The Evolution of Security Information & Event Management (and the technology that can take us there)

Similar documents
NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

NitroView Enterprise Security Manager (ESM), Enterprise Log Manager (ELM), & Receivers

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

The Sumo Logic Solution: Security and Compliance

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

How To Buy Nitro Security

High End Information Security Services

Boosting enterprise security with integrated log management

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

Swordfish

Detect & Investigate Threats. OVERVIEW

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Bridging the gap between COTS tool alerting and raw data analysis

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

TNT SOFTWARE White Paper Series

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

The Power And Use of FireScope Unify ESB

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

IBM Security IBM Corporation IBM Corporation

QRadar SIEM and FireEye MPS Integration

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

August Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Discover & Investigate Advanced Threats. OVERVIEW

Securing ephi with Effective Database Activity Monitoring. HIMSS Webcast 4/26/2011. p. 1

Enterprise Security Solutions

Tech Brief. Choosing the Right Log Management Product. By Michael Pastore

Secret Server Splunk Integration Guide

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Defending Against Cyber Attacks with SessionLevel Network Security

Security Information & Event Management (SIEM)

IBM SECURITY QRADAR INCIDENT FORENSICS

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Mucho Big Data y La Seguridad para cuándo?

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Concierge SIEM Reporting Overview

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

SANS Top 20 Critical Controls for Effective Cyber Defense

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

End-user Security Analytics Strengthens Protection with ArcSight

CONTINUOUS LOG MANAGEMENT & MONITORING

Machine Data Analytics with Sumo Logic

QRadar SIEM and Zscaler Nanolog Streaming Service

Next Generation Business Performance Management Solution

How To Manage Log Management

Clavister InSight TM. Protecting Values

Content Aware SIEM defined

How to Secure Your SharePoint Deployment

How To Manage Sourcefire From A Command Console

Comprehensive Advanced Threat Defense

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Continuous Network Monitoring

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

ThreatSpike Dome: A New Approach To Security Monitoring

Unified network traffic monitoring for physical and VMware environments

IBM Security QRadar SIEM Product Overview

Achieving PCI Compliance with Log Management

Feature. Log Management: A Pragmatic Approach to PCI DSS

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2

CLOUD GUARD UNIFIED ENTERPRISE

Compliance Management, made easy

IBM. Vulnerability scanning and best practices

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cover. White Paper. (nchronos 4.1)

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Best Practices for Database Security

Network Performance + Security Monitoring

Trend Micro. Advanced Security Built for the Cloud

White Paper. Imperva Data Security and Compliance Lifecycle

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

Detect, Prevent, and Deter Fraud in Big Data Environments

Attack Intelligence: Why It Matters

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Demonstrating the ROI for SIEM: Tales from the Trenches

GETTING MORE FOR LESS AS LOG MANAGEMENT AND SIEM CONVERGE

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

RSA Security Anatomy of an Attack Lessons learned

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

The SIEM Evaluator s Guide

Server Monitoring: Centralize and Win

PLA 7 WAYS TO USE LOG DATA FOR PROACTIVE PERFORMANCE MONITORING. [ WhitePaper ]

Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics

LOG MANAGEMENT: BEST PRACTICES

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

How to Develop a Log Management Strategy

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Transcription:

The Evolution of Security Information & Event Management (and the technology that can take us there) As the Security Information and Event Management (SIEM) market has matured, products within the market have lost the ability to quickly respond to threatening situations, and no longer meet the requirement to be a real- time decision support system (RTDSS). The root cause of the problem is the woefully inadequate scalability and performance characteristics of the underlying data management technologies used within these products; technologies that were not designed to address the requirements of this domain. The ever- growing types, volumes and rates of relevant security information have exposed these fundamental design shortcomings. Simply put, as the SIEM market has evolved, the market's products have devolved they no longer function as viable solutions for information security, and instead are limited to the role of compliance reporting tools that can only generate actionable intelligence in a few hours or days. The next evolution of SIEM overcomes the performance limitations of its predecessors. More systems must be monitored. All activity must be examined, and in greater detail all the way into the contents of applications and protocols. Most importantly, all of this information and the context around it must be readily available to the analyst, in order to provide real- time decision support. The new SIEM must be content- aware, highly scalable, and lightening fast. What is this new SIEM? It s called: NitroView

Table of Contents The Challenges of Legacy SIEMs... 3 The Functional Requirements and Architectural Limitations of Current-Generation SIEM...3 The Database Discussion...3 Breaking Through the Barrier...4 Total Manageable Event Volumes...5 Access to Historical Information...5 The Next Generation SIEM...6 Evolving SIEM Requirements...6 Log Collection & Management...6 Threat Detection...6 Content-Awareness...7 Reporting...8 Notification...8 Threat Investigation...8 Threat Remediation & Incident Response ( Zero Day Correlation )...8 Overcoming the Limitations of SIEM... 9 The NitroEDB Data Management Engine...9 The NitroICE Content Extraction Engine... 10 NitroView Enterprise Security Manager... 12

The Challenges of Legacy SIEMs The Functional Requirements & Architectural Limitations of Current- Generation SIEM All Security Information & Event Management systems (SIEMs) work in the same basic fashion: they collect information from a variety of sources, store that information, and provide a layer of analytics and reporting against it. How is Information Collected and Stored? When a SIEM collects an event (within this document, the term event will be used to identify any relevant piece of data obtained from a device notification, log, direct monitoring, or any other source), that event must be stored. Most SIEMs use either a commercial database (MySQL, Oracle, etc.), a commercially- derived database (an SQL variant), or a flat- file (a text- based data store). Upon collection, events are initially analyzed in order to identify the most important indicators of a threat. Such indications are presented via some sort of threat notification, by email, SNMP, or other means, and are often separated within the SIEM console to facilitate security management. Dashboards are often used to display summaries of the threats, although these dashboards are almost always static snapshots of very specific periods of time. Upon collection, the information source may either be parsed and indexed, or kept in its raw format. Raw storage is faster, yet provides limited analytical capabilities; indexed storage is typically slower, yet allows for correlation, data filtering, pivoting, and any number of other statistical and analytical operations. Because of this, most SIEM solutions parse and index information upon collection, while most Log Management solutions store raw log files. As the market evolved, Log Management and SIEM products converged, although because of this disparity no truly cohesive solution was found. The Database Discussion Why is database technology so important to SIEM? All security information managed by a SIEM needs to be collected stored and managed and the database is the weak link that has prevented most SIEMs from evolving. As more data is collected, the reaction time of the database decreases in every possible way. The keystone of the next evolution in SIEM technology, therefore, is the database. Without first overcoming the fundamental challenges of highly scalable, rapid data I/O and analysis, no SIEM can hope to operate effectively as a security operations tool.

The Performance Penalties of Parsing While unstructured data management is suitable for time- insensitive functions such as Log Management, the value of SIEM lies in the ability to manage structured information. The value of a SIEM therefore increases as the detail and granularity of the information being managed increases. Information is easier to manage if common data points IP address, user names, normalized event descriptions, etc. are organized and readily available. When an event source is parsed upon collection, the important information from that event is separated into defined indices within the database. However, all commercially available database and flat- file storage systems degrade in performance as the depth of indexing increases. Most SIEMs use thin event indexing to provide balance of manageability and performance. Indices consisting of: a timestamp; event identifiers; source and destination information; and a normalized event identifier (if supported) are adequate for high- level event and threat management, yet put less strain on the underlying system. Some more ambitious SIEMs opt to provide thick event indexing, expanding the number of indexes to include as many as a dozen relevant data- points, willingly sacrificing speed for the sake of more robust (yet much less responsive) analysis. Others index minimally or not at all for the sake of performance, and sacrifice data manageability instead. Breaking Through the Barrier The evolution of SIEM, not surprisingly, is highly dependent upon the ability to manage structured and unstructured data simultaneously. For structured analysis, data indexing is extremely important, as it is the fundamental mechanism used to search, compare, and analyze data in a meaningful manner. Without indexing, each analytical operation would require multiple, complete full- text search of all collected information, which would render most security functions inoperable. Unfortunately, even using optimized SQL or flat- file systems, performance of most functions begins to slow after the data store has either: Grown in size, to even just a few million events Grown in depth, to more than three or four key indices When even small networks can generate events at a rate of tens- of- thousands per seconderror! Bookmark not defined., this fundamental performance limitation has relegated the SIEM to the primary role of a post- incident reporting tool, providing limited value (if any) to real- time decision- making. To evolve, the SIEM must grow in both its breadth (scale) and depth (granularity) without losing its ability to analyze information in real time.

The Limitations of Legacy SIEM These underlying architectural deficiencies result in several inherent limitations. While these limitations may be problematic on their own, they also impede the evolution to more recent requirements of security information and event management systems (see Evolving SIEM Requirements below). Information Collection Rates Most legacy SIEM architectures are unable to scale beyond a few 10,000 s of events per second. Very high- end systems, using highly distributed database back- ends, may be able to achieve 100,000 events per second, but at elevated costs due to extreme hardware and processing requirements. While typical event rates in small to mid sized networks can easily reach 15,000 events per second, these limitations prevent the legacy SIEM from expanding visibility into deeper monitoring of database activity, applications, protocols, and network activity. These limitations also present deployment challenges in larger enterprise networks. Total Manageable Event Volumes Most legacy SIEM architectures will begin to show performance degradation after collecting just a million total events. However, event rates could potentially reach hundreds- of- millions of events per day, even in small to mid- sized networks. Access to Historical Information Most legacy SIEM architectures, due to the above limitation of total event volumes, are only capable of analyzing short periods of time: often less than thirty days, and in some cases only 24 hours. However, compliance requirements mandate a minimum of 90 days, and up to seven years of data retention; and forensics investigations often require the analysis of months or years of information.

The Next Generation SIEM Evolving SIEM Requirements According to Forrester s 2009 Market Overview or Security Information & Event Management, SIEMs need to perform the basic functions of collecting information; distilling it; storing it; hardening the logs (for compliance); and producing reports. However, the use of SIEM as an operational tool only occurs when the collection and distillation of information (getting data into a SIEM) and the reporting capabilities (getting information out of a SIEM) converge into an ongoing, real- time analysis. Not surprisingly, many legacy SIEM solutions are unable to achieve the simultaneous performance required to collect information and process it at high rates, and provide detailed reports and dashboards in real- time, so that any information or assessment stored within the SIEM can be produced as needed for the purposes of threat investigations, incident management, or remediation. This evolution ultimately requires improved performance and scalability of the entire SIEM architecture. Next- generation SIEMs such as NitroView Enterprise Security Manager must be capable of scaling well beyond the limitations of current systems. Next- generation SIEMs must be able to support hundreds of thousands of events per second, without impacting the analysis and reporting capabilities of the solution. These volumes of events must be kept available for analysis for longer periods of time from at least 90 days, to up to several years. Likewise, analysis and reporting performance must increase to the point where full historical information queries, relational lookups, and statistical operations occur in near- real- time in less than a minute, regardless of the total amount of information being stored, and without impacting the systems ability to collect new information. Expanding the underlying scalability and performance capabilities of the SIEM allows the SIEM to evolve, providing added value from each of its core functions: Log Collection & Management Legacy information management systems relied almost exclusively on device logs, including server logs, host logs, application logs, logs from firewalls, VPNs, intrusion prevention systems, etc. However, as SIEM evolves logs alone are no longer sufficient. Information that is necessary for security and compliance practices may not be available from logs, and so dedicated monitoring of critical assets is necessary. This is evident in the upsurge in Database Activity Monitoring (DAM) solutions, which monitor and track each and every database transaction. Likewise, Deep Packet Inspection (DPI) is increasingly used to monitor the contents of applications, documents, and protocols in an effort to gain a better insight into how data is being accessed and used. Threat Detection Threat detection in SIEM has occurred through event correlation, or the examination of event data to determine patterns, which in turn might indicate a larger threat. In this way, the SIEM was able to notify security analysts of possible threats that might otherwise be lost in the growing sea of event data. However, due to performance limitations of legacy systems, correlation had to be performed entirely in memory. While in- memory analysis is

fast enough to detect most threats, these systems lack scalability: memory is finite, limiting correlation to relatively short time periods. As SIEM evolves, the limitations of event correlation are also being overcome. The performance advantages of the next- generation SIEM allow stored data to be used in threat detection, supplementing the in- memory correlation that occurs during data collection. The result is a broader view of all security event data, and therefore a better overall detection capability capable of detecting low and slow attacks, and even helping to identify unknown threats, or zero day correlation (see sidebar: the Changing face of Correlation). Content- Awareness Legacy SIEM solutions had limited visibility into protocols and applications confined to what little information could be gleaned from application and server logs. Looking deeper into application activity would simply add too much strain to the already overtaxed management systems, making content awareness (full application awareness based on deep packet inspection) impossible to these legacy systems. Once the performance limitations are overcome, the SIEM is able to handle the extreme demands of content awareness. With deeper monitoring into real application and protocol use, threat detection capabilities of SIEM evolve even further, being able to detect the most sophisticated attacks, insider theft, fraudulent activity, and data leakage. The Changing face of Correlation There are several types of event correlation, all of which share a common goal: to find patterns indicative of larger threats from within the deluge of individual events. At it s most basic level, correlation looks for a sequence of events of time: if event A is followed by event B, within a given time- frame, assume the possibility of threat X. Slightly more advanced correlation will abandon the condition of sequence, and will indicate that a combination of events, in any order, might indicate a threat: if events A and B occur, in any order, within a given time- frame, assume the possibility of threat X. Both of these mechanisms rely on a finite period of observation: if the patterns do not fully appear within five minutes or ten minutes, the SIEM clears its memory and looks elsewhere. While much more complex event correlation is possible such as using Boolean logic, probabilistic analysis, or other more complex analytical methods there is a more immediate area where event correlation can be improved: in the ability to correlate events collected from disparate sources, or even from disparate networks. This is because, again, threat detection in the legacy SIEM is limited due to the underlying scale and scope limitations of the SIEM s data handling architecture. Without the underlying ability to look at all information systems consisting of much greater volumes of events, from more sources, over more time only a small subset of threats can be detected. The systems therefore are myopic, and can often cause more harm than good through the false promise of a security analyst in a box and a related false sense of security. As SIEM evolves, correlation is required across a broader array of sources, over longer periods of time, in order to detect more complex patterns. For example: when seen together, a network flow anomaly, a SQL injection attack, and a database policy violation might indicate a successful breach of a database. However, the data available within each event is decidedly different, requiring a flexible data management system to correlate each together. The limiting factor, again, is the core data management engine: a better answer to data collection, storage, and retrieval is required in order to allow SIEM to evolve to the next level.

Reporting In legacy systems, reporting consists of both pre- defined and customizable report templates. Reports are run against all stored information as well as any identified threats. These reports are mapped to the requirements of relevant regulatory compliance standards, such as NERC, HIPAA, PCI, and Sarbanes- Oxley (SOX). As SIEM evolves, the requirements of a reporting system evolve as well. Leveraging the real- time nature of the next- generation SIEM, reports become a dynamic process, where real- time dashboards provide a minute- by- minute assessment of what scheduled reports will indicate. This marriage of ongoing security operations and scheduled compliance reporting removes the possibilities of surprises during an audit: eliminating the added costs of secondary compliance audits, or even fines. Notification Notifications are a base function of SIEM, and are typically the result of an in- memory analysis at the time of collection. Simply, if a certain condition occurs, send an alert to an administrator so that immediate action can be taken. This could be the detection of a specific attack, the result of a correlation rule, or upon achieving a threshold. In the new generation of SIEM, more events are being generated, correlated and analyzed, and as such the mechanisms used for notification needs to allow for additional parameters including the ability to define thresholds on more sophisticated calculations, such as baselines and deviations. The next generation of SIEM must be able to produce this type of contextual analysis to support more intelligent notifications. Threat Investigation Legacy SIEMs perform threat investigation in a purely historical context, by allowing you to investigate the details of security incidents that have already occurred, in the past. As performance increases, the SIEM is able to evolve into a more active role. Users are now able to use the SIEM to quickly identify problems, diagnose them, and identify solutions to support real- time security operations. This can only be done if the SIEM is highly responsive to user input. Technically, high responsiveness boils down to how fast the SIEM can query data from its data manager while the data manager continues to support the other SIEM requirements. Threat Remediation & Incident Response ( Zero Day Correlation ) In order to be an effective mission critical decision support system, a SIEM must provide a rich and flexible set of analysis capabilities. Users need to be able to start with a high- level aggregated view with analytical attributes, quickly drill down into an interesting area, and continue this process all the way down to the fine details. Anywhere along the way, users need to be able to quickly cross- correlate what they are looking at with other data views. Additionally, users need to be able to quickly see how the data they are looking at compares to previous time periods, sometimes called time correlated analytics. For example, if a user is looking at data between noon and 1 pm on a Monday, it is essential to be able to compare this data to say the average of the equivalent data from the five previous Mondays between noon and 1 pm, the previous correlated time periods. Doing so allows a user to determine whether or not the data they are looking at is normal or abnormal. Finally, increasing the signal- to- noise- ratio of viewed data by correlating similar incoming data into a single compressed dataum is key to the effectiveness of user activities.

Overcoming the Limitations of SIEM The NitroEDB Data Management Engine Developed specifically for large- scale collection and real- time analysis of data The new requirements of SIEM Data Collection, Content- Awareness, Cross- Source Correlation, Real- Time Analytics, Long Term Storage and Analysis, and Real- Time Reporting will quickly overwhelm any legacy SIEM that uses a standard business- oriented SQL RDBMSs for its data manager. NitroEDB is able to support all of these requirements as the result of decades of R&D and experience in database technology, which provides a distinct and very important performance advantage over other database management systems and RDBMS. How? Because unlike other RDBMS systems, NitroEDB was designed for simultaneous event collection, analysis and reporting, at rates that far exceed the limitations of commercial RDBMS and even other custom database and flat- file systems used in the industry. NitroSecurity invested heavily in the research and development of NitroEDB, specifically to achieve these goals. The result is a highly optimized data management architecture, which uses patented techniques to improve performance and scalability in a variety of ways. NitroEDB Features Time Differentiated Subfields A NitroEDB unique feature specifically designed to maximize the efficient management of time- series data. Index Field Aggregates A NitroEDB unique capability specifically designed to minimize the execution time of analytical queries. Time-Series SQL Engine NitroEDB's unique SQL engine implements significant time- series oriented enhancements that leverage Time Differentiated Subfields, Index Field Aggregates, and other NitroEDB features and capabilities to minimize the execution time of complex analytical SQL queries.

NitroEDB Features (cont d) Diverse Indexes An index allows a data manager to find specific data quickly. In order to find many types of data quickly many indexes, or more diverse indexes, are required. NitroEDB's unique Diverse Indexes are much more useful than the indexes of other data management systems. Whereas typical indexes may support only a couple of query types, NitroEDB's Diverse Indexes can support many query types. The bottom line is that with Diverse Indexes much more data is effectively indexed, thus considerably decreasing query time, and considerably increasing insert rate. Time-Series Partitions One of the biggest problems in the management of time- series data is pruning the data set, keeping its size within acceptable limits. NitroEDB's unique Time- Series Partitions are a set- it- and- forget- it feature that makes pruning simple and efficient. Additionally, Time- Series Partitions maximize the advantages gained by the judicious utilization of high- speed storage technologies, such as RAM, and other solid state based, drives, and SAN. Partial Indexes Although not unique to NitroEDB, Partial Indexes are critical to maximizing the performance of data management, and are fully integrated into NitroEDB. Multi-Core Scalability Although not unique to NitroEDB, Multi- Core Scalability is critical to maximizing the performance of data management and leveraging the ever increasing number of CPU cores available on computational platforms, and is fully integrated into NitroEDB. NitroEDB Performance Depending upon the type of data being managed, the quantity of data being managed, and other factors, NitroEDB can operate at up to as much as 1000x faster than commercial RDBMS systems. Event collection Collection rates are increased through NitroEDB's indexing enhancements to support up to 100,000 events per second without event compression. With event compression, tens of millions of events per second can be supported on a single appliance. If even higher collection rates are required, multiple appliances can be used for even greater scalability. Correlation NitroEDB provides the performance needed for both real- time correlation and to correlate stores of information that have been collected over time, to spot "low- and- slow" attacks or other threats that might go undetected by normal correlation systems. Analysis NitroEDB performs baseline calculations in real- time, so that NitroView can provide historical context to any dashboard or report, automatically, in real- time. Reporting Reporting performance is also accelerated, generating reports on billions of events in just seconds.

The NitroICE Content Extraction Engine Deep Packet Inspection & Application Session Capture for full Content Awareness The NitroICE engine performs deep packet inspection, and fully decodes layer- 7 information, providing analysis of how applications and protocols are used on the network. This allows for the detection of protocol anomalies, as well as for the monitoring of application contents, for purposes of fraud detection and data leakage prevention. NitroICE allows detection rules to be triggered on user, application, client & host names; IP addresses and port numbers; email addresses, subject line; website url s; filenames, types & size; protocols, date- time, printer jobs; and even document contents (e.g. PII, PHI, etc). This allows NitroICE to detect: Application Violations Unauthorized use of applications such as IM, P2P, etc. Application Anomalies Unexpected use of authorized applications: large files, unexpected attachments, etc. Leakage of sensitive data via Email, Web Mail, IM/Chat, P2P apps, etc. User Violations deactivated or black- listed users Password Violations weak or default passwords Data Access Anomalies user access to sensitive content outside office hours Data Leakage sensitive data within chat or email, printed, etc. NitroICE is capable of decoding and analyzing over 550 applications, documents and protocols, including: File Transfer FTP, HTTP, SSL (setup certs only) Email SMTP, POP3, NNTP, MAPI Web Mail Hotmail, Hotmail Delta Sync, Yahoo mail, AOL mail, Gmail Chat MSN, AIM/ICQ, Yahoo, Jabber, IRC Peer-to-Peer File Sharing Gnutella Shell Telnet, SSH (detection Only) Printer PJL, IPP, LPD/LPR

NitroView Enterprise Security Manager The first and only Content- Aware SIEM NitroView represents the evolution of Security Information and Event Management (SIEM) into a fully context- aware, real- time security management platform. NitroView through the use of the NitroEDB, data management engine is able to collect, index, correlate, and store more information, from more sources, for longer periods of time. This includes the ability to collect application content, application session detail, database transactions, and network flows in addition to logs, extending the capability of NitroView far beyond that of a legacy SIEM. In addition, NitroView again as a result of the NitroEDB engine is able to retrieve stored data in real- time, providing immediate access to all information for rapid- response investigations. This makes NitroView unique: unlike legacy SIEMs, it is no longer bound to the role of a log collection and reporting tool. Instead it can be used as an integral part of ongoing, daily security operations: excelling at threat identification, investigation, mitigation, and remediation. In addition to the expected features of a SIEM (see An Overview of SIEM ), NitroView offers several unique features that are only possible because of the performance and scalability provided by the patented NitroEDB data management engine. These unique features include: Ad-hoc Data Drill-down Because of the deep indexing used within NitroView s core NitroEDB database, you can drill into any event, from any source, and immediately get contextual details about that event, including: o Asset Tables Operating System, OS version, Services, and other asset details that allow you to quickly see how any given data- point relates to specific systems within your network. o Asset Groups Customizable asset groups let you easily apply business and organization context. For example: all Windows systems running HTTP or HTTPS services that have public IP addresses, can easily be added to a Public Web Servers asset group. As servers are added and removed, the groups update automatically. o Associated Flows Network flow information provides valuable context to any event: including source and destination information, bytes transferred, duration, etc. o Event Details Quickly see other events associated to the source (or destination ) of an event, other users associated with similar events, the distribution of events over time, or even drill down into a specific event that occurred in a specific instance: all the way to the packet contents of that event. o Session Details If the event is associated with a database transaction, or a monitored application or protocol, then drilling into session detail is quick and easy: simply click show session and the entire session from login to logoff is displayed. o Vulnerability Information If an event or an asset is under investigation, knowing the vulnerabilities associated with it is important. With NitroView, simply

drill into vulnerability details to show all vulnerabilities associated with a given event or asset. NitroView s drill-down capabilities are the direct result of robust indexing within NitroEDB, providing over 40 indexed values that support details across a variety of data sources. The NitroICE engine in turn allows for full application and protocol decoding, making session detail available for storage within NitroEDB, and therefore visible to NitroView. While a SIEM built upon an RDBMS or proprietary flat-file system could support a similarly robust degree of indexing, the heavy impact on both collection and reporting performance on those systems prevents more than a few indexes from being used. Baseline thresholds All activity within NitroView is statistically analyzed in real- time. For example: in addition to knowing the total event volume at a given time, NitroView also understands the expected event volumes at that time and can issue a notification when that threshold is exceeded. This is a direct function of patented analytical capabilities built directly within NitroEDB. Other SIEMs would require continuous database queries and processor-intensive calculations to provide similar functionality. Dynamic Baselines Baseline information is also available across all of NitroView s UI, so that all dashboards can visually display baseline behavior and variations. These baselines update in real- time to provide constant, accurate trending information. This is a direct function of patented analytical capabilities built directly within NitroEDB. Other SIEMs would require continuous database queries and processor-intensive calculations to provide similar functionality. Event Data Enhancement Some event sources provide rich details about an event, and some do not. Some data sources, such as flow collectors, provide different details than others. Because NitroView is able to maintain a large number of diverse indices, the relational context between disparate events is sufficient to allow enhancement of light events with details provided from related heavy events, enhancing the context available to all collected information. NitroView s drill-down capabilities are the direct result of robust indexing within NitroEDB. Full VA Integration and Analysis Where most SIEMs simply adjust an event s severity based on VA data at the time of collection, NitroView is able to go further: storing all VA details including asset details and vulnerability details within NitroEDB. This extends the value of VA beyond severity ratings, exposing all details of collected assets and vulnerabilities to the full analytical capabilities of NitroView including event correlation. The collection, indexing and storage of the additional information required to achieve this level of VA integration requires the performance and scalability capabilities of NitroEDB. Multi-Source & Diverse Correlation Correlating logs from multiple sources is within the capability of most legacy SIEMs. However, in order to support correlation between highly disparate sources such as logs, network flows, database transactions, application contents and sessions, etc. requires a very fast event collection capability. Legacy SIEMs can perform correlation at these rates through in- memory analysis, but lack the capability to store all source events, limiting their usefulness for forensics purposes. NitroEDB allows NitroView to store all of the diverse events used to perform correlation, event at very high rates of tens-of-thousands to (using aggregation) tens-of-millions of events per second.

Real-Time Data Linking in Dashboards NitroView s dashboards support data- linking: so that each element of the dashboard is conditionality linked to other elements in the dashboard. This allows one click filtering of even very complex dashboards, to instantly narrow the results displayed to the specific item(s) that you re interested in. Because each linked item represents a conditional query to the database, the database itself must support very high query speeds in order to support this feature. NitroEDB provides the performance necessary to support multiple, conditional queries against very large data sets, returning the results quickly enough to allow the dashboards to update in near real time. Real-Time Reporting, Searches and Queries Reports spanning very long time periods, and/or providing the complex filters that are required to produce compliance- specific reports, can take hours to complete in legacy SIEMs. With NitroView, these reports can be produced in seconds, allowing long term operations such as compliance reporting to be used more tactically for example, through the use of real- time compliance reports to assess compliance issues as they occur, so that compliance audits will show a more attentive and secure infrastructure. Likewise, when investigating a threat or responding to an incident, the real- time capabilities of NitroView allow a security analyst to easily pursue what if scenarios, investigating in a more intuitive, ad- hoc manner. Searching for specific details, drilling into events, pivoting data to see other related events, etc. Conclusion As threats become more complex, and as the consequences of a breach grow more severe, Security Information and Event Management Systems (SIEMs) need to evolve, becoming operational tools that support minute- by- minute decision making. Legacy SIEM solutions, crippled by the inherent limitations of SQL and flat- file data storage techniques, must first overcome a fundamental performance barrier in order to provide the real- time services that are required. Once these issues of performance and scale are overcome as it has been with NitroView Enterprise Security Manager and the NitroEDB data management engine the SIEM can evolve to the next level, where more information is being managed and analyzed in new and more sophisticated ways. Security information can be analyzed in more depth all the way to the content of an application or protocol. Correlation can become broader, allowing threat detection to consider the context of users, privileges, policies, assets and applications. Incident response, of course, becomes more rapid a direct result of the new performance requirements of the next generation SIEM.