SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Innovations in data security




Log management

        vs

     SIEM
    Andris Soroka
     07.07.2011



                    Together with
Agenda
 Introduction - threats, technology era, definitions

  Business drivers for log management and SIEM
(Security Information and Events Management)

 Market analysis, critical capabilities of solutions

 Selected solutions for Your review for -
    SEM (Log management)
    SEM (Wider scope)
    SIEM
Where to start from?


  Internet has been compared to America’s Wild Wild West
countless times – now the analogy holds more weight than ever.
No DNA forensics, no overarching laws – just lawlessness.
The 21st Century – the age of cybercrime




“Year 2010 was the year of cybercrime and
cyberwars. Year of Wikileaks”
“The New York Times”, “Guardian”, “Der Spiegel”, “El
Pais”, “Le Monde”, “CNN”, “BBC” and more. 2010,
2011..


FBI warns Congress that cybercriminals can hack
any internet-linked system
Gordon M. Snow, assistant director of the FBI’s Cyber Division
(13th of April, 2011)
Background - technology development



  IT continues taking the lead in business
(ERP, CRM, document management, digital
prototyping etc.)

  Importance and development of e-World
(e-Health, e-government, e-services, social
networking,      Web      2.0,      unified
communications and tools for that etc.)

  Mobility and borderless enterprise

  Cyber culture develops faster than cyber
security
Every technology is vulnerable
New threats – targeted, professional, silent


  There are Internet shops full of credit
card, bank account, privacy, business
and other confidential data. Also there
are available services to rent a botnet,
malicious code and attack anyone.

  Cybercriminal «CV Online»

  “Black        Community”          where
cybercriminals are organized better
than hi level military organizations

  Video trainings and eLearning
available in social media, such as
YouTube
Business drivers that initiate LM / SIEM


EU directives
    Such as for data protection
    Critical infrastructure protection
    Cooperation
Industry standards and regulations
    Banks
    Health organizations etc.
NATO directives
    Security, military orgs
    Related to NATO work
IT Security ISO 2700X
Local laws and regulations
    Personal data protection
    IT Security politics
SIEM / SEM / SIM - Where to start from?


   Do You have one, central
solutions for collecting ALL
events (logs), correlate them        Operational      IT & Network Identity        Governance &
                                     Security         Operations   Management      Compliance
and have real time intelligent                                Log
                                                                          Log

visibility?
                                                             Tool
                                                                          Silo           ?
                                                     ?             ?     ??????
                                                                            ?
                                                         ?
   Do   You   monitor   the                                ? ? ? ? ? ? ?????
                                                              ? ? ? ? ? ????
business processes instead                                       ? ? ? ?????
                                                   Log Jam

of network?                                                         ? ? ??
                                                                     ? ???
                                                                      ?? ?
                                                                           ??
                                                                         ?LOGS
  Do You monitor identities,
applications, information and
their context instead of just IP         Network         Servers       Databases    Homegrown
                                                                                    Applications
addresses,       OS’s       and
devices?
                               If not – You are vulnerable!!!
No, I mean, really…do You know?

Clear & concise delivery of the most relevant information …


                                 What was the
                                 attack?

                                                                             Was it
                  Who was                                                    successful?
                  responsible?




                                                           Where do I find
                                                           them?                How valuable are
           How many                                                             they to the business?
           targets
           involved?


                                         Are any of them
                                         vulnerable?



                                                  Where is all the
                                                  evidence?
What is in Your logs so far..? 50%? Less..?




    Failed Logon                        User and System Activity

                                          Privileges Assigned/
 Security Breach
                                          Changed

File Up/Download

     Credit Card
    Data Access
                    50%?               Runaway Application


                                       Customer Transaction

 Information Leak                      Email BCC
What is in Your logs so far..? 50%? Less..?


  What logs –                      From where -
     Audit logs                         Firewalls / Intrusion
     Transaction logs               prevention
     Intrusion logs                   Routers / Switches
     Connection logs                  Intrusion detection
     System        performance        Servers,         desktops,
   records                          mainframes
     User activity logs               Business applications
     Different systems alerts         Databases
   and different other systems        Antivirus software
   messages                           VPN’s

There is no standard format, transportation method for
 logs, there are more than 800 log file formats used..
Definitions from IT SecurityIntroduction / technologies –
                               solutions
   SEM – Security Events Management (Correlation – events
 relation together for security benefits)
   SIM – Security Information Management (Log
 management – e.g. collecting the events of the applications
 and operational systems.)
   SIEM (Security Information And Event Management)




      You cannot control what You cannot see!
SIEM evolution (from Anton Chuvakin blog)

Historically –
   1997-2002 IDS & Firewall
      Worms, alerts of overflow,
    packets etc.
      Sold as a “SOC in the box”

 2003 – 2007 Above + Server +
Context
     Users, compliance etc.
     Sold as a “SOC in the box” +

  2008+ Above + Applications +
     Cybercrime, fraud prevention,
   identity etc.
     Sold as a “SOC in the box”+++
Log management and intelligence




       Collect                       Alert                         Store                        Report
Time-stamping       and    Alerts based on real time    As much as you want,             Should have reasy to
secure collection of       log forensics according to   as little as your compliance     configure and report.
100% of all log data,      policies. According to       needs dictate. Automated,        Should be easy-to-use
100% of the time, from     anomalies, incidents. In     secure        storage     and    templates and more
any device, including      any possible alerting way.   archival of critical log data.   than     10K     custom
network,       storage,                                 Maintain chain of custody.       reports. Packaged SOX,
servers, applications!                                                                   PCI reporting + more.


                          Process Integration & Information Share
More about SIM / SEM / SIEM coverage

Scope of usage –
   SIM (log management) + SEM
      Standards such as –
          Syslog (Unix / Linux, network devices)
          Eventlog (Windows)
          Journals (mainframe, midrange..)
      Non standards such as logging into files and SQL
    databases
Usage
   Central monitoring, finding anomalies, reporting, alerting
   Collecting and archiving logs, forensics (search all over)
   Threat protection & discovery, incident response, audit support
Advantages / Disadvantages (not always)
    Scalability – security logs are only about 10% of all logs, but
 SIM solutions collect ALL logs correlation can be an issue later
    Functionality – correlated events from different sources is with
 different level than SIEM that is naturally designed to do so
More about SIM / SEM / SIEM coverage

Scope of usage and quality control
  SIEM – A must to have!
     Log and context data collection (SIM)
     Normalization and categorization (SIM)
     Correlation (SEM)
     Notification / Alerting (SEM)
     Prioritization (SEM)
     Dashboards and visualization
     Reporting and reports delivery (SIM)
     Security role workflow
  SIEM – next generation solutions work looking at level of –
     File integrity Monitoring
     Database Activity Monitoring
     Application Monitoring
     Identity Monitoring
     User Activity Monitoring
Planning a SIEM / LM project?

Planning areas (IN THAT ORDER! By Anton Chuvakin)
   Goals and requirements
   Functionality & features
   Scope and data collection
   Sizing
   Architecting
Deploy Log management before SIEM….
   Q: Why do You think most of the SIEM projects failed in
 past?
   A: There was no LM at place, SIEM alone is just not that
 useful..
Quality and innovations portfolio from DSS


 Market leadership in research of leading market analysts




  Close partnership with local competence                     center,
represented vendors and regional distributor



  Market industry   standards     and     international      quality
standards
Solutions to offer


SIM / SIM + SEM
   Balabit IT Security
       Syslog NG Store Box
       SSB + Sawmill

SIEM+
   Q1 Labs – The Market Leader
                                              Suspected
                                               Incidents
Balabit IT Security




  Founded in 2000, Hungary
  2nd fastest growing IT company in
CEE, listed in Deloitte’s Top50 research
  “The syslog -ng company” – open
source log collecting solution is used by
650000 customers world wide
  SIM (Log management) and more
Balabit IT Security


Syslog –ng Premium Edition
   TLS-encrypted communication
   Direct SQL Access
   More than 21 platform support
   Windows agent with AD
   IBM System I agent
Syslog –ng Store box
   Complete log lifecycle management
   Web based user interface
   75000 messages per second
   24GB messages per hour
   Encrypted communication, alerting, filtering etc.
Shell Control Box (“The Black Box”)
   Monitoring over admins
   Monitoring over outsourcers
Balabit IT Security
Balabit IT Security + Sawmill

                                                            Real Time ‘Live’ Reports

                                                                 Dynamic Reports
   Sawmill – software       Static Reports
                           for email/ publishing                                                    Real Time Alerts
package to analyze log
                             html/csv/pdf
files                          Reports
                                                                                                        Alerts

   Has more than 250000
customers world wide
   Works with more than                                  Reports & Report Filters                          ODBC




                                 Profiles &
                                 Schedules
800 different log file                                                Analysis
                                                                                                           MySQL
formats                                                              Database
                                                                                                         INTERNAL
   Extremely       great                                   Log Filtering & Parsing

reporting
   Licensed by report               Web Server      Security Logs     Network Logs     Streaming      Mail Server
                                     Log Files     Security Events   Network Events    Media Logs       Logs
profiles
                                                 Enterprise-wide                      analytics
                                                     ** 800+ different log formats supported **
Balabit IT Security + Sawmill


  Balabit syslog –ng is licensed by the number of log
sources hosts (LSH), licenses for 5,10,25,50,100,150,
250…Unlimited, unlimited costs about 25K Euro


  Balabit SSB is licensed same way, licensed for
50,100,250,500, 750,1000…Unlimited, depending on options
(HA, support, hardware:1U or 2U, architecture) project can be
between 25K – 150K Euro


  Sawmill is licensed by the number of report profiles created
and product type selected, can vary between 1K and 10K Euro
Q1 Labs SIEM Gartner
Q1 Labs business card




   Q1 Labs – a global leader    PCI   HIPAA   FISMA    CoCo   NERC   SOX

in SIEM market from USA
   Best price / performance
   Next generation SIEM
   +2000 customers world
wide
   Gartner 2009 / 2010 Magic
quadrant leader
   Biggest independent SIEM
vendor from leaders
   Out of box number of
compliances covered
Q1 Labs SIEM & much more


           Next-generation Log Management:
           •Turnkey log management
           •SME to Enterprise
           •Upgradeable to enterprise SIEM



           Next-generation SIEM:
           •Integrated log, cyber threat, risk and
           compliance management
           •Scalable, Automated, Broad market
           •Network activity information


            Next-generation Risk Management
            •Predictive threat modeling & simulation
            •Automated compliance and policy verification
            •Scalable configuration monitoring & audit
            •Advanced threat visualization/impact analysis


           Stackable Expansion:
           •Event Processors, High Availability
           •Network Activity Processors
           •Geographic distribution
           •Horizontal scale
           •Embedded, real-time database

           Application & Activity Monitoring:
           •Layer 7 application monitoring
           •Content Aware
           •Identity/user-based visibility of network and
           application activity
           •Provides visibility into physical and virtual
Q1 in action - Malware activity




              Potential Botnet Detected?
              This is as far as traditional SIEM can go.




            IRC on port 80?
            QFlow enables detection of a covert channel.




   Irrefutable Botnet Communication
   Layer 7 data contains botnet command and control
   instructions.
Q1 in action - User activity monitoring


                   Authentication Failures
               Perhaps a     user   who    forgot   their
               password?




                   Brute Force Password
                           Attack
               Numerous failed login attempts against
               different user accounts.




                      Host Compromised
                All this followed by a successful login.
                Automatically detected, no custom
                tuning required.
Q1 in action - complex threat detection



                                                  Sounds Nasty…
                                                  But how to we know this?

                                                  The evidence is a single click away.




Network Scan                         Buffer Overflow
Detected by QFlow                    Exploit attempt seen by Snort




                                                              Total Visibility
Targeted Host Vulnerable        Convergence of Network, Event and Vulnerability data.
Detected by Nessus
Q1 in action – data loss prevention


Potential Data Loss?
Who? What? Where?



                                     Who?
                                     An internal user




                                              What?
                                              Oracle data




                                               Where?
                                               Gmail
Q1 Labs in figures

   Based on selection, sizing,
requirements, targets there are
different models and ways how to
move forwards
       All-in-One solutions
       Distributed
           Console
           Flow processor
           Event processor
           Qflow collector
       Many upgrade possibilities
       HA and DR options
   Smallest all-in-one appliance
pricing starts with 30K Euro – ends
with ……depends on everything
Business & personal risk analysis matrix
“Data Security Solutions” can help



Specialization – IT Security

    IT Security consulting
 (vulnerability    assessment
 tests, security audit, new
 systems integration, HR
 training, technical support)

   Innovative & selected
 software / hardware & hybrid
 solutions     from    leading
 technology vendors from
 over 10 different countries
Think security first




  www.dss.lv
 andris@dss.lv
+371 2 9162784

Contenu connexe

Tendances

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
Microsoft Cybersecurity Solutions CISO.pptx
Microsoft Cybersecurity Solutions CISO.pptxMicrosoft Cybersecurity Solutions CISO.pptx
Microsoft Cybersecurity Solutions CISO.pptxQuang Anh Trinh
 
Virtualization security
Virtualization securityVirtualization security
Virtualization securityAhmed Nour
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdfdotco
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 

Tendances (20)

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cloud security
Cloud security Cloud security
Cloud security
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Microsoft Cybersecurity Solutions CISO.pptx
Microsoft Cybersecurity Solutions CISO.pptxMicrosoft Cybersecurity Solutions CISO.pptx
Microsoft Cybersecurity Solutions CISO.pptx
 
Virtualization security
Virtualization securityVirtualization security
Virtualization security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
Cyber security
Cyber securityCyber security
Cyber security
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 

En vedette

SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementTripwire
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and LessonsAnton Chuvakin
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
Log management principle and usage
Log management principle and usageLog management principle and usage
Log management principle and usageBikrant Gautam
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...Anton Chuvakin
 
Log management
Log managementLog management
Log managementepoxxy
 
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...Anton Chuvakin
 
SOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchSOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchAccelOps
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinAnton Chuvakin
 
Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012lennartkoopmann
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldAnton Chuvakin
 

En vedette (20)

SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Leveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log ManagementLeveraging Compliance for Security with SIEM and Log Management
Leveraging Compliance for Security with SIEM and Log Management
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Log management principle and usage
Log management principle and usageLog management principle and usage
Log management principle and usage
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
 
Log management
Log managementLog management
Log management
 
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
 
SOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire ResearchSOC/NOC Convergence by Spire Research
SOC/NOC Convergence by Spire Research
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton ChuvakinEnterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
 
Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012Log management with Graylog2 - FrOSCon 2012
Log management with Graylog2 - FrOSCon 2012
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 

Similaire à SIEM vs Log Management - Data Security Solutions 2011

DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...Anton Chuvakin
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseJim Porell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinAnton Chuvakin
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secureEoin Keary
 
SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs  SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs AlienVault
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draftEoin Keary
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short ArticleAnton Chuvakin
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)Lancope, Inc.
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteAntonio Fontes
 
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinUsing Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinAnton Chuvakin
 

Similaire à SIEM vs Log Management - Data Security Solutions 2011 (20)

DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
We cant hack ourselves secure
We cant hack ourselves secureWe cant hack ourselves secure
We cant hack ourselves secure
 
SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs  SpiceWorks Webinar: Whose logs, what logs, why logs
SpiceWorks Webinar: Whose logs, what logs, why logs
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short Article
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Confoo 2012 - Web security keynote
Confoo 2012 - Web security keynoteConfoo 2012 - Web security keynote
Confoo 2012 - Web security keynote
 
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinUsing Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
 

Plus de Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Plus de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

SIEM vs Log Management - Data Security Solutions 2011

  • 1. Innovations in data security Log management vs SIEM Andris Soroka 07.07.2011 Together with
  • 2. Agenda Introduction - threats, technology era, definitions Business drivers for log management and SIEM (Security Information and Events Management) Market analysis, critical capabilities of solutions Selected solutions for Your review for - SEM (Log management) SEM (Wider scope) SIEM
  • 3. Where to start from? Internet has been compared to America’s Wild Wild West countless times – now the analogy holds more weight than ever. No DNA forensics, no overarching laws – just lawlessness.
  • 4. The 21st Century – the age of cybercrime “Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks” “The New York Times”, “Guardian”, “Der Spiegel”, “El Pais”, “Le Monde”, “CNN”, “BBC” and more. 2010, 2011.. FBI warns Congress that cybercriminals can hack any internet-linked system Gordon M. Snow, assistant director of the FBI’s Cyber Division (13th of April, 2011)
  • 5. Background - technology development IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.) Importance and development of e-World (e-Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for that etc.) Mobility and borderless enterprise Cyber culture develops faster than cyber security
  • 6. Every technology is vulnerable
  • 7. New threats – targeted, professional, silent There are Internet shops full of credit card, bank account, privacy, business and other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone. Cybercriminal «CV Online» “Black Community” where cybercriminals are organized better than hi level military organizations Video trainings and eLearning available in social media, such as YouTube
  • 8. Business drivers that initiate LM / SIEM EU directives Such as for data protection Critical infrastructure protection Cooperation Industry standards and regulations Banks Health organizations etc. NATO directives Security, military orgs Related to NATO work IT Security ISO 2700X Local laws and regulations Personal data protection IT Security politics
  • 9. SIEM / SEM / SIM - Where to start from? Do You have one, central solutions for collecting ALL events (logs), correlate them Operational IT & Network Identity Governance & Security Operations Management Compliance and have real time intelligent Log Log visibility? Tool Silo ? ? ? ?????? ? ? Do You monitor the ? ? ? ? ? ? ????? ? ? ? ? ? ???? business processes instead ? ? ? ????? Log Jam of network? ? ? ?? ? ??? ?? ? ?? ?LOGS Do You monitor identities, applications, information and their context instead of just IP Network Servers Databases Homegrown Applications addresses, OS’s and devices? If not – You are vulnerable!!!
  • 10. No, I mean, really…do You know? Clear & concise delivery of the most relevant information … What was the attack? Was it Who was successful? responsible? Where do I find them? How valuable are How many they to the business? targets involved? Are any of them vulnerable? Where is all the evidence?
  • 11. What is in Your logs so far..? 50%? Less..? Failed Logon User and System Activity Privileges Assigned/ Security Breach Changed File Up/Download Credit Card Data Access 50%? Runaway Application Customer Transaction Information Leak Email BCC
  • 12. What is in Your logs so far..? 50%? Less..? What logs – From where - Audit logs Firewalls / Intrusion Transaction logs prevention Intrusion logs Routers / Switches Connection logs Intrusion detection System performance Servers, desktops, records mainframes User activity logs Business applications Different systems alerts Databases and different other systems Antivirus software messages VPN’s There is no standard format, transportation method for logs, there are more than 800 log file formats used..
  • 13. Definitions from IT SecurityIntroduction / technologies – solutions SEM – Security Events Management (Correlation – events relation together for security benefits) SIM – Security Information Management (Log management – e.g. collecting the events of the applications and operational systems.) SIEM (Security Information And Event Management) You cannot control what You cannot see!
  • 14. SIEM evolution (from Anton Chuvakin blog) Historically – 1997-2002 IDS & Firewall Worms, alerts of overflow, packets etc. Sold as a “SOC in the box” 2003 – 2007 Above + Server + Context Users, compliance etc. Sold as a “SOC in the box” + 2008+ Above + Applications + Cybercrime, fraud prevention, identity etc. Sold as a “SOC in the box”+++
  • 15. Log management and intelligence Collect Alert Store Report Time-stamping and Alerts based on real time As much as you want, Should have reasy to secure collection of log forensics according to as little as your compliance configure and report. 100% of all log data, policies. According to needs dictate. Automated, Should be easy-to-use 100% of the time, from anomalies, incidents. In secure storage and templates and more any device, including any possible alerting way. archival of critical log data. than 10K custom network, storage, Maintain chain of custody. reports. Packaged SOX, servers, applications! PCI reporting + more. Process Integration & Information Share
  • 16. More about SIM / SEM / SIEM coverage Scope of usage – SIM (log management) + SEM Standards such as – Syslog (Unix / Linux, network devices) Eventlog (Windows) Journals (mainframe, midrange..) Non standards such as logging into files and SQL databases Usage Central monitoring, finding anomalies, reporting, alerting Collecting and archiving logs, forensics (search all over) Threat protection & discovery, incident response, audit support Advantages / Disadvantages (not always) Scalability – security logs are only about 10% of all logs, but SIM solutions collect ALL logs correlation can be an issue later Functionality – correlated events from different sources is with different level than SIEM that is naturally designed to do so
  • 17. More about SIM / SEM / SIEM coverage Scope of usage and quality control SIEM – A must to have! Log and context data collection (SIM) Normalization and categorization (SIM) Correlation (SEM) Notification / Alerting (SEM) Prioritization (SEM) Dashboards and visualization Reporting and reports delivery (SIM) Security role workflow SIEM – next generation solutions work looking at level of – File integrity Monitoring Database Activity Monitoring Application Monitoring Identity Monitoring User Activity Monitoring
  • 18. Planning a SIEM / LM project? Planning areas (IN THAT ORDER! By Anton Chuvakin) Goals and requirements Functionality & features Scope and data collection Sizing Architecting Deploy Log management before SIEM…. Q: Why do You think most of the SIEM projects failed in past? A: There was no LM at place, SIEM alone is just not that useful..
  • 19. Quality and innovations portfolio from DSS Market leadership in research of leading market analysts Close partnership with local competence center, represented vendors and regional distributor Market industry standards and international quality standards
  • 20. Solutions to offer SIM / SIM + SEM Balabit IT Security Syslog NG Store Box SSB + Sawmill SIEM+ Q1 Labs – The Market Leader Suspected Incidents
  • 21. Balabit IT Security Founded in 2000, Hungary 2nd fastest growing IT company in CEE, listed in Deloitte’s Top50 research “The syslog -ng company” – open source log collecting solution is used by 650000 customers world wide SIM (Log management) and more
  • 22. Balabit IT Security Syslog –ng Premium Edition TLS-encrypted communication Direct SQL Access More than 21 platform support Windows agent with AD IBM System I agent Syslog –ng Store box Complete log lifecycle management Web based user interface 75000 messages per second 24GB messages per hour Encrypted communication, alerting, filtering etc. Shell Control Box (“The Black Box”) Monitoring over admins Monitoring over outsourcers
  • 24. Balabit IT Security + Sawmill Real Time ‘Live’ Reports Dynamic Reports Sawmill – software Static Reports for email/ publishing Real Time Alerts package to analyze log html/csv/pdf files Reports Alerts Has more than 250000 customers world wide Works with more than Reports & Report Filters ODBC Profiles & Schedules 800 different log file Analysis MySQL formats Database INTERNAL Extremely great Log Filtering & Parsing reporting Licensed by report Web Server Security Logs Network Logs Streaming Mail Server Log Files Security Events Network Events Media Logs Logs profiles Enterprise-wide analytics ** 800+ different log formats supported **
  • 25. Balabit IT Security + Sawmill Balabit syslog –ng is licensed by the number of log sources hosts (LSH), licenses for 5,10,25,50,100,150, 250…Unlimited, unlimited costs about 25K Euro Balabit SSB is licensed same way, licensed for 50,100,250,500, 750,1000…Unlimited, depending on options (HA, support, hardware:1U or 2U, architecture) project can be between 25K – 150K Euro Sawmill is licensed by the number of report profiles created and product type selected, can vary between 1K and 10K Euro
  • 26. Q1 Labs SIEM Gartner
  • 27. Q1 Labs business card Q1 Labs – a global leader PCI HIPAA FISMA CoCo NERC SOX in SIEM market from USA Best price / performance Next generation SIEM +2000 customers world wide Gartner 2009 / 2010 Magic quadrant leader Biggest independent SIEM vendor from leaders Out of box number of compliances covered
  • 28. Q1 Labs SIEM & much more Next-generation Log Management: •Turnkey log management •SME to Enterprise •Upgradeable to enterprise SIEM Next-generation SIEM: •Integrated log, cyber threat, risk and compliance management •Scalable, Automated, Broad market •Network activity information Next-generation Risk Management •Predictive threat modeling & simulation •Automated compliance and policy verification •Scalable configuration monitoring & audit •Advanced threat visualization/impact analysis Stackable Expansion: •Event Processors, High Availability •Network Activity Processors •Geographic distribution •Horizontal scale •Embedded, real-time database Application & Activity Monitoring: •Layer 7 application monitoring •Content Aware •Identity/user-based visibility of network and application activity •Provides visibility into physical and virtual
  • 29. Q1 in action - Malware activity Potential Botnet Detected? This is as far as traditional SIEM can go. IRC on port 80? QFlow enables detection of a covert channel. Irrefutable Botnet Communication Layer 7 data contains botnet command and control instructions.
  • 30. Q1 in action - User activity monitoring Authentication Failures Perhaps a user who forgot their password? Brute Force Password Attack Numerous failed login attempts against different user accounts. Host Compromised All this followed by a successful login. Automatically detected, no custom tuning required.
  • 31. Q1 in action - complex threat detection Sounds Nasty… But how to we know this? The evidence is a single click away. Network Scan Buffer Overflow Detected by QFlow Exploit attempt seen by Snort Total Visibility Targeted Host Vulnerable Convergence of Network, Event and Vulnerability data. Detected by Nessus
  • 32. Q1 in action – data loss prevention Potential Data Loss? Who? What? Where? Who? An internal user What? Oracle data Where? Gmail
  • 33. Q1 Labs in figures Based on selection, sizing, requirements, targets there are different models and ways how to move forwards All-in-One solutions Distributed Console Flow processor Event processor Qflow collector Many upgrade possibilities HA and DR options Smallest all-in-one appliance pricing starts with 30K Euro – ends with ……depends on everything
  • 34. Business & personal risk analysis matrix
  • 35. “Data Security Solutions” can help Specialization – IT Security IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support) Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries
  • 36. Think security first www.dss.lv andris@dss.lv +371 2 9162784