THE EVOLUTION OF SIEM



Similar documents
Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

RSA Security Analytics

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Bridging the gap between COTS tool alerting and raw data analysis

Getting Ahead of Advanced Threats

Evolution Of Cyber Threats & Defense Approaches

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

The Next Generation Security Operations Center

SANS Top 20 Critical Controls for Effective Cyber Defense

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

IBM QRadar Security Intelligence April 2013

What s New in Security Analytics Be the Hunter.. Not the Hunted

Detect & Investigate Threats. OVERVIEW

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Advanced Threats: The New World Order

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Zak Khan Director, Advanced Cyber Defence

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

The SIEM Evaluator s Guide

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

The session is about to commence. Please switch your phone to silent!

AppGuard. Defeats Malware

Intelligence Driven Security

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM Security Intelligence Strategy

Security Intelligence

Hunting for the Undefined Threat: Advanced Analytics & Visualization

QRadar SIEM and Zscaler Nanolog Streaming Service

Eight Essential Elements for Effective Threat Intelligence Management May 2015

DYNAMIC DNS: DATA EXFILTRATION

Instilling Confidence in Security and Risk Operations with Behavioral Analytics and Contextualization

RSA Security Anatomy of an Attack Lessons learned

The Future of the Advanced SOC

QRadar SIEM and FireEye MPS Integration

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Integrating MSS, SEP and NGFW to catch targeted APTs

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber Situational Awareness for Enterprise Security

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

IBM SECURITY QRADAR INCIDENT FORENSICS

A New Perspective on Protecting Critical Networks from Attack:

The Role of Security Monitoring & SIEM in Risk Management

WHITE PAPER: THREAT INTELLIGENCE RANKING

Redefining SIEM to Real Time Security Intelligence

Discover & Investigate Advanced Threats. OVERVIEW

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

FIVE PRACTICAL STEPS

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Security Information and Event Management. White Paper. Expand the Power of SIEM with Real-Time Windows Security Intelligence

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

An Analytics-based Approach to Cybersecurity

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

SIEM is only as good as the data it consumes

The Importance of Cybersecurity Monitoring for Utilities

Win the race against time to stay ahead of cybercriminals

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Leverage security intelligence for retail organizations

Using Network Forensics to Visualize Advanced Persistent Threats

Cyber Watch. Written by Peter Buxbaum

Security Analytics for Smart Grid

End-user Security Analytics Strengthens Protection with ArcSight

Advanced Threat Protection with Dell SecureWorks Security Services

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

The Value of QRadar QFlow and QRadar VFlow for Security Intelligence

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Breach Found. Did It Hurt?

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Transcription:

THE EVOLUTION OF SIEM WHY IT IS CRITICAL TO MOVE BEYOND LOGS Despite increasing investments in security, breaches are still occurring at an alarming rate. 43% Traditional SIEMs have not evolved to meet the security challenge. Log-centric SIEMs can t defend against attacks. RSA Security Analytics addresses the gap left by log-centric SIEMs. among cyberespionage breaches 99%...You actually get more from Security Analytics than any other SIEM that I have. weeks or 83% took more to discover of companies experienced a data breach (SOURCE: VERIZON BREACH REPORT 2014) of successful attacks went undiscovered by logs 67% 5% took months to discover went unnoticed for years BOB CHEONG CISO / LOS ANGELES WORLD AIRPORTS

1 BEGINNING STATE REALITY OF LIVING IN THE PRE-EVOLUTION SECURITY WORLD Despite increasing investments in security, breaches are still occurring at an alarming rate. Whether the result of cyber criminals sending phishing or malware attacks through company emails, nation states targeting an organization s IP, or insiders misusing sensitive data, we live in a world where prevention of breaches has become impossible. Successful attacks bypass each layer of prevention that we have put in place because they often use valid user credentials, trusted access paths, or new exploits, thus going unnoticed by our preventative controls. Given the speed at which Cyber Criminals are able to create new Security Threats, companies must change their approach to Security.

2 BRINK OF EXTINCTION TRADITIONAL SIEMs HAVE NOT EVOLVED TO MEET THE SECURITY CHALLENGE SIEM systems were orginally intended for compliance and log management. Later they were used to detect and investigate attacks. However, log-centric SIEMs have several flaws that make it difficult to detect successful attacks and even more difficult to investigate them. Log-centric SIEMs give security personnel some level visibility of what is going on across the enterprise by connecting the dots between anomalies within the different layers of defense via logs. However, logs lack deep visibility and detail to understand what is truly happening in an environment. In fact, 99% of successful attacks went undiscovered by logs. (SOURCE: VERIZON BREACH REPORT 2014)

3 THE NEED TO EVOLVE LOG CENTRIC SIEMs CAN T DEFEND AGAINST ATTACKS Since companies have no choice but to allow some traffic to pass through all layers of defense in order to do business, traffic will need to flow through preventative controls. Logs only tell part of the story of what traffic makes it through. Log-centric SIEMs can only report on what the preventative controls have identified. However, they are unable to detect and investigate attack techniques such as unusual client activity, protocol anomalies, unauthorized connections, and suspected malware activity. As organizations add more preventative controls, the amount of data and events generated can overwhelm even the most mature security teams. This leads to even more noise, increasing the likelihood that the signals (clues about an attack) will get lost or take too long to spot. 83% of Cyber-Espionage Breaches took weeks or more to discover, while 67% took months to discover, with 5% going unnoticed for years. In fact,

4 THE EVOLUTION IS HERE MOVING BEYOND LOG-CENTRIC SIEM RSA Security Analytics addresses the log-centric SIEM problem in a very unique way. It can ingest log data just like a traditional SIEM, but it can also tap into traffic bypassing preventative controls by ingesting raw packet data to achieve much deeper visibility and provide a comprehensive view of the entire organization. Better yet, it amplifies the value of this data with Capture Time Data Enrichment, making it more effective for spotting and investigating attacks.

5 SURVIVAL OF THE FITTEST THIS IS WHAT YOUR SIEM WAS MEANT TO BE RSA Security Analytics is the only platform that can correlate security data across logs and packets (as well as Endpoints, Netflow, and Malware Analysis). Event correlation can now occur between a mix of both log and raw packet data allowing the analyst in-depth views of events at the defensive perimeter as well as within the legitimate and unauthorized network traffic that bypassed preventative controls. This offers organizations a unified platform for incident detection, investigations, compliance reporting, and advanced security analysis. With RSA Security Analytics, security teams can go from an alert to investigation to response faster and with more detail than any other tool. I selected the RSA Security Analytics solution to correlate logging events with egress traffic and match it with security intelligence feeds. This powerful correlation enables us to detect external and insider threats. Security Analytics has really improved our detection capability. BOB CHEONG CISO / LOS ANGELES WORLD AIRPORTS