IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg und Bayern Juli 2015
Es ist keine Frage ob, sondern vielmehr wann und mit welcher Energie ein Unternehmen angegriffen wird. Reinhard Vesper, Abteilung Spionageabwehr, Verfassungsschutz NRW 2
63% der Betroffnen von Angriffen wurden von externen Organsiationen auf einen Einbruch in das Netzwerk aufmerksam gemacht. Anzahl an Tagen, die ein Angreifer im Netzwerk seines Opfers verbringt, bis der Angreifer erkannt wurde. 243 3
50% von befragten Unternehmen fühlen sich nicht sicher in ihrem bestehenden Sicherheitsumfeld. Ponemon Institute 2014 Global Cost of Data Breach Study Sponsored by IBM 4
5
Prevent. Detect. Respond. Quelle: Verizon DBIR 2013 Report 6
7
8
Alle Risiken im Blick Was sind die externen und internen Bedrohungen? Sind wir vor diesen Bedrohungen geschützt? Was passiert jetzt gerade? Was sind die Auswirkungen? Risk Management. Vulnerability Management. Configuration and Patch Management. X-Force Research and Threat Intelligence. Compliance Management. Reporting and Scorecards. Network and Host Intrusion Prevention. Network Anomaly Detection. Packet Forensics. Database Activity Monitoring. Data Leak Prevention. Security Information and Event Management. Log Management. Incident Response. 9
Kumulierte und intelligente Security Alerts Security devices Servers and mainframes Network and virtual activity Data activity Automated Offense Identification Unlimited data collection, storage and analysis Built in data classification Offenses Suspected Incidents Application activity Automatic asset, service and user discovery and profiling Configuration information Real-time correlation and threat intelligence Vulnerabilities and threats Activity baselining and anomaly detection Users and identities Detects incidents of the box Embedded Intelligence Global threat intelligence 10
Übersicht der Lösungskomponenten Portfolio Overview QRadar SIEM QRadar Risk Manager QRadar Log Manager Network Activity Collectors (QFlow / VFlow) Vulnerability Manager QRadar Incident Forensics 11
Eine integrierte Architektur Log Management Security Intelligence Network Activity Monitoring Risk Management Vulnerability Management Network Forensics 12
Use Cases
Erkennung von Bedrohungen Potential Botnet detected This is as far as traditional SIEM can go IRC on port 80 IBM Security QRadar QFlow detects a covert channel Irrefutable Botnet communication Layer 7 flow data contains botnet command control instructions Application layer flow analysis kann echte Bedrohungen erkennen 14
Einhaltung von Richtlinien PCI compliance at risk? Real-time detection of possible violation Unencrypted traffic IBM Security QRadar QFlow saw a cleartext service running on the accounting server PCI Requirement 4 states: Encrypt transmission of cardholder data across open, public networks Compliance Simplified 15
Erkennung von internen Bedrohungen Potential data loss Who? What? Where? Who? An internal user What? Oracle data Where? Gmail 16
Hoher Automatisierungsgrad für eine einfache Inbetriebnahme Simplified deployment Automated configuration of log data sources and asset database Immediate discovery of network assets Proactive vulnerability scans, configuration comparisons, and policy compliance checks Automated updates Stay current with latest threats, vulnerabilities, and protocols Out-of-the-box rules and reports Reduce incident investigations and meet compliance mandates 17
IBM QRadar Security Intelligence ist führend Leader in the Gartner Magic Quadrant since 2009 Security Information and Event Management (SIEM) IBM QRadar rated #1 by Gartner in 2014 in the following categories: Ability to execute Analytics and behavior profiling Compliance use cases SIEM use case, product rating, and overall use case 18
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.