SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
T e c h B r i e f
Using Splunk® Software as a SIEM
Replace a Security Information and Event Management (SIEM)
solution with Splunk.
represents a massive amount of data and will provide a repository
to baseline normal user and traffic activity. Using this baseline,
real-time analytics can detect the anomalies and outliers that
may be advanced threats. Statistics can help with this detection
by looking for events that are standard deviations off the norm.
Correlations can also help by detecting combinations of events
that are rarely seen and are suspicious.
Need to reduce IT security costs and raise efficiency. IT security
is constantly facing budget pressure and is being asked to do
“more with less.” This includes finding flexible security
products that:
•	 Address multiple security and compliance use cases
•	 Realize a fast time-to-value and are easy to deploy
•	 Accelerate incident investigations and automatically detect
advanced threats, reducing labor costs
•	 Do not require purchasing costly physical appliances
The Limitations of Traditional SIEMs
Many IT security teams have made a significant investment in both
money and people to support a traditional SIEM, only for the SIEM
to fall short of vendor promises and never be fully deployed.
The reasons for the broken promises are numerous. They are
often tied to the dated architectures of traditional SIEMs, which
typically use a SQL database with a fixed schema. This database
is a single point of failure with scale and performance limitations.
Customers with failed SIEM deployments commonly complain
that it is difficult to get data into the SIEM and that queries
can take hours to run, often never finishing. To get around
performance issues, SIEM vendors often sell one product for raw
logs and yet another product with a SQL database containing a
subset of this raw data for SIEM use cases. This “data reduction”
process inevitably hampers future incident investigations or
advanced threat detection, when all the original data is needed
to get to the root cause or to find the tiny fingerprints of an
advanced threat. Lastly, the vendor often requires expensive
physical appliances to try to improve performance.
Delivering a New Approach for SIEM
SIEM Requirements
SIEMs should enable the use cases and have the capabilities
listed below. Splunk software can handle these plus much more.
•	 Real-time aggregation of security-relevant data
•	 Ability to add context to security events
•	 Incident investigations/forensics
•	 Security reporting and visualizations
•	 Real-time correlations and alerting for threat detection
•	 Advanced/unknown threat detection
•	 Compliance reporting
Industry Trends
Three SIEM trends call for a big data SIEM:
All data is security relevant and should be indexed. For IT
security teams to properly investigate security incidents and
identify threats, the data indexed for SIEM use cases needs
to include more than security data from traditional security
products such as firewalls, IDS or anti-malware. The data
indexed also needs to include “non-security” data from sources
such as OS logs, LDAP/AD, badge data, DNS, NetFlow and email/
web servers. This is because traditional security products can
only reliably detect “known” threats for which signatures exist.
They cannot detect the advanced threats of today, whether they
are nation states, cybercriminals or malicious insiders, which
are “unknown” threats for which no signature exists. The minute
fingerprints of these advanced threats are often only in the
“non-security” data. The diagram in Figure 1 illustrates this.
Automated anomaly and outlier detection is needed. To detect
advanced threats, all non-security and security data must
reside in a single repository that is monitored in real time. This
•	 Splunk is used for security by thousands
of customers
•	 A proven, integrated, big data security platform
•	 Enables a wider range of security and non-
security use cases than traditional SIEMs
•	 Traditional SIEMs lack the scalability and flexibility
to deliver on the promise of SIEM
H i g hli g hts
Figure 1
All Security
Relevant Data
Traditional
SIEM
• “Non-security” user and machine generated data
behind credentials. Includes “Unknown” threats.
• AD, OS, DNS, DHCP, email, proxy, physical
badges, etc.
• “Security” data, or alerts from point security
products. “Known” threats.
• Firewall, anti-malware, IDS, DLP, vuln scan.
T e c h B r i e f
2
Splunk has quickly emerged to be a leading SIEM vendor. Over
2,000 customers use Splunk software for security use cases
and Splunk has won numerous industry awards including
placement as a leader in the 2013 Gartner Security Information
and Event Management (SIEM) Magic Quadrant, and SC
Magazine 2013 global awards for “Best SIEM Solution - US” and
“Enterprise Security Product - EMEA.”
Key to the Splunk success is a big data architecture and
flexibility. Splunk software is not hampered by a SQL database
and instead uses a flat file data store to make it possible to
quickly index all the original, raw data from any source at
massive data volumes. Our largest license is 100 terabytes of
data indexed per day. The Splunk product scales out horizontally
using commodity hardware, not costly physical appliances and
Splunk uses an implementation of Google’s MapReduce search
technology to enable fast distributed searching.
Splunk software also offers powerful and flexible search and
reporting capabilities in contrast to traditional SIEMs. In Splunk it
is easy to get to the data you are after and then turn the results
into a wide range of interactive reports and visualizations. These
visualizations can also be used for measuring technical controls
associated with compliance use cases.
The table below lists some of the limitations of traditional
SIEMs and how the Splunk approach differs:
Traditional SIEM Limitations Splunk Advantages/Differentiators
Multiple, discrete products (Logging and SIEM) One platform (Splunk Enterprise)
Often costly, physical appliances Software-only. Can be installed a wide range of OS’s
Difficult to deploy; long time-to-value
Fast time-to-value. Customers often see value in hours
or days
Reliance on vendor collectors or custom collectors
Not reliant on Splunk for “collectors.” And if Splunk
does not have the “collector” you need, it can easily be
created
Database schema and normalization limits
investigations and correlations
Flat file data store with no schema or normalization. All
the original data is retained and can be searched on
Scalability and speed issues due to SQL database
No SQL database and uses Google’s MapReduce for
fast, distributed searches
Lack of search flexibility limits the ability to find
outliers/anomalies
Splunk search language can do automated baselining
and the calculation of outliers/anomalies, as well as
advanced correlations
Limited flexibility in modifying or creating reports
Easy to create new reports or modify existing ones.
Data can be visualized in many ways including tables,
charts or scatterplots
Specializes in ‘known threat’ detection
‘Known threat’ detection, and can also index “non-
security” data to identify the outliers that may be
“unknown threats”
Closed products lacking APIs, SDKs, apps
Rest API with several SDKs exposes all the features
and data in Splunk. Over 400 free apps on Splunkbase.
Splunk UI and all configuration files are exposed for
easy modification
Only security/compliance use cases
Other use cases include compliance, application
security, fraud detection, IT operations, application
management, web intelligence and business analytics.
Results in more cross-department collaboration and
stronger ROI
T e c h B r i e f
www.splunk.com
250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com
Copyright © 2013 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws. Splunk is a registered trademark
or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item # TB-Splunk-SIEM-107
Using Splunk Software for SIEM
Splunk offers two products that support SIEM use cases, Splunk
Enterprise and the Splunk App for Enterprise Security.
Splunk Enterprise is the core Splunk platform. It provides the
core collection, indexing, search and reporting capabilities.
Many Splunk security customers use the core Splunk Enterprise
product to build their own real-time correlation searches and
dashboards for a SIEM-like experience.
For Splunk customers looking for pre-built, SIEM-like content,
there is the Splunk App for Enterprise Security which runs on
Splunk Enterprise and contains pre-built correlation rules, alerts,
reports, dashboards, incident review/workflow functionality and
third-party threat intelligence feeds.
Additionally, there are over 40 other security-related apps on
Splunkbase with pre-built searches, reports, and visualizations
for specific 3rd-party security vendors, including Palo Alto
Networks, Blue Coat, FireEye, Symantec, Cisco, Nessus,
Websense, Sourcefire and Microsoft.
Migrating from a Traditional SIEM to Splunk
Software
There are several ways to migrate from a traditional SIEM to
Splunk software. Please contact Splunk sales to learn more.
Splunk has technical resources, including dedicated security
strategists, who can work with you to determine the best
migration path.
Free Download
Download Splunk for free. You’ll get a Splunk Enterprise
license for 60 days and you can index up to 500 megabytes
of data per day. After 60 days, or anytime before then,
you can convert to a perpetual Free license or purchase an
Enterprise license by contacting sales@splunk.com.

Contenu connexe

Plus de Greg Hanchin

Splunk for exchange
Splunk for exchangeSplunk for exchange
Splunk for exchangeGreg Hanchin
 
Splunk for cyber_threat
Splunk for cyber_threatSplunk for cyber_threat
Splunk for cyber_threatGreg Hanchin
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for complianceGreg Hanchin
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43courseGreg Hanchin
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administrationGreg Hanchin
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Greg Hanchin
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 courseGreg Hanchin
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43courseGreg Hanchin
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline Greg Hanchin
 
Advanced Splunk Administration
Advanced Splunk AdministrationAdvanced Splunk Administration
Advanced Splunk AdministrationGreg Hanchin
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionGreg Hanchin
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk courseGreg Hanchin
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsGreg Hanchin
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Greg Hanchin
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_briefGreg Hanchin
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktopGreg Hanchin
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_altoGreg Hanchin
 

Plus de Greg Hanchin (20)

Splunk for exchange
Splunk for exchangeSplunk for exchange
Splunk for exchange
 
Splunk for cyber_threat
Splunk for cyber_threatSplunk for cyber_threat
Splunk for cyber_threat
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43course
 
Advanced Splunk 50 administration
Advanced Splunk 50 administrationAdvanced Splunk 50 administration
Advanced Splunk 50 administration
 
Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 course
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43course
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline
 
Advanced Splunk Administration
Advanced Splunk AdministrationAdvanced Splunk Administration
Advanced Splunk Administration
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk course
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class Details
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_brief
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktop
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
 
Splunk for fisma
Splunk for fismaSplunk for fisma
Splunk for fisma
 
Splunk for f5
Splunk for f5Splunk for f5
Splunk for f5
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Splunk as a_siem_tech_brief

  • 1. T e c h B r i e f Using Splunk® Software as a SIEM Replace a Security Information and Event Management (SIEM) solution with Splunk. represents a massive amount of data and will provide a repository to baseline normal user and traffic activity. Using this baseline, real-time analytics can detect the anomalies and outliers that may be advanced threats. Statistics can help with this detection by looking for events that are standard deviations off the norm. Correlations can also help by detecting combinations of events that are rarely seen and are suspicious. Need to reduce IT security costs and raise efficiency. IT security is constantly facing budget pressure and is being asked to do “more with less.” This includes finding flexible security products that: • Address multiple security and compliance use cases • Realize a fast time-to-value and are easy to deploy • Accelerate incident investigations and automatically detect advanced threats, reducing labor costs • Do not require purchasing costly physical appliances The Limitations of Traditional SIEMs Many IT security teams have made a significant investment in both money and people to support a traditional SIEM, only for the SIEM to fall short of vendor promises and never be fully deployed. The reasons for the broken promises are numerous. They are often tied to the dated architectures of traditional SIEMs, which typically use a SQL database with a fixed schema. This database is a single point of failure with scale and performance limitations. Customers with failed SIEM deployments commonly complain that it is difficult to get data into the SIEM and that queries can take hours to run, often never finishing. To get around performance issues, SIEM vendors often sell one product for raw logs and yet another product with a SQL database containing a subset of this raw data for SIEM use cases. This “data reduction” process inevitably hampers future incident investigations or advanced threat detection, when all the original data is needed to get to the root cause or to find the tiny fingerprints of an advanced threat. Lastly, the vendor often requires expensive physical appliances to try to improve performance. Delivering a New Approach for SIEM SIEM Requirements SIEMs should enable the use cases and have the capabilities listed below. Splunk software can handle these plus much more. • Real-time aggregation of security-relevant data • Ability to add context to security events • Incident investigations/forensics • Security reporting and visualizations • Real-time correlations and alerting for threat detection • Advanced/unknown threat detection • Compliance reporting Industry Trends Three SIEM trends call for a big data SIEM: All data is security relevant and should be indexed. For IT security teams to properly investigate security incidents and identify threats, the data indexed for SIEM use cases needs to include more than security data from traditional security products such as firewalls, IDS or anti-malware. The data indexed also needs to include “non-security” data from sources such as OS logs, LDAP/AD, badge data, DNS, NetFlow and email/ web servers. This is because traditional security products can only reliably detect “known” threats for which signatures exist. They cannot detect the advanced threats of today, whether they are nation states, cybercriminals or malicious insiders, which are “unknown” threats for which no signature exists. The minute fingerprints of these advanced threats are often only in the “non-security” data. The diagram in Figure 1 illustrates this. Automated anomaly and outlier detection is needed. To detect advanced threats, all non-security and security data must reside in a single repository that is monitored in real time. This • Splunk is used for security by thousands of customers • A proven, integrated, big data security platform • Enables a wider range of security and non- security use cases than traditional SIEMs • Traditional SIEMs lack the scalability and flexibility to deliver on the promise of SIEM H i g hli g hts Figure 1 All Security Relevant Data Traditional SIEM • “Non-security” user and machine generated data behind credentials. Includes “Unknown” threats. • AD, OS, DNS, DHCP, email, proxy, physical badges, etc. • “Security” data, or alerts from point security products. “Known” threats. • Firewall, anti-malware, IDS, DLP, vuln scan.
  • 2. T e c h B r i e f 2 Splunk has quickly emerged to be a leading SIEM vendor. Over 2,000 customers use Splunk software for security use cases and Splunk has won numerous industry awards including placement as a leader in the 2013 Gartner Security Information and Event Management (SIEM) Magic Quadrant, and SC Magazine 2013 global awards for “Best SIEM Solution - US” and “Enterprise Security Product - EMEA.” Key to the Splunk success is a big data architecture and flexibility. Splunk software is not hampered by a SQL database and instead uses a flat file data store to make it possible to quickly index all the original, raw data from any source at massive data volumes. Our largest license is 100 terabytes of data indexed per day. The Splunk product scales out horizontally using commodity hardware, not costly physical appliances and Splunk uses an implementation of Google’s MapReduce search technology to enable fast distributed searching. Splunk software also offers powerful and flexible search and reporting capabilities in contrast to traditional SIEMs. In Splunk it is easy to get to the data you are after and then turn the results into a wide range of interactive reports and visualizations. These visualizations can also be used for measuring technical controls associated with compliance use cases. The table below lists some of the limitations of traditional SIEMs and how the Splunk approach differs: Traditional SIEM Limitations Splunk Advantages/Differentiators Multiple, discrete products (Logging and SIEM) One platform (Splunk Enterprise) Often costly, physical appliances Software-only. Can be installed a wide range of OS’s Difficult to deploy; long time-to-value Fast time-to-value. Customers often see value in hours or days Reliance on vendor collectors or custom collectors Not reliant on Splunk for “collectors.” And if Splunk does not have the “collector” you need, it can easily be created Database schema and normalization limits investigations and correlations Flat file data store with no schema or normalization. All the original data is retained and can be searched on Scalability and speed issues due to SQL database No SQL database and uses Google’s MapReduce for fast, distributed searches Lack of search flexibility limits the ability to find outliers/anomalies Splunk search language can do automated baselining and the calculation of outliers/anomalies, as well as advanced correlations Limited flexibility in modifying or creating reports Easy to create new reports or modify existing ones. Data can be visualized in many ways including tables, charts or scatterplots Specializes in ‘known threat’ detection ‘Known threat’ detection, and can also index “non- security” data to identify the outliers that may be “unknown threats” Closed products lacking APIs, SDKs, apps Rest API with several SDKs exposes all the features and data in Splunk. Over 400 free apps on Splunkbase. Splunk UI and all configuration files are exposed for easy modification Only security/compliance use cases Other use cases include compliance, application security, fraud detection, IT operations, application management, web intelligence and business analytics. Results in more cross-department collaboration and stronger ROI
  • 3. T e c h B r i e f www.splunk.com 250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com Copyright © 2013 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws. Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item # TB-Splunk-SIEM-107 Using Splunk Software for SIEM Splunk offers two products that support SIEM use cases, Splunk Enterprise and the Splunk App for Enterprise Security. Splunk Enterprise is the core Splunk platform. It provides the core collection, indexing, search and reporting capabilities. Many Splunk security customers use the core Splunk Enterprise product to build their own real-time correlation searches and dashboards for a SIEM-like experience. For Splunk customers looking for pre-built, SIEM-like content, there is the Splunk App for Enterprise Security which runs on Splunk Enterprise and contains pre-built correlation rules, alerts, reports, dashboards, incident review/workflow functionality and third-party threat intelligence feeds. Additionally, there are over 40 other security-related apps on Splunkbase with pre-built searches, reports, and visualizations for specific 3rd-party security vendors, including Palo Alto Networks, Blue Coat, FireEye, Symantec, Cisco, Nessus, Websense, Sourcefire and Microsoft. Migrating from a Traditional SIEM to Splunk Software There are several ways to migrate from a traditional SIEM to Splunk software. Please contact Splunk sales to learn more. Splunk has technical resources, including dedicated security strategists, who can work with you to determine the best migration path. Free Download Download Splunk for free. You’ll get a Splunk Enterprise license for 60 days and you can index up to 500 megabytes of data per day. After 60 days, or anytime before then, you can convert to a perpetual Free license or purchase an Enterprise license by contacting sales@splunk.com.