aber mit Sicherheit!

RSA Security Anatomy of an Attack Lessons learned

Symantec Cyber Security Services: DeepSight Intelligence

Security strategies to stay off the Børsen front page

Transcription:

Redefining SIEM to Real Time Security Intelligence David Osborne Security Architect September 18, 2012

Its not paranoia if they really are out to get you Malware Malicious Insiders Exploited Vulnerabilities Careless Employees Mobile Devices Social Networking Social Engineering Zero-Day Exploits Cloud Computing Security Threats Cyber Espionage

Reality of Compliance Audits happen quarterly or annually Effort and budget spent to get compliant Little focus or process to stay that way

SIEM The Great Correlator Major SIEM Functions Collect Normalize Correlate Collect log and event data from systems across the network Security devices, applications, OS, databases, end-point protections, etc. Normalize similar events across disparate data sources Login events from a VPN, OS, or Application are all authentication events Correlate multiple events into known attack vectors or policy violations Multiple failed logins followed by a success indicates brute force access Eliminates the need for an analyst to try to piece together the event

Redefining SIEM Security is a Process, not a Product Each stage supports the next A weak link breaks the process Tools need to automate each stage Integration provides actionable intelligence Legacy SIEMs are Limited Risk Assessment limited to VA scan data Threat Detection limited to event correlation Incident Response limited to log analysis Compliance Reporting limited to canned reports

SIEM is Still Evolving To SIEM Content Awareness (Next Generation SIEM) Content Awareness is Understanding the Payload at the Application Layer What is actually being Communicated, Transferred, and Shared over the Network. Examples of Content Awareness is the understanding of: Email contents, including the attachments Social, IM and P2P Network Communications Document Contents Application Relationships with Database Queries and Responses Database Monitoring Data Leakage Sensitive Information within chat, email, printed, etc

Adding Context to Logs What else happened at this time? Near this time? What is the time zone? DNS name, Windows name, Other names? Whois info? Organization owner? Where does the IP originate from (geo location info)? What else happened on this host? Which other hosts did this IP communicate with? What is this service? What other messages did it produce? What other systems does it run on? Log record What is the hosts IP address? Other names? Location on the network/datacenter? Who is the admin? Is this system vulnerable to exploits? Who is this user? What is the users access-level? What is the users real name, department, location? What other events from this user? What is this port? Is this a normal port for this service? What else is this service being used for? What does this number mean? Is this documented somewhere?

Broad Content and Context Correlation Application Contents Authentication & IAM Events from Security Devices Device & Application Log Files User Identity Malware Viruses Trojans Insider Threats Advanced Threats Exploits Database Transactions OS events VA Scan Data Location

SIEM and Situational Awareness SIEM DOES NOT SOLVE APT, but Provides Situational Awareness THERE IS NO APT ALL IN ONE SOLUTION SIEM Can Help with Attacks Determining the Scope of Attack What Systems or Devices were Involved What DATA was Compromised What Evasion Techniques were Utilized Timelines Toolsets Utilized Work Flows and Processes of Attackers Heuristics for Historical Correlation Even with SIEM, Security Expertise and Experience is REQUIRED Well Trained Security Analysts, Highly Developed Security Policies and Procedures Combined with SIEM for Situational Awareness is the BEST Strategy for dealing with Exploits, Low and Slow Attacks and APT

Scalability & Performance Unmatched Speed Industry s Fastest SIEM 100x to 1,000x faster than current solutions Queries, correlation and analysis in minutes, not hours Unmatched Scale Collect all relevant data, not selected sub-sets Analyze months and years of data, not weeks Include higher layer context and content information Scales easily to billions of data records

NitroView Overview Single Pane-of-Glass McAfee ESM Unified Visibility & Analysis Compliance & Reporting Policy Management McAfee ELM Log Management Compliant Log Storage SAN/CIFS/NFS/Local Storage McAfee Receiver 3 rd Party Log/Event Collection Network Flow Data Collection VMware Receivers Available McAfee ADM Application Data Monitor Layer 7 Decode Full Meta-Data Collection McAfee DEM Database Activity Monitor Database Log Generation Session Audit McAfee ACE Advanced Correlation Risk-Based Correlation Historical Correlation Application Visibility 100s of applications and 500+ document types Data Visibility Data traffic from leading databases Risk Scoring Detect potential threats Asset information/context Vulnerability Information Which assets are most at-risk 11 September 18, 2012

Global Threat Intelligence (GTI) ESM Unified Visibility & Analysis Compliance & Reporting Policy Management ELM Log Management Compliant Log Storage SAN/CIFS/NFS/Local Storage Receiver 3 rd Party Log/Event Collection Network Flow Data Collection VMware Receivers Available ADM Application Data Monitor Layer 7 Decode Full Meta-Data Collection DEM Database Event Monitor Database Log Generation Session Audit ACE Advanced Correlation Risk-Based Correlation Historical Correlation Shared Threat Intelligence Application Visibility Data Visibility Risk Scoring Reputation-based WW visibility into all types of cyber threats Automatic, push feed Today Bad Actors/Dangerous IPs Additional GTI capabilities: file, web, message & network connection reputation web categorization 12 September 18, 2012

How can SIEM help with MTTR? Advanced Correlation uses activity to determine Risk

How can SIEM help with MTTR? Baselines to determine deviations from normal activity

How can SIEM help with MTTR? Normalization of events into a common taxonomy

How can SIEM help with MTTR? Global Threat Intelligence to determine if I have any communication with external known bad actors

17