IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer



Similar documents
IBM QRadar Security Intelligence April 2013

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

QRadar SIEM and FireEye MPS Integration

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

What is Security Intelligence?

IBM Security IBM Corporation IBM Corporation

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

QRadar SIEM and Zscaler Nanolog Streaming Service

Q1 Labs Corporate Overview

CALNET 3 Category 7 Network Based Management Security. Table of Contents

IBM. Vulnerability scanning and best practices

Find the needle in the security haystack

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

From the Bottom to the Top: The Evolution of Application Monitoring

How To Buy Nitro Security

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

The webinar will begin shortly

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM Security QRadar Risk Manager

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Clavister InSight TM. Protecting Values

IBM Security QRadar Risk Manager

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Boosting enterprise security with integrated log management

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Enabling Security Operations with RSA envision. August, 2009

OIT User Conference Security Team November 2014

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

IT Security Strategy and Priorities. Stefan Lager CTO Services

RSA Security Analytics

FISMA / NIST REVISION 3 COMPLIANCE

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

IBM Security QRadar Vulnerability Manager

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

IBM QRadar Security Intelligence Platform appliances

IBM Security Intelligence Strategy

Leverage security intelligence for retail organizations

Ecom Infotech. Page 1 of 6

Information Technology Policy

Extreme Networks Security Analytics G2 Risk Manager

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

Using SIEM for Real- Time Threat Detection

Under the Hood of the IBM Threat Protection System

Click to edit Master title style. How To Choose The Right MSSP

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

IBM Advanced Threat Protection Solution

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Extreme Networks Security Analytics G2 Vulnerability Manager

Breaking down silos of protection: An integrated approach to managing application security

End-user Security Analytics Strengthens Protection with ArcSight

IBM Security Strategy

IBM Security QRadar SIEM Product Overview

Introducing IBM s Advanced Threat Protection Platform

What s New in Security Analytics Be the Hunter.. Not the Hunted

How to Choose the Right Security Information and Event Management (SIEM) Solution

Achieving SOX Compliance with Masergy Security Professional Services

IBM Security X-Force Threat Intelligence

Integrating MSS, SEP and NGFW to catch targeted APTs

RSA Security Anatomy of an Attack Lessons learned

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

IBM Security QRadar QFlow Collector appliances for security intelligence

QRadar SIEM 6.3 Datasheet

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Building a Security Operations Center Lessons Learned. active threat protection

Continuous Network Monitoring

2012 North American Managed Security Service Providers Growth Leadership Award

Payment Card Industry Data Security Standard

How To Manage Sourcefire From A Command Console

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

IBM Security QRadar Vulnerability Manager Version User Guide

SourceFireNext-Generation IPS

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Risk-based solutions for managing application security

Unified Threat Management, Managed Security, and the Cloud Services Model

SIEM Orchestration. How McAfee Enterprise Security Manager can drive action, automate remediation, and increase situational awareness

Speed Up Incident Response with Actionable Forensic Analytics

Safeguarding the cloud with IBM Dynamic Cloud Security

Current IBAT Endorsed Services

Secure Cloud-Ready Data Centers Juniper Networks

Network Instruments white paper

The SIEM Evaluator s Guide

Managing security risks and vulnerabilities

How To Manage Security On A Networked Computer System

A Case for Managed Security

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Transcription:

IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer. QRadar SIEM provides Integrated log, threat, compliance management Asset profiling and flow analytics Offense management and workflow QRadar SIEM allows single pane troubleshooting of issues to create a Security Operations Center (SOC). Its powerful rules engine correlates data, detects anomalies and generates a manageable list of the highest priority risks requiring forensic investigation and remediation. QRadar SIEM derives value by working with best of breed products.

firewalls can be deployed within a variety of different organizations including: MSSPs, datacenters, enterprise (NGFW) or small businesses (UTM). s support a comprehensive set of protection features such as antimalware/av, application control, data loss protection, email filtering, endpoint control, intrusion protection, vulnerability scanning and web filtering. FortiAnalyzer FortiAnalyzer provides event logging, security reporting and analysis functions for several key Fortinet products, including s. Security logs can be filtered and drilled-down to specific instances or security violations; alerts can also trigger for pre-defined criteria. Application Visibility and Control

IBM Security QRadar SIEM and the Fortinet products can be configured in several ways Direct logging to IBM Security QRadar s can be configured to send syslog-based security events to QRadar directly. s support the standard port 514 Syslog format as well as reliable Syslog options via TCP 601. Indirect logging to IBM Security QRadar via FortiAnalyzer In this scenario, s are configured to send event logs to a FortiAnalyzer. On the FortiAnalyzer, an IT administrator can view logs, run reports and correlate log information. While this is ideal for -centric security deployments, large enterprises with heterogeneous environments may look for a full SIEM such as QRadar. In this case, the FortiAnalyzer can be configured to forward Syslog events to an upstream QRadar deployment. QRadar SIEM Heterogeneous Configuration FortiAnalyzer Large Configuration

Here are some real world examples of the value combining these products brings to customers. 1. Prevent data loss The SOC analyst responsible for the credit card gateways and servers at an international retailer receives an email alert from QRadar due to cross-site scripting activity. This alert is sent when QRadar detects several cross-site scripting events from a Fortinet on 2 servers that are vulnerable. The analyst patches the vulnerable hosts and prevents personally identifiable information (PII) data from being sent to the attacker. Suspected Incidents Prevent. Detect. Respond. Prioritized Incidents XSS event + Vulnerability QRadar SIEM 2. Virus detected and remediated A university with several campuses is running QRadar and FortiAnalyzer. FortiAnalyzer sends QRadar 4 virus blocked events, followed by a virus detected event. QRadar generates an offense when the FortiAnalyzer virus detected event is correlated with several virus events reported by endpoint solutions on critical assets. The university security analyst sees all of the

endpoints that need to be cleaned and prioritizes them based on the asset weight, which reflects the business importance. 3. DoS attack stopped The network administrators at a national bank go on alert when they see a DoS attack offense on their QRadar dashboard. Based on the offense, the administrator sees the DoS event and the flows and network traffic that triggered the offense. She reacts immediately to write a rule for her IPS that will block such traffic, and stops the attack. These examples show how QRadar can leverage the value of best of breed products customers have already invested in throughout their infrastructure and enable them to reach their compliance and security goals. Integrating and FortiAnalyzer with QRadar enables data centers, enterprises and small to medium size businesses to improve their security posture and protect their organization from malware and viruses, application vulnerabilities, data loss, spam, and other threats.