SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
CHANGING THE SECURITY
MONITORING STATUS QUO
Solving SIEM problems with RSA Security Analytics
RSA Security Analytics is a new way
of looking at SIEM
Brings together traditional SIEM,
Network Security Monitoring, Big Data
Management & Analytics
Next generation unified platform for:
 Security monitoring
 Incident investigations
 Compliance reporting
TRADITIONAL SIEMS ARE SHOWING THEIR AGE
Security Information and Event Management (SIEM) tools have been a staple tool of
security analysts and Security Operations Centers for over ten years. They have been
essential in satisfying log related compliance requirements, correlating and prioritizing
alerts, and making diverse and distributed system logs centrally available to security
analysts to speed up incident investigations. Security teams generally have had
considerable success implementing SIEMs to gain visibility where they previously had
none, and to automate the previously highly manual process of generating compliance
reports.
However, traditional SIEMs have limitations, and many security teams have become
frustrated when they try to get more value, particularly security value, from their
current SIEM solutions. There are multiple reasons for this:
 Today’s threats are much more multifaceted and more dynamic and
stealthy than in the past. Much more advanced tools and techniques are
now needed to detect and investigate them
 The most dangerous attacks, almost by definition, have never been seen
before – that means exclusively looking for “known bad” sequences of
events won't work.
 The status quo approach of collecting more and more logs from more and
more sources won’t help in detecting and responding to advanced
threats. Logs are inherently limited in the level of security visibility that
they provide.
SIEM tools need Innovation
To remain relevant to security analysts, SIEM tools need to be able to detect today’s
threats. This means being able to detect and investigate the most effective current
attack techniques, including:
 Lateral movement of threats across an organization’s network. Today's
threats often use general user workstations to gain a foothold in the
organization rather than doing so on heavily monitored, critical systems
which would create log events. Attackers use these workstations to gain
information about more privileged users and systems, such as IT
administrators or highly privileged employees. Since SIEMs are not
focused on monitoring these non-critical systems, they are ineffective
against threats that use this approach.
 Covert characteristics of attack tactics, techniques & procedures. Modern
threats often make themselves difficult to detect by masquerading as
innocent traffic – like standard web traffic - or by hiding zero-day malware
payloads in common files like pdfs or jpgs. These techniques are generally
not recorded in systems logs or in NetFlow and therefore will easily evade
current SIEM solutions which depend on those data sources.
 Exfiltration or sabotage of critical data. In the event of an attack, to
respond appropriately security analysts must be able to determine the
impact of the attack, and be able to see exactly the information that the
attacker stole.
Today’s IT environments are much more complex than they were just a few years ago.
They are larger, more diverse and continually use new technologies to build and deploy
applications. Security monitoring tools need to be able to scale to cope with the today’s
data realities, namely:
 The volume and variety of data that need to be captured has increased
exponentially. Although logs are still highly useful for an effective
compliance and security monitoring program, it is no longer sufficient to
rely solely on log information to understand what is going on in the
environment. In addition to capturing logs we also need much more
detailed information and context about the users or systems that are
being monitored.
 Navigating larger and vastly more diverse datasets requires purpose built
security analytic tools to provide fast, accurate and unified support of
security detection and investigations, including alert prioritization and
response, report generation, incident investigation, and malware analysis.
In a breach situation, the time taken to respond is critical. Executives and IT personnel
alike need answers to very specific questions to determine the right course of action.
They need fast, accurate and detailed information – and today’s SIEMs often fall short
– since analysts often cannot get the response times they need out of these systems.
RSA SECURITY ANALYTICS PROVIDES A
DIFFERENT APPROACH
RSA Security Analytics is the security solution that enables comprehensive security
monitoring, incident detection and investigation, long term archiving and analytics, Big
Data analytics, malware analytics, and compliance reporting via a unified, browser-
based interface. It enables security analysts to be more effective and efficient in their
job of protecting the organization's digital assets and IT systems. RSA Security
Analytics provides:
 A single platform for capturing and analyzing large amounts of log data
alongside full network sessions and other data
 Up-to-the-minute threat intelligence, including rules, views, parsers,
reports and watchlists, automatically distributed to customer installations
 Capture time data enrichment providing efficient indexing, storage,
search-ability, and indications of compromise
 Big Data architecture for archiving and analysis of long term security data,
delivering high performance and scalability.
 Compliance reporting through its data management infrastructure
incorporating both data parsing and full text search.
RSA Security Analytics addresses common SIEM use
cases better than traditional SIEM tools
Security Analytics satisfies common SIEM security oriented use cases, by collecting and
analyzing log and network packet information. These use cases include the following:
Use case RSA Security Analytics Alert/Report
example
Unauthorized privileged access Administrative commands (e.g. su,
useradd) from a username not in a list of
administrators
Unusual commands being executed on a
critical system
Unusual protocol use Unexpected protocol hitting a
firewall/gateway
Large file transfers across a gateway
Virus outbreak High # of alerts from the
organization’sAV systems
Trojan Backdoor use Specific event classes from an IDS
Abnormal system access High # of failed logons from a given IP
address
Access from an unexpected geography
Unauthorized account administration Account enable from list of locked
accounts
Access policies Access from an unauthorized location
When detecting threats or policy violations, RSA Security Analytics can generate
notifications, provide interactive alerts, and provide context as part of a scheduled
alert. Security analysts can personalize how they want to consume specific types of
information based upon its security and business impact.
In addition to detecting threats or policy violations, RSA Security Analytics also
provides a wide range of out-of-the-box compliance reports, aligned to common
regulations across several legal jurisdictions.
Geography Compliance Reports
Global ISO27002, Basel II, PCI
US SOX, HIPAA, FISMA, FERPA, FFIEC,
GLBA, NISPOM, NERC, SSAE 16
Canada Bill 198
UK GPG13
SECURITY ANALYTICS TAKES NEW APPROACH
TO SOLVING SIEM USE CASES
There are several common SIEM use cases where Security Analytics takes a different,
more effective approach to detecting threats.
Example: Account takeover
Account takeover commonly occurs when an attacker uses brute force or other means
to take over a legitimate account and thus be able to execute the attack using a
legitimate user’s account. This gives the attacker a useful platform to launch the next
stage of the attack.
The traditional SIEM approach to detecting account takeover is to create an alert for
very obvious signs of account compromise - like creating a correlated alert for several
failed logons followed by a successful logon. The problem with this approach is that it
creates a large amount of noise – as legitimate users often have problems
remembering and typing their password. Also, a determined attacker can easily evade
detection by adopting a “low and slow” approach - spreading out access attempts over
a long period of time.
RSA Security Analytics takes a different approach to detecting this attack by flagging
log or network sessions with common signs of attack activity. For example:
 High # of failed logons originating from a particular IP address
 Host or user accessing critical assets
 Common bot protocols being used
 Nonstandard user tools being used (i.e. not IE, Outlook, Chrome, Mozilla,
Safari etc)
 Unexpected source geography
A single instance of or a combination of these indicators is a much better way to detect
account takeover than trying to use a rules based approach. Some of these indicators
require full network session collection and reconstruction, but others can be detected
through more effective log analysis alone.
Example: Known attack pattern
Security teams often use SIEMs (via correlation rules) to look for specific attack
patterns that that they or peer organizations have experienced before. They often
create correlated alerts for specific sequences – e.g. a series of failed logons, followed
by a successful logon, followed by a connection to a database, followed by a connection
to a specific geography.
The problem with this approach is that any slight variation of the attack will “fool” the
SIEM. The rule outlined above is too rigid given today’s targeted attacks. Also, in a
traditional SIEM any rule can only rely on indicators found in logs, whereas many
indicators leave no log footprint. Finally, using a SIEM to look at the universe of
possible attack vectors and variations will easily overwhelm the SIEM with data and
calculations, and thus stop it from functioning normally.
RSA Security Analytics approach takes a new approach to threat detection which not
only provides the speed and smarts to be effective, but it also has the ability to detect
unknown attacks as opposed to only known attacks and attack methods. The RSA
Security Analytics approach allows analysts to detect more insightful indicators, such
as the ability to:
 Flag the log or session with known attack indicators - e.g. high # of failed
logons, use of nonstandard protocols, unexpected use of scripting
languages, unexpected source or destination IP addresses
 Scope the traffic from IP addresses or users that are also communicating
with critical assets
 Replay entire sessions to give comprehensive investigative context
Example: Beaconing host
The term “beaconing” is used to describe the regular communication of a host with a
Command and Control (C2) host on the Internet. Most beaconing happens on a regular
schedule – say every three hours - and is easy to spot visually when you isolate the
traffic between the two hosts, either through firewall or router logs, or through
monitoring at an egress point.
Traditional SIEMs are generally only be able rely on a list of known C2 hosts, but could
not detect beaconing to an unknown C2 host. This is important since C2 sites come and
go frequently
RSA Security Analytics uses the flexibility and processing power of the Security
Analytics Warehouse to discover beaconing by identifying all hosts that:
 Communicate with the same host out on the Internet more than 6 times
in a 24 hour period, AND
 The interval between consecutive communications has a low standard
deviation i.e. happens on a regular cadence rather than in a more
random, human behavior
RSA SECURITY ANALYTICS ARCHITECTURE
RSA Security Analytics is a distributed and modular system that enables highly flexible
deployment architectures that scales with the needs of the organization.
Key components of the architecture include:
 DECODER - Captures, parses, and reconstructs, all network traffic from
Layers 2-7 or log and event data from hundreds of devices.
 CONCENTRATOR - Indexes metadata extracted from network or log data
and makes it available for enterprise-wide querying and real-time
analytics while also facilitating reporting and alerting.
 ANALYTIC SERVER/BROKER - Hosts the web server for reporting,
investigation, administration, and other aspects of the analyst’s interface.
Bridges the multiple real-time data stores held in the various
decoder/concentrator pairs throughout the infrastructure. Also enables
reporting on data held in the Warehouse and in archived storage.
 EVENT STREAM ANALYSIS ENGINE - Processes large volumes of disparate
event data and brings meaning through correlation to the events flowing
through your enterprise.
 ARCHIVER - Indexes and compresses log data and sends to archiving
storage. The archiving storage is then optimized for long term data
retention through compression, forensic analysis, and compliance
reporting.
 WAREHOUSE - Hadoop based distributed computing system which
collects, manages, and enables advanced analytics and reporting on
longer term sets of various security data. The Warehouse can be made
up of 3 or more nodes depending on the organization's analytic, and
resiliency requirements.
 CAPACITY - RSA Security Analytics has a modular-capacity architecture,
enabled with direct-attached capacity (DACs) or storage area networks
(SANs), that adapt to the organization's short-term investigation and
longer-term analytic and data-retention needs.
RSA SECURITY ANALYTICS BREAKS SIEM
STAGNATION
SIEMs and log management tools can be very useful by providing a centralized view
into disparate log sources and by streamlining the compliance reporting process.
However, they commonly fall far short in their detection of modern threats and
determining exactly what happened and what its impact is on the organization.
To adapt to the changing threat landscape and the evolving requirements of security
teams, SIEM tools need to change radically. Through its high powered analytic
interface, scalable infrastructure, ability to collect and analyze both log and full network
session data, combined with up-to-the-minute threat intelligence, RSA Security
Analytics provides the next generation security system to detect and investigate
threats.
CONTACT US
To learn more about how EMC
products, services, and solutions can
help solve your business and IT
challenges, contact your local
representative or authorized reseller—
or visit us at www.EMC.com/rsa..
www.EMC.com/rsa
EMC2
, EMC, the EMC logo, RSA, the RSA logo are registered trademarks or trademarks of EMC
Corporation in the United States and other countries. VMware are registered trademarks or
trademarks of VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC
Corporation. All rights reserved. Published in the USA. 05/14 Solution Overview SA-LWP-0113
EMC believes the information in this document is accurate as of its publication date. The information
is subject to change without notice.

Contenu connexe

Tendances

CISCO SECURITY INTELLIGENCE OPERATIONS SIO
CISCO SECURITY INTELLIGENCE OPERATIONS SIOCISCO SECURITY INTELLIGENCE OPERATIONS SIO
CISCO SECURITY INTELLIGENCE OPERATIONS SIOHappy Sad
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Alert Logic
 
SecureWorks
SecureWorksSecureWorks
SecureWorksjduhaime
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementInfo-Tech Research Group
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and LessonsAnton Chuvakin
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integrationMichael Nickle
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 

Tendances (20)

CISCO SECURITY INTELLIGENCE OPERATIONS SIO
CISCO SECURITY INTELLIGENCE OPERATIONS SIOCISCO SECURITY INTELLIGENCE OPERATIONS SIO
CISCO SECURITY INTELLIGENCE OPERATIONS SIO
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
What is SIEM
What is SIEMWhat is SIEM
What is SIEM
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Vendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event ManagementVendor Landscape: Security Information and Event Management
Vendor Landscape: Security Information and Event Management
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Ca world 2007 SOC integration
Ca world 2007 SOC integrationCa world 2007 SOC integration
Ca world 2007 SOC integration
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 

En vedette

10 countries comparison
10 countries comparison10 countries comparison
10 countries comparisonTravis Klein
 
Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...
Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...
Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...EMC
 
цахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмжцахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмжpvsa_8990
 
White Paper: Configuring a Customized Session Identifier in Documentum Web De...
White Paper: Configuring a Customized Session Identifier in Documentum Web De...White Paper: Configuring a Customized Session Identifier in Documentum Web De...
White Paper: Configuring a Customized Session Identifier in Documentum Web De...EMC
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...EMC
 
тестээр үнэлэх
тестээр үнэлэхтестээр үнэлэх
тестээр үнэлэхpvsa_8990
 
GDDR Solution Design and Implementation Techniques
GDDR Solution Design and Implementation Techniques GDDR Solution Design and Implementation Techniques
GDDR Solution Design and Implementation Techniques EMC
 
Germansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_norGermansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_norSebastian Hübner
 
Presentación Jorge Quiroga para el SME Digital Forum 2012
Presentación Jorge Quiroga para el SME Digital Forum 2012Presentación Jorge Quiroga para el SME Digital Forum 2012
Presentación Jorge Quiroga para el SME Digital Forum 2012SME Puerto Rico
 

En vedette (15)

10 countries comparison
10 countries comparison10 countries comparison
10 countries comparison
 
Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...
Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...
Rethink Storage: Transform the Data Center with EMC ViPR Software-Defined Sto...
 
цахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмжцахим хичээлийн зөвлөмж
цахим хичээлийн зөвлөмж
 
White Paper: Configuring a Customized Session Identifier in Documentum Web De...
White Paper: Configuring a Customized Session Identifier in Documentum Web De...White Paper: Configuring a Customized Session Identifier in Documentum Web De...
White Paper: Configuring a Customized Session Identifier in Documentum Web De...
 
Factor markets
Factor marketsFactor markets
Factor markets
 
Gambia23
Gambia23Gambia23
Gambia23
 
Valentine & Kebartas
Valentine & KebartasValentine & Kebartas
Valentine & Kebartas
 
Propuesta de informática
Propuesta de informáticaPropuesta de informática
Propuesta de informática
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
 
тестээр үнэлэх
тестээр үнэлэхтестээр үнэлэх
тестээр үнэлэх
 
GDDR Solution Design and Implementation Techniques
GDDR Solution Design and Implementation Techniques GDDR Solution Design and Implementation Techniques
GDDR Solution Design and Implementation Techniques
 
Germansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_norGermansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_nor
 
How to achieve a more agile and dynamic IT environment
How to achieve a more agile and dynamic IT environmentHow to achieve a more agile and dynamic IT environment
How to achieve a more agile and dynamic IT environment
 
Presentación Jorge Quiroga para el SME Digital Forum 2012
Presentación Jorge Quiroga para el SME Digital Forum 2012Presentación Jorge Quiroga para el SME Digital Forum 2012
Presentación Jorge Quiroga para el SME Digital Forum 2012
 
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud InfrastructurePrivate Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
 

Similaire à Changing the Security Monitoring Status Quo

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyJonathanPritchard12
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystInfosecTrain
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
SIEM POC Assessment.pdf
SIEM POC Assessment.pdfSIEM POC Assessment.pdf
SIEM POC Assessment.pdfReZa AdineH
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09pladott11
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptxneoalt
 
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?Aujas
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0Happiest Minds Technologies
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
The Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration ToolsThe Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration Toolssecuraa
 

Similaire à Changing the Security Monitoring Status Quo (20)

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analyst
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
SIEM POC Assessment.pdf
SIEM POC Assessment.pdfSIEM POC Assessment.pdf
SIEM POC Assessment.pdf
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
Event mgt feb09
Event mgt feb09Event mgt feb09
Event mgt feb09
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
The Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration ToolsThe Fundamentals and Significance of Security Orchestration Tools
The Fundamentals and Significance of Security Orchestration Tools
 

Plus de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Plus de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Dernier

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Dernier (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Changing the Security Monitoring Status Quo

  • 1. CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics RSA Security Analytics is a new way of looking at SIEM Brings together traditional SIEM, Network Security Monitoring, Big Data Management & Analytics Next generation unified platform for:  Security monitoring  Incident investigations  Compliance reporting TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a staple tool of security analysts and Security Operations Centers for over ten years. They have been essential in satisfying log related compliance requirements, correlating and prioritizing alerts, and making diverse and distributed system logs centrally available to security analysts to speed up incident investigations. Security teams generally have had considerable success implementing SIEMs to gain visibility where they previously had none, and to automate the previously highly manual process of generating compliance reports. However, traditional SIEMs have limitations, and many security teams have become frustrated when they try to get more value, particularly security value, from their current SIEM solutions. There are multiple reasons for this:  Today’s threats are much more multifaceted and more dynamic and stealthy than in the past. Much more advanced tools and techniques are now needed to detect and investigate them  The most dangerous attacks, almost by definition, have never been seen before – that means exclusively looking for “known bad” sequences of events won't work.  The status quo approach of collecting more and more logs from more and more sources won’t help in detecting and responding to advanced threats. Logs are inherently limited in the level of security visibility that they provide. SIEM tools need Innovation To remain relevant to security analysts, SIEM tools need to be able to detect today’s threats. This means being able to detect and investigate the most effective current attack techniques, including:  Lateral movement of threats across an organization’s network. Today's threats often use general user workstations to gain a foothold in the organization rather than doing so on heavily monitored, critical systems which would create log events. Attackers use these workstations to gain information about more privileged users and systems, such as IT administrators or highly privileged employees. Since SIEMs are not focused on monitoring these non-critical systems, they are ineffective against threats that use this approach.
  • 2.  Covert characteristics of attack tactics, techniques & procedures. Modern threats often make themselves difficult to detect by masquerading as innocent traffic – like standard web traffic - or by hiding zero-day malware payloads in common files like pdfs or jpgs. These techniques are generally not recorded in systems logs or in NetFlow and therefore will easily evade current SIEM solutions which depend on those data sources.  Exfiltration or sabotage of critical data. In the event of an attack, to respond appropriately security analysts must be able to determine the impact of the attack, and be able to see exactly the information that the attacker stole. Today’s IT environments are much more complex than they were just a few years ago. They are larger, more diverse and continually use new technologies to build and deploy applications. Security monitoring tools need to be able to scale to cope with the today’s data realities, namely:  The volume and variety of data that need to be captured has increased exponentially. Although logs are still highly useful for an effective compliance and security monitoring program, it is no longer sufficient to rely solely on log information to understand what is going on in the environment. In addition to capturing logs we also need much more detailed information and context about the users or systems that are being monitored.  Navigating larger and vastly more diverse datasets requires purpose built security analytic tools to provide fast, accurate and unified support of security detection and investigations, including alert prioritization and response, report generation, incident investigation, and malware analysis. In a breach situation, the time taken to respond is critical. Executives and IT personnel alike need answers to very specific questions to determine the right course of action. They need fast, accurate and detailed information – and today’s SIEMs often fall short – since analysts often cannot get the response times they need out of these systems. RSA SECURITY ANALYTICS PROVIDES A DIFFERENT APPROACH RSA Security Analytics is the security solution that enables comprehensive security monitoring, incident detection and investigation, long term archiving and analytics, Big Data analytics, malware analytics, and compliance reporting via a unified, browser- based interface. It enables security analysts to be more effective and efficient in their job of protecting the organization's digital assets and IT systems. RSA Security Analytics provides:  A single platform for capturing and analyzing large amounts of log data alongside full network sessions and other data  Up-to-the-minute threat intelligence, including rules, views, parsers, reports and watchlists, automatically distributed to customer installations  Capture time data enrichment providing efficient indexing, storage, search-ability, and indications of compromise  Big Data architecture for archiving and analysis of long term security data, delivering high performance and scalability.
  • 3.  Compliance reporting through its data management infrastructure incorporating both data parsing and full text search. RSA Security Analytics addresses common SIEM use cases better than traditional SIEM tools Security Analytics satisfies common SIEM security oriented use cases, by collecting and analyzing log and network packet information. These use cases include the following: Use case RSA Security Analytics Alert/Report example Unauthorized privileged access Administrative commands (e.g. su, useradd) from a username not in a list of administrators Unusual commands being executed on a critical system Unusual protocol use Unexpected protocol hitting a firewall/gateway Large file transfers across a gateway Virus outbreak High # of alerts from the organization’sAV systems Trojan Backdoor use Specific event classes from an IDS Abnormal system access High # of failed logons from a given IP address Access from an unexpected geography Unauthorized account administration Account enable from list of locked accounts Access policies Access from an unauthorized location When detecting threats or policy violations, RSA Security Analytics can generate notifications, provide interactive alerts, and provide context as part of a scheduled alert. Security analysts can personalize how they want to consume specific types of information based upon its security and business impact. In addition to detecting threats or policy violations, RSA Security Analytics also provides a wide range of out-of-the-box compliance reports, aligned to common regulations across several legal jurisdictions.
  • 4. Geography Compliance Reports Global ISO27002, Basel II, PCI US SOX, HIPAA, FISMA, FERPA, FFIEC, GLBA, NISPOM, NERC, SSAE 16 Canada Bill 198 UK GPG13 SECURITY ANALYTICS TAKES NEW APPROACH TO SOLVING SIEM USE CASES There are several common SIEM use cases where Security Analytics takes a different, more effective approach to detecting threats. Example: Account takeover Account takeover commonly occurs when an attacker uses brute force or other means to take over a legitimate account and thus be able to execute the attack using a legitimate user’s account. This gives the attacker a useful platform to launch the next stage of the attack. The traditional SIEM approach to detecting account takeover is to create an alert for very obvious signs of account compromise - like creating a correlated alert for several failed logons followed by a successful logon. The problem with this approach is that it creates a large amount of noise – as legitimate users often have problems remembering and typing their password. Also, a determined attacker can easily evade detection by adopting a “low and slow” approach - spreading out access attempts over a long period of time. RSA Security Analytics takes a different approach to detecting this attack by flagging log or network sessions with common signs of attack activity. For example:  High # of failed logons originating from a particular IP address  Host or user accessing critical assets  Common bot protocols being used  Nonstandard user tools being used (i.e. not IE, Outlook, Chrome, Mozilla, Safari etc)  Unexpected source geography A single instance of or a combination of these indicators is a much better way to detect account takeover than trying to use a rules based approach. Some of these indicators require full network session collection and reconstruction, but others can be detected through more effective log analysis alone.
  • 5. Example: Known attack pattern Security teams often use SIEMs (via correlation rules) to look for specific attack patterns that that they or peer organizations have experienced before. They often create correlated alerts for specific sequences – e.g. a series of failed logons, followed by a successful logon, followed by a connection to a database, followed by a connection to a specific geography. The problem with this approach is that any slight variation of the attack will “fool” the SIEM. The rule outlined above is too rigid given today’s targeted attacks. Also, in a traditional SIEM any rule can only rely on indicators found in logs, whereas many indicators leave no log footprint. Finally, using a SIEM to look at the universe of possible attack vectors and variations will easily overwhelm the SIEM with data and calculations, and thus stop it from functioning normally. RSA Security Analytics approach takes a new approach to threat detection which not only provides the speed and smarts to be effective, but it also has the ability to detect unknown attacks as opposed to only known attacks and attack methods. The RSA Security Analytics approach allows analysts to detect more insightful indicators, such as the ability to:  Flag the log or session with known attack indicators - e.g. high # of failed logons, use of nonstandard protocols, unexpected use of scripting languages, unexpected source or destination IP addresses  Scope the traffic from IP addresses or users that are also communicating with critical assets  Replay entire sessions to give comprehensive investigative context Example: Beaconing host The term “beaconing” is used to describe the regular communication of a host with a Command and Control (C2) host on the Internet. Most beaconing happens on a regular schedule – say every three hours - and is easy to spot visually when you isolate the traffic between the two hosts, either through firewall or router logs, or through monitoring at an egress point. Traditional SIEMs are generally only be able rely on a list of known C2 hosts, but could not detect beaconing to an unknown C2 host. This is important since C2 sites come and go frequently RSA Security Analytics uses the flexibility and processing power of the Security Analytics Warehouse to discover beaconing by identifying all hosts that:  Communicate with the same host out on the Internet more than 6 times in a 24 hour period, AND  The interval between consecutive communications has a low standard deviation i.e. happens on a regular cadence rather than in a more random, human behavior
  • 6. RSA SECURITY ANALYTICS ARCHITECTURE RSA Security Analytics is a distributed and modular system that enables highly flexible deployment architectures that scales with the needs of the organization. Key components of the architecture include:  DECODER - Captures, parses, and reconstructs, all network traffic from Layers 2-7 or log and event data from hundreds of devices.  CONCENTRATOR - Indexes metadata extracted from network or log data and makes it available for enterprise-wide querying and real-time analytics while also facilitating reporting and alerting.  ANALYTIC SERVER/BROKER - Hosts the web server for reporting, investigation, administration, and other aspects of the analyst’s interface. Bridges the multiple real-time data stores held in the various decoder/concentrator pairs throughout the infrastructure. Also enables reporting on data held in the Warehouse and in archived storage.  EVENT STREAM ANALYSIS ENGINE - Processes large volumes of disparate event data and brings meaning through correlation to the events flowing through your enterprise.  ARCHIVER - Indexes and compresses log data and sends to archiving storage. The archiving storage is then optimized for long term data retention through compression, forensic analysis, and compliance reporting.  WAREHOUSE - Hadoop based distributed computing system which collects, manages, and enables advanced analytics and reporting on longer term sets of various security data. The Warehouse can be made up of 3 or more nodes depending on the organization's analytic, and resiliency requirements.  CAPACITY - RSA Security Analytics has a modular-capacity architecture, enabled with direct-attached capacity (DACs) or storage area networks (SANs), that adapt to the organization's short-term investigation and longer-term analytic and data-retention needs.
  • 7. RSA SECURITY ANALYTICS BREAKS SIEM STAGNATION SIEMs and log management tools can be very useful by providing a centralized view into disparate log sources and by streamlining the compliance reporting process. However, they commonly fall far short in their detection of modern threats and determining exactly what happened and what its impact is on the organization. To adapt to the changing threat landscape and the evolving requirements of security teams, SIEM tools need to change radically. Through its high powered analytic interface, scalable infrastructure, ability to collect and analyze both log and full network session data, combined with up-to-the-minute threat intelligence, RSA Security Analytics provides the next generation security system to detect and investigate threats. CONTACT US To learn more about how EMC products, services, and solutions can help solve your business and IT challenges, contact your local representative or authorized reseller— or visit us at www.EMC.com/rsa.. www.EMC.com/rsa EMC2 , EMC, the EMC logo, RSA, the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. VMware are registered trademarks or trademarks of VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC Corporation. All rights reserved. Published in the USA. 05/14 Solution Overview SA-LWP-0113 EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice.