RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief



Similar documents
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

White paper. Creating an Effective Security Operations Function

Enabling Security Operations with RSA envision. August, 2009

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

CA Service Desk Manager

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

White paper. Security Check: 7 Things to Consider When Evaluating Vendor Solutions for SIEM

RSA Solution Brief. Platform. The RSA envision. A Single, Integrated 3-in-1 Log Management Solution. RSA Solution Brief

QRadar SIEM and FireEye MPS Integration

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

IBM Security Intelligence Strategy

RSA Solution Brief. RSA envision. Platform. Compliance and Security Information Management. RSA Solution Brief

Strengthen security with intelligent identity and access management

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

SANS Top 20 Critical Controls for Effective Cyber Defense

How To Manage Security On A Networked Computer System

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Extreme Networks Security Analytics G2 Vulnerability Manager

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Vulnerability Management

IBM SECURITY QRADAR INCIDENT FORENSICS

The SIEM Evaluator s Guide

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

SIEM and DLP Together: A More Intelligent Information Risk Management Strategy

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

IBM Security QRadar Risk Manager

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

QRadar SIEM and Zscaler Nanolog Streaming Service

RSA SecurID Two-factor Authentication

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

IBM Security QRadar Vulnerability Manager

IBM QRadar Security Intelligence April 2013

Secure Administration of Virtualization - A Checklist ofVRATECH

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

Continuous Network Monitoring

How To Manage Log Management

Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond

End-to-End Application Security from the Cloud

Securing your IT infrastructure with SOC/NOC collaboration

Payment Card Industry Data Security Standard

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Clavister InSight TM. Protecting Values

How To Use Ibm Tivoli Monitoring Software

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

RSA Security Analytics

Trend Micro. Advanced Security Built for the Cloud

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Vistara Lifecycle Management

TRIPWIRE NERC SOLUTION SUITE

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

CA Service Desk On-Demand

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Automate PCI Compliance Monitoring, Investigation & Reporting

What is Security Intelligence?

Discover & Investigate Advanced Threats. OVERVIEW

North American Electric Reliability Corporation (NERC) Cyber Security Standard

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

HP and netforensics Security Information Management solutions. Business blueprint

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

IBM Security QRadar SIEM Product Overview

Caretower s SIEM Managed Security Services

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Security management solutions White paper. Extend business reach with a robust security infrastructure.

CLOUD GUARD UNIFIED ENTERPRISE

Q1 Labs Corporate Overview

Safeguarding the cloud with IBM Dynamic Cloud Security

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

The Cloud App Visibility Blindspot

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

IBM Security QRadar Risk Manager

Detect & Investigate Threats. OVERVIEW

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

IBM Security IBM Corporation IBM Corporation

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

1 Introduction Product Description Strengths and Challenges Copyright... 5

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Reining in the Effects of Uncontrolled Change

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits

CyberArk Privileged Threat Analytics. Solution Brief

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

Transcription:

RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief

The job of Operations, whether a large organization with a dedicated staff and resources, or one person with multiple responsibilities, is to keep information assets secure by continually monitoring the organization s IT environment, anticipate and respond to immediate threats and long-term vulnerabilities, and provide advice and guidance on security matters to both senior management and business units. To be effective, security operations professionals must draw on tools that day in and day out turn a myriad of real time events into actionable data. They need an efficient closed-loop process for handling incidents and mitigating risk. They also need the visibility necessary to assess and fine-tune the effectiveness of security policies, processes and resources. The RSA envision platform collects, analyzes, correlates and alerts on log data from all event sources across the network and IT infrastructure. It also intelligently combines real-time threat, vulnerability, IT asset and environmental data. This enables organizations to respond quickly and thoroughly to high-risk security issues and pinpoint the places where problems are likely to appear. By automating manual processes and increasing productivity, the RSA envision platform delivers increased security while reducing cost. With over 1600 production customers world-wide across every industry, including 5 of the Fortune 10 and 40% of top global banks, the RSA envision platform: To be effective, security operations professionals must turn a myriad of real time events into actionable data. Provides real-time, actionable security information for quick and accurate threat detection and alerting by combining event data, asset and vulnerability information, and utilizing intelligent correlation capabilities, security professionals prioritize and focus on the issues that support the business needs. Improves analyst productivity by streamlining the incident handling process by providing access to real, empirical data and offering a built-in workflow, from initial identification and prioritization of an incident, to investigation with contextual information, to escalation, resolution, closure and archiving, security professionals efficiently and effectively accelerate problem resolution. Increases the effectiveness of security measures and resources by giving security professionals visibility into their enterprise, the status of an incident, the vulnerability and risk of high-priority assets and the use of security resources through comprehensive reporting and easy to use dash-boards, security organizations can focus staff on high-risk issues and adapt and adjust policies, procedures and investments in order to mitigate risk. 1 RSA Solution Brief

The RSA envision Platform What Is It? Analysts agree that the RSA envision platform is a market-leading solution for security information and event management (SIEM). It gives organizations a single, integrated 3-in-1 log management solution for simplifying compliance, enhancing security operations and risk mitigation and optimizing IT and network operations through the automated collection, analysis, alerting, auditing, reporting and storage of all logs. Simplify compliance. Enhance security operations. Optimize network operations. Enhancing Operations Operations Role Responsibilities Data/Tools Needed RSA envision Solution CISO Interface between the business and Operations; set direction; justify budget status at a glance ; security metrics Graphical and tabular executive dashboards; extensive out-of-the-box reports Architect Design & maintain Policy and controls; general understanding of state of security and compliance Metrics to track effectiveness of policies and controls Extensive reports (security and compliance); out-ofthe-box and easy to customize dashboards; historical and trend reports Manager Oversee Operations resources and budgets; incident response oversight Resource and security metrics, including incident response statistics status and productivity dashboards including: team workload, incident rate, tasks by priority for workload management; and vulnerability dashboards including most vulnerable assets ranked by severity or by business rating Analyst Monitor consoles, device configuration & vulnerability management, detect incidents, respond to alerts, conduct investigations, manage incident resolution; provide technical advice Asset & vulnerability status, threat information, real-time and long-term event data, baseline, policy and identity information. Need collaborative incident handling process; tools to focus on high-risk incidents Baseline, event, asset and vulnerability data to reduce false positives and alert, in real-time, on high security-risk incidents; extensive content-rich correlation rules (e.g. SANS Top 20); automated Watchlists (e.g. Privileged User Monitoring); collaborative closed-loop incident handling process, from incident identification and research through resolution, closing and archiving RSA Solution Brief 2

Real-time Incident Detection Comprehensive log data Correlation rules, filters, watchlists Event source knowledge Incident Detection Timely threat information Asset context Vulnerability data Analyst Architect Real-Time, Actionable Information for Quick and Accurate Threat Detection and Alerting The RSA envision platform examines and analyzes events in real-time to detect and alert on high priority incidents. It combines best-of-breed log management capabilities, advanced correlation functions and comprehensive knowledge of threats and vulnerabilities to provide security organizations the ability to efficiently and accurately find the needle in the haystack. Event Data Collection The RSA envision platform was purpose-built to collect event data from any and every event source, including network, security, host and storage devices as well as applications and databases. With its LogSmart IPDB (Internet Protocol Data Base) architecture, RSA envision software collects events without agents, allowing for faster deployment and reduced ongoing management. It does not filter, reduce, normalize or alter the raw event information, allowing organizations to access complete data and therefore to identify an incident in real-time, investigate it, anticipate problems and conduct complete forensic analysis for internal or external auditors. Secure, scalable storage and industry-leading compression rates deliver a costeffective solution. Vulnerability and Asset Management The RSA envision platform gives event data additional context by combining it with data from vulnerability assessment tools and configuration management systems. This allows it to alert administrators when vulnerabilities appear on critical systems and prioritize security alerts based upon the value of the asset being attacked and its vulnerabilities. It also makes a rich set of contextual data available to analysts investigating security incidents so that they can make better decisions about how to respond. 3 RSA Solution Brief

Advanced Correlation Rules & Watchlists The RSA envision platform provides a wide set of content-rich correlation rules that define the conditions under which an alert or notification should be automatically triggered. These correlation rules can be easily enhanced with new content, and can be tailored to create environment-specific conditions that will detect risk and eliminate or reduce the window of exposure. With watchlists, organizations can easily create and update lists of mission critical assets, or of accepted (or forbidden) assets so that, for example, core business applications, privileged users, former employees, spammers, known hackers, or bot-net servers can be automatically monitored. The SANS Top 20 Watchlist, for instance, monitors for any exploit related to the SANS Top 20 list. Critical Activity Detection Critical Administrative Activity Suspicious User Activity High Risk Vulnerabilities Suspicious Network Activity Example Detect high-risk administrative actions on critical assets, like out-of-policy configuration changes to high- risk assets, or unusual privilege delegation Detect unusual authentication or access control issues, like multiple failed logons, or unauthorized system accesses Detect new high risk vulnerabilities on critical assets, or likely attacks on vulnerable hosts Detect unusual deviations in network behavior, or network activity that violates policy Timely Threat Information The RSA envision platform imports information from IDS/IPS devices commonly used by enterprises. These devices continually scan the network to detect occurring threats such as hackers attacking systems or gathering information from them. It also contains an embedded vulnerability repository derived from the Department of Homeland s National Vulnerability Database; it contains detailed descriptions about current vulnerabilities such as an explanation of its potential impact, the type of loss it can cause and an indication of how an exploit may result in a confidentiality breach. Critical Detect critical errors on high-priority systems System Errors that might result in a system outage The RSA envision platform thus performs the automatic correlation of security events with what is known about an IT asset, its priority to the business and its relative vulnerability. In this way, it dramatically reduces false positives and alerts on high-risk events, enabling the security operations team to take immediate action on prioritized incidents. A large global post-trade processing infrastructure company looking for multiple logging protocols, event aggregation and correlation, real-time alerts, privileged user monitoring and focused threat detection found that envision helped them find the needle in the haystack. [It] points us to the area to look for the needle and sometimes it puts the needle right on top of the haystack. RSA Solution Brief 4

Analyst Manager Streamlined Incident Handling Process RSA envision software provides real-time notification of high-risk security issues that need to be handled by security analysts and specialists. Whether in an e- mail, a console alert, or a blackberry message, a notification begins the incident handling process where the goal is to quickly reach effective resolution and closure. A closed-loop, collaborative process Examine all available information & supporting evidence with easy to use UI, broad search capabilities with contextual information including powerful asset and vulnerability lookup Sort, categorize & prioritize incoming incidents Triage Analysis Gather, document and preserve information and analysis of evidence; audit trail of complete investigation Reports on incident status Forensics Notification Track & Trace Close Accept status change from downstream ticketing system for complete closed-loop process Escalate and/or Remediate Trace views to monitor activity by user, IP address, etc. Automatically escalate to downstream systems (e.g. ticketing, configuration management) or to domain expert, and include all relevant annotations and log records Remediate: Track and document incident resolution/remediation 5 RSA Solution Brief

With an intuitive interface that supports the processes, workflows and procedures required by security operations organizations, the RSA envision platform provides a closed-loop, collaborative workflow that efficiently triages the incident to the appropriate security analyst/specialist; enables detailed analysis and forensics with access to comprehensive event, asset and vulnerability information; provides track and trace capabilities to monitor activity by user, IP address, etc., offers the ability to escalate incidents within security operations or to downstream systems (e.g. ticketing systems); accepts updates from downstream systems and monitors incident resolution through closure, and creates incident reports and dashboards. Incident Management Workflow Work queue Create record Automatically close task Annotate, escalate, close Notifications External ticketing system Logon of unauthorized user triggers an alert and creates a task. The task is automatically escalated to the external ticketing system. IT Operations disables the account and the task is closed via 2-way integration. Operations validates the remediation, updates the report. The closed task is saved. RSA Solution Brief 6

CISO Architect Manager Analyst Increased Visibility into the Effectiveness of Threat Detection & Measures and Resources Whether to get a snapshot of the overall state of security of the organization, to understand the vulnerability of key IT assets, or to assess the effectiveness of the security operations team, the security operations team needs quick access to information that will enable timely and accurate communication, decision-making and resource optimization. The RSA envision platform provides the complete range of monitoring and measurement information: from high-level graphical dashboards to detailed scheduled or on-demand reporting capabilities that can display essential data graphically or in tabular format. Incident Management Metrics and Dashboards operations management also needs easy Incident Management metrics and dashboards. With RSA envision software, managers can quickly assess the effectiveness of the security organization with pre-defined or customizable dashboards that present incident handling metrics such as: team workload including open incidents by owner incident rate recent activity closure rate average time to closure unacknowledged tasks Vulnerability Management Metrics and Dashboards operations management needs accurate, timely risk and vulnerability information that enable effective communication to the executive team and to the business. The RSA envision platform presents managers graphical dashboards and detailed reports that include: summarized asset risk (vulnerabilities, patches, etc) most vulnerable assets by severity most vulnerable assets by business rating incident trends Operations Dashboard for Incident Management Operations Dashboard for Vulnerability Management 7 RSA Solution Brief

Conclusion The RSA envision platform dramatically enhances the effectiveness and efficiency of security operations teams. By providing complete, in-depth data on events, assets, vulnerabilities and business priorities, and offering powerful correlation capabilities, organizations are alleviated from chasing false positives and can focus on the organization s high priority issues. By offering a collaborative, closed-loop incident handling process supported by rich content, comprehensive search function and drill-down forensic capability, organizations accelerate closure rates. By presenting informative, easy-to-use dashboards and reports, security management gets an accurate view of the state of security and can assess the effectiveness and efficiency of its security measures and organization. An end-to-end SIEM solution RSA envision 3-in-1 SIEM Platform The RSA envision platform offers an end-to-end SIEM solution that enables the transformation of security operations: it increases analyst productivity, provides security managers timely insight into their operations, enhances integration with enterprise systems all supported with rich content that evolves with business requirements and emerging threats. Its powerful 3-in-1 platform also dramatically simplifies compliance and provides essential information to IT & network operations teams. All within a single product. Simplifying Compliance Enhancing Optimizing IT & Network Operations Compliance reports for regulations and internal policy Real-time security alerting and analysis IT monitoring across the infrastructure Reporting Auditing Forensics Alert / correlation Network baseline Visibility Purpose-built database (IPDB) RSA envision Log Management platform devices Network devices Applications / databases Servers Storage RSA Solution Brief 8

Getting Started The RSA envision platform is designed for easy deployment and management. However, many organizations look for guidance and assistance to expedite time-to-value, facilitate the integration with existing systems and processes, establish best practices and to ensure the alignment of technologies with security goals or simply to complement in-house resources. With RSA Professional Services you get world-class expertise to guide solution planning, design and deployment. Smart, experienced, skilled and committed to your success, the people of RSA Professional Services can help you quickly achieve the benefits of proven RSA envision technology while reducing the risks often associated with new technology initiatives. 9 RSA Solution Brief

RSA Solution Brief 10

RSA is your trusted partner RSA, the Division of EMC, is the premier provider of security solutions for business acceleration, helping the world s leading organizations succeed by solving their most complex and sensitive security challenges. RSA s information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle no matter where it moves, who accesses it or how it is used. RSA offers industry-leading solutions in identity assurance & access control, data loss prevention & encryption, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.rsa.com and www.emc.com. RSA, RSA, Event Explorer, envision, LogSmart and the RSA logo are either registered trademarks or trademarks of RSA Inc. in the United States and/or other countries. EMC is a registered trademark of EMC. All other products or services mentioned are trademarks of their respective companies. 12 ENVSO SB 0209