QRadar SIEM and Zscaler Nanolog Streaming Service



Similar documents
QRadar SIEM and FireEye MPS Integration

IBM QRadar Security Intelligence April 2013

IBM Security QRadar SIEM Product Overview

How to Choose the Right Security Information and Event Management (SIEM) Solution

IBM Security IBM Corporation IBM Corporation

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

IBM Security Intelligence Strategy

Security strategies to stay off the Børsen front page

Q1 Labs Corporate Overview

Boosting enterprise security with integrated log management

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

What is Security Intelligence?

The webinar will begin shortly

Strengthen security with intelligent identity and access management

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

IBM Security QRadar QFlow Collector appliances for security intelligence

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM SECURITY QRADAR INCIDENT FORENSICS

Log management & SIEM: QRadar Security Intelligence Platform

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

IBM QRadar as a Service

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

The Hillstone and Trend Micro Joint Solution

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM

IBM Security X-Force Threat Intelligence

The SIEM Evaluator s Guide

How To Buy Nitro Security

IBM Security QRadar Risk Manager

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

IBM Security QRadar Risk Manager

IBM Advanced Threat Protection Solution

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Introducing IBM s Advanced Threat Protection Platform

Under the Hood of the IBM Threat Protection System

QRadar Security Management Appliances

How To Manage Security On A Networked Computer System

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Ecom Infotech. Page 1 of 6

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

QRadar Security Intelligence Platform Appliances

IBM Security QRadar Vulnerability Manager

Continuous Network Monitoring

Leverage security intelligence for retail organizations

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Swordfish

RSA Security Analytics

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM QRadar Security Intelligence Platform appliances

FIVE PRACTICAL STEPS

Extreme Networks Security Analytics G2 Vulnerability Manager

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Enabling Security Operations with RSA envision. August, 2009

Security Intelligence Solutions

Extending security intelligence with big data solutions

McAfee Network Security Platform

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

Converting Security & Log Data into Business Intelligence: Art or Science? Phone Conference

Security Information Event Management (SIEM) solutions

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Combating a new generation of cybercriminal with in-depth security monitoring

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Extreme Networks: A SOLUTION WHITE PAPER

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

The Purview Solution Integration With Splunk

Network Metrics Content Pack for VMware vrealize Log Insight

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Vendor Landscape: Security Information & Event Management (SIEM)

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

How To Manage Sourcefire From A Command Console

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Security Information & Event Management (SIEM)

Extreme Networks Security Analytics G2 Risk Manager

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Network Performance + Security Monitoring

High End Information Security Services

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Log Management Solution for IT Big Data

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

access convergence management performance security

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Magic Quadrant for Security Information and Event Management

Transcription:

QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1

QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets from a wide range of advanced threats, while meeting critical compliance mandates. Key Capabilities: Sophisticated correlation of events, flows, assets, topologies, vulnerabilities and external data to identify & prioritize threats Network flow capture and analysis for deep application insight Workflow management to fully track threats and ensure resolution 2

The Security Intelligence Life Cycle IBM Security Intelligence 3

Security Intelligence: Context and Correlation Drive Deep Insight Security Devices Servers & Mainframes Network & Virtual Activity Database Activity Application Activity Configuration Info Vulnerability & Threat Users & Identities Event Correlation Logs IP Reputation Flows Geo Location Activity Baselining & Anomaly Detection User Activity Database Activity Application Activity Network Activity True Offense Offense Identification Credibility Severity Relevance Suspected Incidents Extensive Data Sources Deep + Intelligence = Exceptionally Accurate and Actionable Insight 4

QRadar SIEM: Benefits Reduce the risk and severity of security breaches Remediate security incidents quickly and thoroughly Ensure regulatory and internal policy compliance Reduce manual effort of security intelligence operations 5

QRadar SIEM: Key Advantages Real-time activity correlation based on wide set of contextual data Flow capture that delivers Layer 7 content visibility and supports deep forensic examination Intelligent incident analysis that reduces false positives and manual effort Unique combination of fast free-text search and analysis of data that has a common taxonomy 6

IBM/Q1 Labs in SIEM Leadership Quadrant for Fifth Straight Year Magic Quadrant for Security Information and Event Management, Gartner, 7 May 2013 Gartner Magic Quadrant for SIEM: IBM/Q1 Labs SIEM is rated #1 for on Ability to Execute (the Y-axis) and beat McAfee/Nitro, RSA, LogRhythm, and Splunk on Completeness of Vision (the X-axis) Ability to execute is an assessment of overall viability, product service, customer experience, market responsiveness, product track record, sales execution, operations, and marketing execution. Completeness of Vision is a rating of product strategy, innovation, market understanding, geographic strategy, and other factors What Gartner is Saying about IBM/Q1 Labs: QRadar is a good fit for midsize and large enterprises that need general SIEM capabilities and also for use cases that require behavior analysis and NetFlow analysis. Behavioral analysis is recognized by Gartner as essential in the detection of advanced threats. Customer feedback indicates that the technology is relatively straightforward to deploy and maintain across a wide range of deployment scales. A distinguishing characteristic of the technology is the collection and processing of NetFlow data, deep packet inspection (DPI) and behavior analysis for all supported event sources. 7

QRadar SIEM: Product Tour of Integrated Console Single browser-based UI Role-based access to information & functions Customizable dashboards (work spaces) per user Real-time & historical visibility and reporting Advanced data mining and drill down Easy to use rules engine with out-of-the-box security intelligence 8

QRadar & Zscaler Nanolog Streaming Service Events coming in 9

QRadar & Zscaler Nanolog Streaming Service Live Streaming 10

QRadar SIEM: Product Tour - the Intelligence of Offense Management QRadar SIEM reduces millions of events and flow records to the top few threats and incidents called Offenses Through correlation with contextual data (events, flows, vulnerabilities, threat intelligence feeds) Rules engine creates an offense as a response to a sequence of events, behavior, Incident Response Teams and Security Administrators rely on Offenses to determine what they need to remediate or investigate. 11

QRadar SIEM: Product Tour - the Intelligence of Offense Management There is a dashboard widget for the Top Offenses Offense tab shows offenses currently open, with drill down to details 12

QRadar SIEM: Product Tour of Intelligent Offense Scoring QRadar judges magnitude of offenses: Credibility: A false positive or true positive? Severity: Alarm level contrasted with target vulnerability Relevance: Priority according to asset or network value Priorities can change over time based on situational awareness 13

QRadar SIEM: Product Tour of Offense Tab 14

QRadar SIEM: Offense triggers as a result of Zscaler events What was the breach? Who was responsible? Was it successful? Where do I find them? How many targets involved? How valuable are the targets to the business? Yes 8 Are any of them vulnerable? 15

Where is all the evidence? 16

QRadar SIEM: Use Cases QRadar SIEM excels at the most challenging use cases: Complex threat detection Malicious activity identification User activity monitoring Compliance monitoring Fraud detection and data loss prevention 17

QRadar SIEM & Zscaler Use Cases 1. Potential botnet activity detected QRadar running at an international financial services organization receives 3 Zscaler NSS events indicating possible botnet command and control traffic, which generates an offense. The magnitude of the offense is increased to 10, when QRadar flow traffic confirms that multiple clients have regularly connected to the same set of external IP addresses over a period of 2 days. 2. Phishing threat detected Zscaler NSS sends 3 events to QRadar warning that a website containing potential phishing content has been contacted by 3 executives. QRadar generates a high magnitude offense when these events are correlated with XForce data that identifies that site as a phishing site. The SOC analyst changes the corporate Zscaler policy to block that phishing site in the future 18

QRadar SIEM & Zscaler Use Cases 3. Social network site allowed for privileged mobile users The severity of an event cautioning the use of a social network site is lowered when QRadar compares the user who generated the event with a reference set of mobile users who are permitted to use the site. A false positive is avoided. 19

QRadar SIEM: Intelligent, Integrated and Automated 1. Intelligence delivered through Offense Management and identification of critical anomalies 2. Integrated with 100 s of data sources, such as Zscaler Nanolog Streaming Service 3. Automated via 1000 s of rules and reports out of the box, delivering rapid time to value and operational efficiency QRadar SIEM delivers full visibility and actionable insight for Total Security Intelligence. 20