Cutting Through SIEM Vendor Marketing. Make the right technology decision A. Ananth ananth@eventtracker.com



Similar documents
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Caretower s SIEM Managed Security Services

Security Information & Event Management (SIEM)

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

The Flexibility of SIEM in Use A look at how two customers use EventTracker

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How to Define SIEM Strategy, Management and Success in the Enterprise

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

"Service Lifecycle Management strategies for CIOs"

Q1 Labs Corporate Overview

End-user Security Analytics Strengthens Protection with ArcSight

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

The SIEM Evaluator s Guide

Analyzing Logs For Security Information Event Management Whitepaper

What is Security Intelligence?

Tivoli Security Information and Event Manager V1.0

How To Create Situational Awareness

Ecom Infotech. Page 1 of 6

Enabling Security Operations with RSA envision. August, 2009

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Netzwerkvirtualisierung? Aber mit Sicherheit!

Information Technology Policy

Administration of Clearwell ediscovery Platform 7.x Exam.

Analyzing Logs For Security Information Event Management Whitepaper

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

syslog-ng Product Line

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

Don t let your SIeM become your Nightmare!

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

IT Security Strategy and Priorities. Stefan Lager CTO Services

PCI DSS Top 10 Reports March 2011

What s new in AM 9.30 Accelerating business outcomes

Log Management and SIEM Evaluation Checklist

McAfee Database Security. Dan Sarel, VP Database Security Products

Comprehensive Security with Splunk and Cisco

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Security Information/Event Management Security Development Life Cycle Version 5

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

Splunk: Using Big Data for Cybersecurity

Logentries Insights: The State of Log Management & Analytics for AWS

nfx One for Managed Service Providers

RSA Security Analytics

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

World Security Information and Event Management (SIEM) and Log Management Products Market

Unified Threat Management, Managed Security, and the Cloud Services Model

SecureVue Product Brochure

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Logging In: Auditing Cybersecurity in an Unsecure World

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI Compliance for Cloud Applications

Real-Time Database Protection and. Overview IBM Corporation

Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle

Intelligence Driven Security

Analyzing Logs For Security Information Event Management

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation

Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009

Blackboard Learn TM, Release 9 Technology Architecture. John Fontaine

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

SaaS A Product Perspective

QRadar Security Intelligence Platform Appliances

DAS ETS Policy Option Packages - Support Base IT Operations

Current IBAT Endorsed Services

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

SourceFireNext-Generation IPS

Secret Server Splunk Integration Guide

WordPress Security Scan Configuration

PCI DSS Reporting WHITEPAPER

Category: Business Process and Integration Solution for Small Business and the Enterprise

Information & Asset Protection with SIEM and DLP

What s New in Security Analytics Be the Hunter.. Not the Hunted

Compliance Guide: PCI DSS

Scalability in Log Management

How To Manage Security On A Networked Computer System

Why Test ITSM Applications for Performance? Webinar

Managed Security Services for Data

Complete Database Security. Thomas Kyte

Organizations remain under intense pressure to reduce costs To reduce costs we must increase efficiency in resource allocation

InstaFile. Complete Document management System

BRIDGING THE GAP Security, Operations & Compliance

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK

Moving beyond Virtualization as you make your Cloud journey. David Angradi

BlackStratus for Managed Service Providers

70-246: Monitoring and Operating a Private Cloud with System Center 2012

LEARNING SOLUTIONS website milner.com/learning phone

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Transcription:

Cutting Through SIEM Vendor Marketing Make the right technology decision A. Ananth ananth@eventtracker.com

Outline What s in a name? SIEM? SEM? SIM? Customer Motivations Vendor approaches to the problem Deciding what s right for you Worst practices Q&A

What s in a name? SIEM Gartner s name for this space, Includes support for: SIM Log management and compliance reporting (non realtime tasks) SEM Incident management for security related events (realtime task) Ops use case is increasingly important Tighter budgets Strong benefits

Customer motivations Help, I m being audited! Compliance reporting Help, I m being hacked! Threat management Help, I m being RIF ed More with less Help, I want to comply with best practice Just checking if you are still awake

Evolution 2005-2011 SANS Annual Log Management survey 2005: 43% of those surveyed collected logs 2011: 89% of those surveyed collected logs More data from physical/plant/pos devices

Which verticals?

Company size

What is difficult?

What is difficult? The mechanics of collecting, storing and archiving the log data are no longer the challenge The challenge now is extracting the needed information for monitoring, mgt, compliance and decision-making (often in near real-time) Windows logs remain a challenge

Vendor approaches SEM is the real problem Focused on the SOC The network is the computer Correlation is it SIM is the real problem Focused on archival Compliance reporting

Vendor approaches Normalization is the key Parsers, standard SQL schema Ever larger ODBC instances Vendor standards Vulnerability is the key Huh? Netflow/Jflow is the key Another network based approach

Non real time Systems Compliance Enterprise Real time Network Mid Tier Systems Windows EventTracker SME Network Non-Windows SMB Ops, Security Market Segmentation

Deciding what s right for you Start with the real reason Monitor for PCI-DSS, protect web apps Monitor critical servers for suspicious login Include log sources Size the environment Consider phased approach

Deciding what is right for you Describe essential SIEM features Which reports/trends, role based dashboards, Netflow, Change monitoring, search etc SEM? SIM? Ops? Keep it short More than 10 pages? Go back and prune

SIEM Mythology Auto learning, no tuning required Like the self driving car aka pink elephant Analyst-in-a-box Think virtual box for the analyst Minimal or no training needed A fool with a tool is still a fool SIEM is scientific More like art with politics on the side

SIEM Project lifecycle Determine the need Define scope Make shortlist of vendors Conduct POC Deploy Use Expand

Worst practices Determine need: Skip this step, just buy something. Security? Compliance? Ops? Define scope: Be vague Real-time? Platforms? Log volume? Reports? Alerts? Usage? Assume you are the only stakeholder

Worst practices Shortlist vendors: Choose by initial price. Ignore modules, support, training, Accept vendor TCO or ROI formula Choose by relationship. We already use their AV or OS or IDS Choose by Powerpoint

Worst practices Conduct POC Don t bother Ignore the vendor completely Let vendor dictate the POC Don t verify references

Worst practices Deploy Don t plan before the vendor shows up Demand admin access at the last minute Scramble to configure network/firewall Use any old hardware or software Surprise staff with the schedule Announce training at the last minute Ignore the vendor recommendations What do they know anyway?

Worst practices Use Don t upgrade to new release Don t invest in support contracts Ignore vendor provided best practices Never provide training to the actual users Expand Don t designate a product owner Donr check for changed needs or scalability

Final Thoughts -- Seriously Implementing Log Management is a typical IT project Planning early and often is key Match your needs to product features Conduct a pilot, verify claims Befriend your enemy (vendor)

Contact Download this presentation at: www.eventtracker.com/itsac2011 ananth@eventtracker.com Vendor Expo Booth #408