SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Innovations in data security




Log management

        vs

     SIEM
    Andris Soroka
     07.07.2011



                    Together with
Agenda
 Introduction - threats, technology era, definitions

  Business drivers for log management and SIEM
(Security Information and Events Management)

 Market analysis, critical capabilities of solutions

 Selected solutions for Your review for -
    SEM (Log management)
    SEM (Wider scope)
    SIEM
Where to start from?


  Internet has been compared to America’s Wild Wild West
countless times – now the analogy holds more weight than ever.
No DNA forensics, no overarching laws – just lawlessness.
The 21st Century – the age of cybercrime




“Year 2010 was the year of cybercrime and
cyberwars. Year of Wikileaks”
“The New York Times”, “Guardian”, “Der Spiegel”, “El
Pais”, “Le Monde”, “CNN”, “BBC” and more. 2010,
2011..


FBI warns Congress that cybercriminals can hack
any internet-linked system
Gordon M. Snow, assistant director of the FBI’s Cyber Division
(13th of April, 2011)
Background - technology development



  IT continues taking the lead in business
(ERP, CRM, document management, digital
prototyping etc.)

  Importance and development of e-World
(e-Health, e-government, e-services, social
networking,      Web      2.0,      unified
communications and tools for that etc.)

  Mobility and borderless enterprise

  Cyber culture develops faster than cyber
security
Every technology is vulnerable
New threats – targeted, professional, silent


  There are Internet shops full of credit
card, bank account, privacy, business
and other confidential data. Also there
are available services to rent a botnet,
malicious code and attack anyone.

  Cybercriminal «CV Online»

  “Black        Community”          where
cybercriminals are organized better
than hi level military organizations

  Video trainings and eLearning
available in social media, such as
YouTube
Business drivers that initiate LM / SIEM


EU directives
    Such as for data protection
    Critical infrastructure protection
    Cooperation
Industry standards and regulations
    Banks
    Health organizations etc.
NATO directives
    Security, military orgs
    Related to NATO work
IT Security ISO 2700X
Local laws and regulations
    Personal data protection
    IT Security politics
SIEM / SEM / SIM - Where to start from?


   Do You have one, central
solutions for collecting ALL
events (logs), correlate them        Operational      IT & Network Identity        Governance &
                                     Security         Operations   Management      Compliance
and have real time intelligent                                Log
                                                                          Log

visibility?
                                                             Tool
                                                                          Silo           ?
                                                     ?             ?     ??????
                                                                            ?
                                                         ?
   Do   You   monitor   the                                ? ? ? ? ? ? ?????
                                                              ? ? ? ? ? ????
business processes instead                                       ? ? ? ?????
                                                   Log Jam

of network?                                                         ? ? ??
                                                                     ? ???
                                                                      ?? ?
                                                                           ??
                                                                         ?LOGS
  Do You monitor identities,
applications, information and
their context instead of just IP         Network         Servers       Databases    Homegrown
                                                                                    Applications
addresses,       OS’s       and
devices?
                               If not – You are vulnerable!!!
No, I mean, really…do You know?

Clear & concise delivery of the most relevant information …


                                 What was the
                                 attack?

                                                                             Was it
                  Who was                                                    successful?
                  responsible?




                                                           Where do I find
                                                           them?                How valuable are
           How many                                                             they to the business?
           targets
           involved?


                                         Are any of them
                                         vulnerable?



                                                  Where is all the
                                                  evidence?
What is in Your logs so far..? 50%? Less..?




    Failed Logon                        User and System Activity

                                          Privileges Assigned/
 Security Breach
                                          Changed

File Up/Download

     Credit Card
    Data Access
                    50%?               Runaway Application


                                       Customer Transaction

 Information Leak                      Email BCC
What is in Your logs so far..? 50%? Less..?


  What logs –                      From where -
     Audit logs                         Firewalls / Intrusion
     Transaction logs               prevention
     Intrusion logs                   Routers / Switches
     Connection logs                  Intrusion detection
     System        performance        Servers,         desktops,
   records                          mainframes
     User activity logs               Business applications
     Different systems alerts         Databases
   and different other systems        Antivirus software
   messages                           VPN’s

There is no standard format, transportation method for
 logs, there are more than 800 log file formats used..
Definitions from IT SecurityIntroduction / technologies –
                               solutions
   SEM – Security Events Management (Correlation – events
 relation together for security benefits)
   SIM – Security Information Management (Log
 management – e.g. collecting the events of the applications
 and operational systems.)
   SIEM (Security Information And Event Management)




      You cannot control what You cannot see!
SIEM evolution (from Anton Chuvakin blog)

Historically –
   1997-2002 IDS & Firewall
      Worms, alerts of overflow,
    packets etc.
      Sold as a “SOC in the box”

 2003 – 2007 Above + Server +
Context
     Users, compliance etc.
     Sold as a “SOC in the box” +

  2008+ Above + Applications +
     Cybercrime, fraud prevention,
   identity etc.
     Sold as a “SOC in the box”+++
Log management and intelligence




       Collect                       Alert                         Store                        Report
Time-stamping       and    Alerts based on real time    As much as you want,             Should have reasy to
secure collection of       log forensics according to   as little as your compliance     configure and report.
100% of all log data,      policies. According to       needs dictate. Automated,        Should be easy-to-use
100% of the time, from     anomalies, incidents. In     secure        storage     and    templates and more
any device, including      any possible alerting way.   archival of critical log data.   than     10K     custom
network,       storage,                                 Maintain chain of custody.       reports. Packaged SOX,
servers, applications!                                                                   PCI reporting + more.


                          Process Integration & Information Share
More about SIM / SEM / SIEM coverage

Scope of usage –
   SIM (log management) + SEM
      Standards such as –
          Syslog (Unix / Linux, network devices)
          Eventlog (Windows)
          Journals (mainframe, midrange..)
      Non standards such as logging into files and SQL
    databases
Usage
   Central monitoring, finding anomalies, reporting, alerting
   Collecting and archiving logs, forensics (search all over)
   Threat protection & discovery, incident response, audit support
Advantages / Disadvantages (not always)
    Scalability – security logs are only about 10% of all logs, but
 SIM solutions collect ALL logs correlation can be an issue later
    Functionality – correlated events from different sources is with
 different level than SIEM that is naturally designed to do so
More about SIM / SEM / SIEM coverage

Scope of usage and quality control
  SIEM – A must to have!
     Log and context data collection (SIM)
     Normalization and categorization (SIM)
     Correlation (SEM)
     Notification / Alerting (SEM)
     Prioritization (SEM)
     Dashboards and visualization
     Reporting and reports delivery (SIM)
     Security role workflow
  SIEM – next generation solutions work looking at level of –
     File integrity Monitoring
     Database Activity Monitoring
     Application Monitoring
     Identity Monitoring
     User Activity Monitoring
Planning a SIEM / LM project?

Planning areas (IN THAT ORDER! By Anton Chuvakin)
   Goals and requirements
   Functionality & features
   Scope and data collection
   Sizing
   Architecting
Deploy Log management before SIEM….
   Q: Why do You think most of the SIEM projects failed in
 past?
   A: There was no LM at place, SIEM alone is just not that
 useful..
Quality and innovations portfolio from DSS


 Market leadership in research of leading market analysts




  Close partnership with local competence                     center,
represented vendors and regional distributor



  Market industry   standards     and     international      quality
standards
Solutions to offer


SIM / SIM + SEM
   Balabit IT Security
       Syslog NG Store Box
       SSB + Sawmill

SIEM+
   Q1 Labs – The Market Leader
                                              Suspected
                                               Incidents
Balabit IT Security




  Founded in 2000, Hungary
  2nd fastest growing IT company in
CEE, listed in Deloitte’s Top50 research
  “The syslog -ng company” – open
source log collecting solution is used by
650000 customers world wide
  SIM (Log management) and more
Balabit IT Security


Syslog –ng Premium Edition
   TLS-encrypted communication
   Direct SQL Access
   More than 21 platform support
   Windows agent with AD
   IBM System I agent
Syslog –ng Store box
   Complete log lifecycle management
   Web based user interface
   75000 messages per second
   24GB messages per hour
   Encrypted communication, alerting, filtering etc.
Shell Control Box (“The Black Box”)
   Monitoring over admins
   Monitoring over outsourcers
Balabit IT Security
Balabit IT Security + Sawmill

                                                            Real Time ‘Live’ Reports

                                                                 Dynamic Reports
   Sawmill – software       Static Reports
                           for email/ publishing                                                    Real Time Alerts
package to analyze log
                             html/csv/pdf
files                          Reports
                                                                                                        Alerts

   Has more than 250000
customers world wide
   Works with more than                                  Reports & Report Filters                          ODBC




                                 Profiles &
                                 Schedules
800 different log file                                                Analysis
                                                                                                           MySQL
formats                                                              Database
                                                                                                         INTERNAL
   Extremely       great                                   Log Filtering & Parsing

reporting
   Licensed by report               Web Server      Security Logs     Network Logs     Streaming      Mail Server
                                     Log Files     Security Events   Network Events    Media Logs       Logs
profiles
                                                 Enterprise-wide                      analytics
                                                     ** 800+ different log formats supported **
Balabit IT Security + Sawmill


  Balabit syslog –ng is licensed by the number of log
sources hosts (LSH), licenses for 5,10,25,50,100,150,
250…Unlimited, unlimited costs about 25K Euro


  Balabit SSB is licensed same way, licensed for
50,100,250,500, 750,1000…Unlimited, depending on options
(HA, support, hardware:1U or 2U, architecture) project can be
between 25K – 150K Euro


  Sawmill is licensed by the number of report profiles created
and product type selected, can vary between 1K and 10K Euro
Q1 Labs SIEM Gartner
Q1 Labs business card




   Q1 Labs – a global leader    PCI   HIPAA   FISMA    CoCo   NERC   SOX

in SIEM market from USA
   Best price / performance
   Next generation SIEM
   +2000 customers world
wide
   Gartner 2009 / 2010 Magic
quadrant leader
   Biggest independent SIEM
vendor from leaders
   Out of box number of
compliances covered
Q1 Labs SIEM & much more


           Next-generation Log Management:
           •Turnkey log management
           •SME to Enterprise
           •Upgradeable to enterprise SIEM



           Next-generation SIEM:
           •Integrated log, cyber threat, risk and
           compliance management
           •Scalable, Automated, Broad market
           •Network activity information


            Next-generation Risk Management
            •Predictive threat modeling & simulation
            •Automated compliance and policy verification
            •Scalable configuration monitoring & audit
            •Advanced threat visualization/impact analysis


           Stackable Expansion:
           •Event Processors, High Availability
           •Network Activity Processors
           •Geographic distribution
           •Horizontal scale
           •Embedded, real-time database

           Application & Activity Monitoring:
           •Layer 7 application monitoring
           •Content Aware
           •Identity/user-based visibility of network and
           application activity
           •Provides visibility into physical and virtual
Q1 in action - Malware activity




              Potential Botnet Detected?
              This is as far as traditional SIEM can go.




            IRC on port 80?
            QFlow enables detection of a covert channel.




   Irrefutable Botnet Communication
   Layer 7 data contains botnet command and control
   instructions.
Q1 in action - User activity monitoring


                   Authentication Failures
               Perhaps a     user   who    forgot   their
               password?




                   Brute Force Password
                           Attack
               Numerous failed login attempts against
               different user accounts.




                      Host Compromised
                All this followed by a successful login.
                Automatically detected, no custom
                tuning required.
Q1 in action - complex threat detection



                                                  Sounds Nasty…
                                                  But how to we know this?

                                                  The evidence is a single click away.




Network Scan                         Buffer Overflow
Detected by QFlow                    Exploit attempt seen by Snort




                                                              Total Visibility
Targeted Host Vulnerable        Convergence of Network, Event and Vulnerability data.
Detected by Nessus
Q1 in action – data loss prevention


Potential Data Loss?
Who? What? Where?



                                     Who?
                                     An internal user




                                              What?
                                              Oracle data




                                               Where?
                                               Gmail
Q1 Labs in figures

   Based on selection, sizing,
requirements, targets there are
different models and ways how to
move forwards
       All-in-One solutions
       Distributed
           Console
           Flow processor
           Event processor
           Qflow collector
       Many upgrade possibilities
       HA and DR options
   Smallest all-in-one appliance
pricing starts with 30K Euro – ends
with ……depends on everything
Business & personal risk analysis matrix
“Data Security Solutions” can help



Specialization – IT Security

    IT Security consulting
 (vulnerability    assessment
 tests, security audit, new
 systems integration, HR
 training, technical support)

   Innovative & selected
 software / hardware & hybrid
 solutions     from    leading
 technology vendors from
 over 10 different countries
Think security first




  www.dss.lv
 andris@dss.lv
+371 2 9162784

Contenu connexe

Tendances

HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
Priyanshu Ratnakar
 

Tendances (20)

Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
cyber security
cyber securitycyber security
cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 

En vedette

Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log Management
Tripwire
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012
lennartkoopmann
 

En vedette (20)

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log Management
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Log management principle and usage
Log management principle and usageLog management principle and usage
Log management principle and usage
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
 
Log management
Log managementLog management
Log management
 
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
 
SOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchSOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire Research
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
 
Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
 

Similaire à SIEM vs Log Management - Data Security Solutions 2011

DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Andris Soroka
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
Antonio Fontes
 

Similaire à SIEM vs Log Management - Data Security Solutions 2011 (20)

DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs  SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short Article
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinUsing Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
 

Plus de Andris Soroka

Plus de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

SIEM vs Log Management - Data Security Solutions 2011

  • 1. Innovations in data security Log management vs SIEM Andris Soroka 07.07.2011 Together with
  • 2. Agenda Introduction - threats, technology era, definitions Business drivers for log management and SIEM (Security Information and Events Management) Market analysis, critical capabilities of solutions Selected solutions for Your review for - SEM (Log management) SEM (Wider scope) SIEM
  • 3. Where to start from? Internet has been compared to America’s Wild Wild West countless times – now the analogy holds more weight than ever. No DNA forensics, no overarching laws – just lawlessness.
  • 4. The 21st Century – the age of cybercrime “Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks” “The New York Times”, “Guardian”, “Der Spiegel”, “El Pais”, “Le Monde”, “CNN”, “BBC” and more. 2010, 2011.. FBI warns Congress that cybercriminals can hack any internet-linked system Gordon M. Snow, assistant director of the FBI’s Cyber Division (13th of April, 2011)
  • 5. Background - technology development IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.) Importance and development of e-World (e-Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for that etc.) Mobility and borderless enterprise Cyber culture develops faster than cyber security
  • 6. Every technology is vulnerable
  • 7. New threats – targeted, professional, silent There are Internet shops full of credit card, bank account, privacy, business and other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone. Cybercriminal «CV Online» “Black Community” where cybercriminals are organized better than hi level military organizations Video trainings and eLearning available in social media, such as YouTube
  • 8. Business drivers that initiate LM / SIEM EU directives Such as for data protection Critical infrastructure protection Cooperation Industry standards and regulations Banks Health organizations etc. NATO directives Security, military orgs Related to NATO work IT Security ISO 2700X Local laws and regulations Personal data protection IT Security politics
  • 9. SIEM / SEM / SIM - Where to start from? Do You have one, central solutions for collecting ALL events (logs), correlate them Operational IT & Network Identity Governance & Security Operations Management Compliance and have real time intelligent Log Log visibility? Tool Silo ? ? ? ?????? ? ? Do You monitor the ? ? ? ? ? ? ????? ? ? ? ? ? ???? business processes instead ? ? ? ????? Log Jam of network? ? ? ?? ? ??? ?? ? ?? ?LOGS Do You monitor identities, applications, information and their context instead of just IP Network Servers Databases Homegrown Applications addresses, OS’s and devices? If not – You are vulnerable!!!
  • 10. No, I mean, really…do You know? Clear & concise delivery of the most relevant information … What was the attack? Was it Who was successful? responsible? Where do I find them? How valuable are How many they to the business? targets involved? Are any of them vulnerable? Where is all the evidence?
  • 11. What is in Your logs so far..? 50%? Less..? Failed Logon User and System Activity Privileges Assigned/ Security Breach Changed File Up/Download Credit Card Data Access 50%? Runaway Application Customer Transaction Information Leak Email BCC
  • 12. What is in Your logs so far..? 50%? Less..? What logs – From where - Audit logs Firewalls / Intrusion Transaction logs prevention Intrusion logs Routers / Switches Connection logs Intrusion detection System performance Servers, desktops, records mainframes User activity logs Business applications Different systems alerts Databases and different other systems Antivirus software messages VPN’s There is no standard format, transportation method for logs, there are more than 800 log file formats used..
  • 13. Definitions from IT SecurityIntroduction / technologies – solutions SEM – Security Events Management (Correlation – events relation together for security benefits) SIM – Security Information Management (Log management – e.g. collecting the events of the applications and operational systems.) SIEM (Security Information And Event Management) You cannot control what You cannot see!
  • 14. SIEM evolution (from Anton Chuvakin blog) Historically – 1997-2002 IDS & Firewall Worms, alerts of overflow, packets etc. Sold as a “SOC in the box” 2003 – 2007 Above + Server + Context Users, compliance etc. Sold as a “SOC in the box” + 2008+ Above + Applications + Cybercrime, fraud prevention, identity etc. Sold as a “SOC in the box”+++
  • 15. Log management and intelligence Collect Alert Store Report Time-stamping and Alerts based on real time As much as you want, Should have reasy to secure collection of log forensics according to as little as your compliance configure and report. 100% of all log data, policies. According to needs dictate. Automated, Should be easy-to-use 100% of the time, from anomalies, incidents. In secure storage and templates and more any device, including any possible alerting way. archival of critical log data. than 10K custom network, storage, Maintain chain of custody. reports. Packaged SOX, servers, applications! PCI reporting + more. Process Integration & Information Share
  • 16. More about SIM / SEM / SIEM coverage Scope of usage – SIM (log management) + SEM Standards such as – Syslog (Unix / Linux, network devices) Eventlog (Windows) Journals (mainframe, midrange..) Non standards such as logging into files and SQL databases Usage Central monitoring, finding anomalies, reporting, alerting Collecting and archiving logs, forensics (search all over) Threat protection & discovery, incident response, audit support Advantages / Disadvantages (not always) Scalability – security logs are only about 10% of all logs, but SIM solutions collect ALL logs correlation can be an issue later Functionality – correlated events from different sources is with different level than SIEM that is naturally designed to do so
  • 17. More about SIM / SEM / SIEM coverage Scope of usage and quality control SIEM – A must to have! Log and context data collection (SIM) Normalization and categorization (SIM) Correlation (SEM) Notification / Alerting (SEM) Prioritization (SEM) Dashboards and visualization Reporting and reports delivery (SIM) Security role workflow SIEM – next generation solutions work looking at level of – File integrity Monitoring Database Activity Monitoring Application Monitoring Identity Monitoring User Activity Monitoring
  • 18. Planning a SIEM / LM project? Planning areas (IN THAT ORDER! By Anton Chuvakin) Goals and requirements Functionality & features Scope and data collection Sizing Architecting Deploy Log management before SIEM…. Q: Why do You think most of the SIEM projects failed in past? A: There was no LM at place, SIEM alone is just not that useful..
  • 19. Quality and innovations portfolio from DSS Market leadership in research of leading market analysts Close partnership with local competence center, represented vendors and regional distributor Market industry standards and international quality standards
  • 20. Solutions to offer SIM / SIM + SEM Balabit IT Security Syslog NG Store Box SSB + Sawmill SIEM+ Q1 Labs – The Market Leader Suspected Incidents
  • 21. Balabit IT Security Founded in 2000, Hungary 2nd fastest growing IT company in CEE, listed in Deloitte’s Top50 research “The syslog -ng company” – open source log collecting solution is used by 650000 customers world wide SIM (Log management) and more
  • 22. Balabit IT Security Syslog –ng Premium Edition TLS-encrypted communication Direct SQL Access More than 21 platform support Windows agent with AD IBM System I agent Syslog –ng Store box Complete log lifecycle management Web based user interface 75000 messages per second 24GB messages per hour Encrypted communication, alerting, filtering etc. Shell Control Box (“The Black Box”) Monitoring over admins Monitoring over outsourcers
  • 24. Balabit IT Security + Sawmill Real Time ‘Live’ Reports Dynamic Reports Sawmill – software Static Reports for email/ publishing Real Time Alerts package to analyze log html/csv/pdf files Reports Alerts Has more than 250000 customers world wide Works with more than Reports & Report Filters ODBC Profiles & Schedules 800 different log file Analysis MySQL formats Database INTERNAL Extremely great Log Filtering & Parsing reporting Licensed by report Web Server Security Logs Network Logs Streaming Mail Server Log Files Security Events Network Events Media Logs Logs profiles Enterprise-wide analytics ** 800+ different log formats supported **
  • 25. Balabit IT Security + Sawmill Balabit syslog –ng is licensed by the number of log sources hosts (LSH), licenses for 5,10,25,50,100,150, 250…Unlimited, unlimited costs about 25K Euro Balabit SSB is licensed same way, licensed for 50,100,250,500, 750,1000…Unlimited, depending on options (HA, support, hardware:1U or 2U, architecture) project can be between 25K – 150K Euro Sawmill is licensed by the number of report profiles created and product type selected, can vary between 1K and 10K Euro
  • 26. Q1 Labs SIEM Gartner
  • 27. Q1 Labs business card Q1 Labs – a global leader PCI HIPAA FISMA CoCo NERC SOX in SIEM market from USA Best price / performance Next generation SIEM +2000 customers world wide Gartner 2009 / 2010 Magic quadrant leader Biggest independent SIEM vendor from leaders Out of box number of compliances covered
  • 28. Q1 Labs SIEM & much more Next-generation Log Management: •Turnkey log management •SME to Enterprise •Upgradeable to enterprise SIEM Next-generation SIEM: •Integrated log, cyber threat, risk and compliance management •Scalable, Automated, Broad market •Network activity information Next-generation Risk Management •Predictive threat modeling & simulation •Automated compliance and policy verification •Scalable configuration monitoring & audit •Advanced threat visualization/impact analysis Stackable Expansion: •Event Processors, High Availability •Network Activity Processors •Geographic distribution •Horizontal scale •Embedded, real-time database Application & Activity Monitoring: •Layer 7 application monitoring •Content Aware •Identity/user-based visibility of network and application activity •Provides visibility into physical and virtual
  • 29. Q1 in action - Malware activity Potential Botnet Detected? This is as far as traditional SIEM can go. IRC on port 80? QFlow enables detection of a covert channel. Irrefutable Botnet Communication Layer 7 data contains botnet command and control instructions.
  • 30. Q1 in action - User activity monitoring Authentication Failures Perhaps a user who forgot their password? Brute Force Password Attack Numerous failed login attempts against different user accounts. Host Compromised All this followed by a successful login. Automatically detected, no custom tuning required.
  • 31. Q1 in action - complex threat detection Sounds Nasty… But how to we know this? The evidence is a single click away. Network Scan Buffer Overflow Detected by QFlow Exploit attempt seen by Snort Total Visibility Targeted Host Vulnerable Convergence of Network, Event and Vulnerability data. Detected by Nessus
  • 32. Q1 in action – data loss prevention Potential Data Loss? Who? What? Where? Who? An internal user What? Oracle data Where? Gmail
  • 33. Q1 Labs in figures Based on selection, sizing, requirements, targets there are different models and ways how to move forwards All-in-One solutions Distributed Console Flow processor Event processor Qflow collector Many upgrade possibilities HA and DR options Smallest all-in-one appliance pricing starts with 30K Euro – ends with ……depends on everything
  • 34. Business & personal risk analysis matrix
  • 35. “Data Security Solutions” can help Specialization – IT Security IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support) Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries
  • 36. Think security first www.dss.lv andris@dss.lv +371 2 9162784