SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
USE CASE




Detecting Advanced Threats
   The biggest challenge in protecting your organization from advanced threats is
   the unique and complex nature of each assault. Attackers frequently incorporate
   advanced custom malware designed to take advantage of specific exploits -- in
   many cases employing a series of highly-sophisticated zero day attacks. They
   frequently combine malware with well-planned physical theft and clever social
   engineering to harness a full spectrum of logical, physical and social attack vectors.
   After detecting a compromise, it’s difficult to immediately determine if the
   compromise was due to an Advanced Threat based on a single event or a simple
   behavior sequence. An attacker launching an advanced threat will typically employ
   several phases. Each step needs to be detected individually and then correlated with the others to discover the true
   nature of the attack. Gauging the sophistication level of an attack and observing the activity immediately surrounding
   it provides a better understanding of whether or not an organization is being targeted by an advanced threat.



               The following represents three possible components of an advanced threat, how they
                             can be detected, and how to take action with LogRhythm.
    Breaking and Entering                         Cracking the Safe                             The Getaway

    Customer Challenge
    Recent, high-profile attacks have been        After successfully gaining access to a        Once attackers have successfully gained
    initiated by targeting specific groups        network, an attacker will avoid detection,    access to an organization’s high-value
    within the organization. They disguise        often cloaking his behavior by using          intellectual property, they can remove
    phishing emails as legitimate corporate       authorized credentials to emulate a           data either electronically of physically.
    communications, delivering payloads           legitimate user. For example, many            They can either download information
    such as malicious PDFs that when              attackers (human or malware) will log in to   directly from the server to a removable
    opened perform function such as               a genuine user account and will use it to     storage device or they can send it out
    installing a root kit.                        slowly probe the network for shared folders   over the wire.
                                                  containing confidential data.
    LogRhythm Solution
    LogRhythm can look for relevant logs          LogRhythm can look for a number of            LogRhythm analyzes log and event
    being generated within defined time           unique values over a specified period         data from targeted resources and
    intervals. Recognizing patterns of pre-       of time, such as a port probe originating     peripheral assets and correlates it with
    execution and post-execution behavior of      from one account that is systematically       fully integrated file integrity, network
    certain types of malware can identify zero-   scanning the network. Specific rules can      connection, process and removable
    day exploits that standard AV might miss.     be turned on to continuously look for slow    media monitoring logs. This provides
                                                  port probes.                                  immediate, detailed information on who
                                                                                                is accessing and/or attempting to steal
                                                                                                confidential data and how it is being done.
    Additional Features
    Once an attack has been identified            LogRhythm’s active remediation can            LogRhythm’s Data Loss Defender can
    LogRhythm can initiate automated              be configured to disable any account in       also be configured to actively prevent the
    remediation with the option to require        response to suspicious behavior, such as      removal of data via USB thumb drive.
    up to three steps of authorization            initiating port scanning on the network or    It actively protects your endpoints from
    prior to taking action. This can include      unauthorized access attempts to servers       data theft by automatically ejecting a
    adding an origin IP to a firewall ACL or      containing confidential data.                 drive before a connection is established,
    quarantining an internal host that has                                                      preventing critical information from being
    been compromised and is propagating                                                         copied to a removable storage device.
    an attack.




© 2011 LogRhythm Inc. | www.logrhythm.com                                                          AbsenceofanEventUseCase_A4_1107

Contenu connexe

En vedette (10)

What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheet
 
LogRhythm FIPS Data Sheet
LogRhythm  FIPS Data SheetLogRhythm  FIPS Data Sheet
LogRhythm FIPS Data Sheet
 
LogRhythm Privileged Use Monitoring Use Case
LogRhythm Privileged Use Monitoring Use CaseLogRhythm Privileged Use Monitoring Use Case
LogRhythm Privileged Use Monitoring Use Case
 
LogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UKLogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UK
 
LogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data SheetLogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data Sheet
 
LogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data SheetLogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data Sheet
 
LogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use CaseLogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use Case
 
LogRhythm E Phi Use Case
LogRhythm E Phi Use CaseLogRhythm E Phi Use Case
LogRhythm E Phi Use Case
 
LogRhythm Geolocation Use Case
LogRhythm Geolocation Use CaseLogRhythm Geolocation Use Case
LogRhythm Geolocation Use Case
 
CyberThreat Defense Report
CyberThreat Defense ReportCyberThreat Defense Report
CyberThreat Defense Report
 

Plus de jordagro

LogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use CaseLogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use Case
jordagro
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyer
jordagro
 
LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheet
jordagro
 
File Integrity Monitoring Data Sheet
File Integrity Monitoring Data SheetFile Integrity Monitoring Data Sheet
File Integrity Monitoring Data Sheet
jordagro
 
LogRhythm Appliance Data Sheet
LogRhythm Appliance Data SheetLogRhythm Appliance Data Sheet
LogRhythm Appliance Data Sheet
jordagro
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheet
jordagro
 

Plus de jordagro (6)

LogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use CaseLogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use Case
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyer
 
LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheet
 
File Integrity Monitoring Data Sheet
File Integrity Monitoring Data SheetFile Integrity Monitoring Data Sheet
File Integrity Monitoring Data Sheet
 
LogRhythm Appliance Data Sheet
LogRhythm Appliance Data SheetLogRhythm Appliance Data Sheet
LogRhythm Appliance Data Sheet
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheet
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

LogRhythm Detecting Advanced Threats Use Case UK

  • 1. USE CASE Detecting Advanced Threats The biggest challenge in protecting your organization from advanced threats is the unique and complex nature of each assault. Attackers frequently incorporate advanced custom malware designed to take advantage of specific exploits -- in many cases employing a series of highly-sophisticated zero day attacks. They frequently combine malware with well-planned physical theft and clever social engineering to harness a full spectrum of logical, physical and social attack vectors. After detecting a compromise, it’s difficult to immediately determine if the compromise was due to an Advanced Threat based on a single event or a simple behavior sequence. An attacker launching an advanced threat will typically employ several phases. Each step needs to be detected individually and then correlated with the others to discover the true nature of the attack. Gauging the sophistication level of an attack and observing the activity immediately surrounding it provides a better understanding of whether or not an organization is being targeted by an advanced threat. The following represents three possible components of an advanced threat, how they can be detected, and how to take action with LogRhythm. Breaking and Entering Cracking the Safe The Getaway Customer Challenge Recent, high-profile attacks have been After successfully gaining access to a Once attackers have successfully gained initiated by targeting specific groups network, an attacker will avoid detection, access to an organization’s high-value within the organization. They disguise often cloaking his behavior by using intellectual property, they can remove phishing emails as legitimate corporate authorized credentials to emulate a data either electronically of physically. communications, delivering payloads legitimate user. For example, many They can either download information such as malicious PDFs that when attackers (human or malware) will log in to directly from the server to a removable opened perform function such as a genuine user account and will use it to storage device or they can send it out installing a root kit. slowly probe the network for shared folders over the wire. containing confidential data. LogRhythm Solution LogRhythm can look for relevant logs LogRhythm can look for a number of LogRhythm analyzes log and event being generated within defined time unique values over a specified period data from targeted resources and intervals. Recognizing patterns of pre- of time, such as a port probe originating peripheral assets and correlates it with execution and post-execution behavior of from one account that is systematically fully integrated file integrity, network certain types of malware can identify zero- scanning the network. Specific rules can connection, process and removable day exploits that standard AV might miss. be turned on to continuously look for slow media monitoring logs. This provides port probes. immediate, detailed information on who is accessing and/or attempting to steal confidential data and how it is being done. Additional Features Once an attack has been identified LogRhythm’s active remediation can LogRhythm’s Data Loss Defender can LogRhythm can initiate automated be configured to disable any account in also be configured to actively prevent the remediation with the option to require response to suspicious behavior, such as removal of data via USB thumb drive. up to three steps of authorization initiating port scanning on the network or It actively protects your endpoints from prior to taking action. This can include unauthorized access attempts to servers data theft by automatically ejecting a adding an origin IP to a firewall ACL or containing confidential data. drive before a connection is established, quarantining an internal host that has preventing critical information from being been compromised and is propagating copied to a removable storage device. an attack. © 2011 LogRhythm Inc. | www.logrhythm.com AbsenceofanEventUseCase_A4_1107