SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
DEMONSTRATING
THE ROI FOR SIEM
Tales from the Trenches
HP Enterprise Security Business Whitepaper
2
Introduction
Security professionals sometimes struggle to demonstrate
the return on investment for new solutions. Showing
clear long-term cost savings or conducting a total cost
of ownership (TCO) comparison is a very effective way
to show the value of a security investment. Doing so
also allows the security team to align with management
to make a positive contribution to the business. In
this whitepaper, we look at several examples where
significant cost savings are demonstrated and the cost of
purchase of security information and event management
(SIEM) technology has been realized in short periods of
time following the SIEM implementation.
Calculating ROI for Security Investments
Making a business justification for investing in SIEM
technology is often the hardest part of the security
project. The value of security investments can be
realized in the form of “soft benefits,” such as increased
situational awareness, reduced organizational risk,
broader security visibility and better brand awareness
– benefits that are hard to compute. However, hard
figures can often be calculated up front and verified
over time. The business justification of a SIEM investment
can be quantified by looking at cost break-even points,
and the costs avoided with the SIEM technology. SIEM
technology can help by:
•	Removing inefficiencies through automation
•	Avoiding infrastructure expansion costs
•	Preventing expenditures for compliance penalties
•	Reducing loss through fraud
•	Averting losses due to system outages
By taking this approach, the security team is able to
demonstrate the monetary value of SIEM investment,
and align with business units to build a business case.
We will describe several real-world examples of how
organizations have seen quick break-even points,
reduced their total cost of ownership and realized
efficiencies with the help of their SIEM investment.
ROI Examples
Prevent Personnel Expansion
As a company’s size and reliance on technology
increases, so does the volume of logs it needs to collect,
store and analyze. This was the case with a regional
health insurance and care provider, who was generating
over four terabytes of operating system, database and
application log data each quarter. To maintain their
security and ensure HIPAA compliance, the company
needed a staff of six analysts to manually review the
activity logs, and another two to manage the alerts and
notifications at a cost of about $1.4 million per year. The
requirements and increasing demands placed on these
individuals caused a high turnover in the team, adding
to the complexity of the situation.
To combat the challenges, the healthcare group decided
to automate security and compliance monitoring tasks
with ArcSight ESM. At the heart of their decision was a
TCO analysis over a three-year period. By implementing
ArcSight ESM they concluded they would reduce their
security and compliance expenditure by about 85% over
three years, and their ArcSight ESM investment would be
recovered through cost savings in just over three months.
Prevent Personnel Expansion
ORGANIZATION Healthcare Insurance and
Services Provider
HARD DOLLAR
BENEFIT
Savings of $3.5 million
over three years from staff
reallocation
TIME TO PAYBACK 3 months, 12 days
SOFT BENEFITS Better enterprise visibility
Faster incident response
Less employee turnover
Reduce Critical Incident Rate
Managed security service providers (MSSPs) have large
IT footprints and can generate hundreds of millions, even
billions, of events per day. Successful threat mitigation
depends on being able to quickly identify the critical
events so that they can be handled before they can
cause a big impact. In a traditional MSSP monitoring
250 enterprise customers, they had to analyze 3000
incidents per hour.
Many of these alerts were prioritized incorrectly, were
repeat alerts about already handled events or false
positives. As a result, a substantial security team was
required to process the alerts.
To help them bring the critical event volume under
control, the MSSP turned to ArcSight. They used the
ArcSight ESM correlation and rule building framework
to optimize their security alerts. With the appropriate
correlation rules and alerts, ArcSight ESM was able
to reduce the number of false positives the MSSP saw
and remove the redundant alerts through aggregation.
The MSSP was also able to fine-tune the priorities of
critical events, allowing security analysts to see the most
important items first and provide better service to their
customers. The MSSP was able to reduce the critical
incident rate to fewer than 200 per hour, a decrease
of over 93%. They were also able to repurpose 75%
of their security staff to strategic efforts and improved
service. With these savings, their ArcSight SIEM platform
investment broke even in just over six months.
3
Reduce Critical Incident Rate
ORGANIZATION Managed Security Services
Provider (MSSP)
HARD DOLLAR
BENEFIT
Annual savings of $1 million
from staff reduction and
reallocation
TIME TO PAYBACK 6 months, 20 days
SOFT BENEFITS Better incident prioritization
Focused alert resolution
Improved customer service
Reduce SOX Compliance Reporting Effort
Preparing for audits manually is usually a time-
consuming, resource intensive process. One regional
publicly traded utility company estimated that it took
them 8,500 man-hours at a cost of roughly $1.5 million
to prepare for their SOX audit. They used an external
consulting firm teamed with internal staff to test controls,
document processes and compile all the results into
reports for auditors.
The organization conducted a study of the three-year
total cost of ownership of SIEM solutions. They selected
the ArcSight SIEM platform to automate many of the
manual tasks involved with preparing for their SOX
audit. The benefits they accomplished with ArcSight ESM
were a drastic reduction of costs and labor involved.
ArcSight ESM was able to execute all their control testing
and reporting with only 900 man-hours of work – a
reduction of nearly 90% with a total payback period
of just 39 days. The organization also experienced soft
benefits, gaining better, unprecedented awareness of
their compliance status at any given moment.
Reduce SOX Compliance Reporting Effort
ORGANIZATION Regional Electric Utilities
Company
HARD DOLLAR
BENEFIT
Savings of $4.6 million over
three years from elimination of
7,600 work-hours
TIME TO PAYBACK 39 days
SOFT BENEFITS Fewer compliance violations
Proactive compliance program
More consistency in controls
and processes
Extend Useful Life of Legacy Applications
Shared accounts often are utilized to access internal
systems and data stores, and in some cases, legacy
applications. This is a material violation for many
compliance mandates, and organizations fail their audits
because accounts are shared between individuals.
One of the largest Canadian credit unions was faced
with a material compliance violation because their
financial reporting systems had generic usernames and
passwords hard coded into legacy applications. There
was no way to identify which individual performed what
specific transaction on the financial systems.
Faced with the daunting task of rewriting their
applications to include individual accountability at a
cost of $8 million over a year’s time, the credit union
solicited help from ArcSight. For a fraction of the cost,
ArcSight ESM, coupled with ArcSight IdentityView,
allowed the organization to extend the life of their
legacy applications by correlating user information
with activity logs. ArcSight ESM also enabled real-time
alerts when users would access financial systems without
authorization. The credit union was not only able to
avoid a major application redevelopment expense, but
saw their ArcSight ESM investment recouped in just five
weeks.
Extend Useful Life of Legacy Applications
ORGANIZATION Credit Union
HARD DOLLAR
BENEFIT
Savings of $8 million by
deferring software rewrite
TIME TO PAYBACK 3 weeks
SOFT BENEFITS Audit violations removed
Avoided risk of technology
replacement
Gained visibility into user
activity
Prevent Internal Resource Abuse
Using SIEM solutions, organizations often accomplish
other operational benefits and savings that are unrelated
to security or compliance. A global telecommunications
provider initially implemented ArcSight products
to monitor their 4500 seat call center. Call centers
generally have lower skilled employees and high turn
over rates; add in easy access to customer data and you
have a propensity for data theft.
While monitoring call center representative behavior,
ArcSight discovered an unusually heavy use of printing
resources – roughly a million pages at a cost of about
$100,000 in printer lease, paper and toner cartridges
each month. A quick investigation unveiled the fact that
most of the employees were also students and were
using the organization’s resources to print textbooks,
papers and a host of material unrelated to their job.
This analysis alone demonstrated an ArcSight ESM
investment payback period of just 2 ½ months, and the
on-going savings have paid back the initial SIEM outlay
many times over.
4
Prevent Internal Resource Abuse
ORGANIZATION Global Telecommunications
Company
HARD DOLLAR
BENEFIT
Savings of $3.6 million over
three years from office supplies
usage reduction
TIME TO PAYBACK 2 months, 15 days
SOFT BENEFITS Increased call center
productivity
Improved recruiting processes
New visibility into user activity
Prevent Funds Transfer Fraud
A regional bank in the Midwestern United States using
ArcSight ESM for compliance monitoring and reporting
was facing a growing fraud problem that they could not
keep up with. The fraudulent activity involved moving
funds around different accounts within and outside
the bank, and using long time frames and knowledge
of the bank transfer approval process to conduct the
transactions.
The bank expanded their existing ArcSight ESM solution
to include rules and alerts for fraud monitoring. Using
the new intelligence the firm’s anti-fraud team was
able to stop illegitimate bank transfers worth nearly
$900,000 within the first week. The combination of
real-time correlation and pin-point accuracy allowed the
bank to find and stop these transactions, translating to a
payback period of less than a week.
Prevent Funds Transfer Fraud
ORGANIZATION Regional Financial Institution
HARD DOLLAR BENEFIT Prevent fraud worth $900K
TIME TO PAYBACK Less than 1 week
SOFT BENEFITS Increased visibility into
transfer operations
Proactive, not reactive, fraud
prevention
Additional use cases
ArcSight Products for Security
and Compliance
ArcSight provides a complete, integrated set of
products to address security and compliance needs.
With ArcSight SIEM and log management solutions,
organizations are able to easily demonstrate the value
brought to the organization in the form of real cost
savings.
The ArcSight SIEM platform includes the following
products:
•	ArcSight ESM – Enterprise Event Correlation
ArcSight ESM is a SIEM solution that brings total
environment visibility. ArcSight ESM collects event
information from every system and device and
categorizes it for analysis. With the ArcSight ESM
correlation capability, analysts are able to focus on the
events that matter most. It allows security, compliance
and anti-fraud personnel to quickly identify and
prevent network security attacks, compliance violations
and fraudulent business transactions. The ArcSight
common event format (CEF) allows customers to reduce
their training costs, gain real-time visibility into their
security and compliance status and scale to the needs
of the organization.
•	ArcSight Logger – Efficient and Self-Managing Storage
and Compliance Reporting
ArcSight Logger provides a complete, market-leading
log management solution for long-term data retention.
Compliance mandates usually require companies to
retain event log data for long periods of time, making
storage efficiency and compression format very
important. Demonstrating compliance also means the
data must be readily available for fast searching,
reporting and analysis. With ArcSight Logger,
enterprises are able to efficiently collect, centrally store
and provide interactive search and analysis
capabilities across all log data. ArcSight Logger also
allows easy compliance reporting, historical data
analysis and fast forensic search. ArcSight Logger
delivers search rates in the range of 3,000,000 events
per second without any significant tradeoff on
collection rates or storage efficiency. ArcSight Logger
eliminates the tradeoffs seen in competing log
management products, which require customers to
trade off between fast data capture, fast search and
high compression. ArcSight Logger provides a unique
data storage architecture that captures logs at high
speeds, supports high speed simultaneous search, and
compresses data at an average ratio of 10:1.
WHAT
Historical Analysis
WHAT
Asset Value
WHERE
Contextual Analysis
WHEN
Time Window
HOW
Correlation Engine
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties
for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
All other product and company names may be trademarks or registered trademarks of their respective owners.
ESP-BWP018-101409-02, Created August 2011 	
•	ArcSight SmartConnectors
In order to understand the overall security posture of
the organization, it is necessary to collect event logs
from all devices across the network. ArcSight allows
out-of-the-box event log collection from over 275
devices through pre-built ArcSight Connectors. These
connectors collect event logs in their native format and
then normalize and categorize them to the ArcSight
CEF for easy correlation and analysis. The ArcSight
Connector architecture enables “future-proof”
monitoring, as the system will continue to work even
when network technologies are swapped out and
replaced with those from new vendors. By relying on
ArcSight CEF, ArcSight Connectors insulate your
analysis from your product and vendor choice. For
example, ArcSight allows an organization to swap its
Cisco firewall infrastructure with Checkpoint without
impacting the rules, reports, alerts and dashboards
that have already been built.
•	ArcSight Compliance Insight Packages
ArcSight Compliance Insight Packages (CIPs) provide
the deep and focused resources needed to efficiently
demonstrate compliance. CIPs help minimize the labor
and human error component of compliance initiatives.
By automating real-time monitoring and reporting
across the full range of audit, business and security
controls, companies can dramatically lower the cost of
compliance. ArcSight CIPs collect relevant enterprise
events across all locations and sources, and then
correlate this data in real time to detect compliance
violations, data breaches or other fraudulent activity.
All audit-relevant information is stored in accordance
with mandated retention policies, and visualized
through dashboards and reports that simplify and
automate audits while providing continuous visibility
into the compliance posture. With ArcSight CIPs in
place, organizations can not only achieve ongoing
compliance, but also safeguard their assets and
enforce corporate policies and processes. ArcSight
CIPs are available for a variety regulations, industry
mandates and control frameworks including SOX, PCI,
FISMA, HIPAA, NERC, Basel II and European Data
Privacy Directive.
•	ArcSight Express – Your Expert “In a Box”
for Security Monitoring
ArcSight Express is a fully contained, appliance-based
SIEM solution geared to the mid-market customer. It
focuses on the needs of corporations with limited
resources for installation and ongoing administration.
With ArcSight Express, the mid-market organization
can easily detect problems by consolidating security
information to one central location. ArcSight Express
comes with the necessary best practices and security
expertise built in, including rules, alerts, reports and
dashboards that are focused on the common areas of
risk.
Summary
SIEM can deliver tremendous value to an organization,
as demonstrated by the examples in this whitepaper.
This whitepaper clearly demonstrates that the benefits of
SIEM far outweigh the acquisition cost, and the expense
is usually paid off within a few weeks or months.
“Hard benefits” are most often quantified through total
cost of ownership comparisons between on-going
manual security tasks and the cost of deploying SIEM
automation. In addition, organizations that deploy SIEM
technology gain “soft benefits” in the form of better
security situational awareness, reduced risk and other
operational benefits.

Contenu connexe

Tendances

Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15
Jay Steidle
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
OWASP Russia
 

Tendances (20)

You Can't Correlate what you don't have - ArcSight Protect 2011
You Can't Correlate what you don't have - ArcSight Protect 2011You Can't Correlate what you don't have - ArcSight Protect 2011
You Can't Correlate what you don't have - ArcSight Protect 2011
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Hp arcsight services 2014 ewb
Hp arcsight services 2014   ewbHp arcsight services 2014   ewb
Hp arcsight services 2014 ewb
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15Gartner_Critical Capabilities for SIEM 9.21.15
Gartner_Critical Capabilities for SIEM 9.21.15
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Information Security: Advanced SIEM Techniques
Information Security: Advanced SIEM TechniquesInformation Security: Advanced SIEM Techniques
Information Security: Advanced SIEM Techniques
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
[2.3] Large enterprise SIEM: get ready for oversize - Svetlana (Mona) Arkhipova
 
Arcsight explained
Arcsight explainedArcsight explained
Arcsight explained
 

Similaire à HP ArcSight Demonstrating ROI For a SIEM Solution

Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
DataCore Software
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
amburyj3c9
 
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
Gary S. Kaminsky
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Started
mxp5714
 
Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docx
clarebernice
 
LicencesAren'tAssets
LicencesAren'tAssetsLicencesAren'tAssets
LicencesAren'tAssets
Ben Jarvis
 
Gmid associates services portfolio bank
Gmid associates  services portfolio bankGmid associates  services portfolio bank
Gmid associates services portfolio bank
Pankaj Jha
 
1.Innova Zurich
1.Innova Zurich1.Innova Zurich
1.Innova Zurich
Ermando
 

Similaire à HP ArcSight Demonstrating ROI For a SIEM Solution (20)

The ROI of Safety in Manufacturing
The ROI of Safety in Manufacturing  The ROI of Safety in Manufacturing
The ROI of Safety in Manufacturing
 
Accelerating Actuarial Processes
Accelerating Actuarial ProcessesAccelerating Actuarial Processes
Accelerating Actuarial Processes
 
Study ROI of Supply Chain Risk Management (riskmethods Nov 2014)
Study ROI of Supply Chain Risk Management (riskmethods Nov 2014)Study ROI of Supply Chain Risk Management (riskmethods Nov 2014)
Study ROI of Supply Chain Risk Management (riskmethods Nov 2014)
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
Case Study: How a fortune 500 global security company reduced SoD Auditing by...
Case Study: How a fortune 500 global security company reduced SoD Auditing by...Case Study: How a fortune 500 global security company reduced SoD Auditing by...
Case Study: How a fortune 500 global security company reduced SoD Auditing by...
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
 
Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk Expert handling and management of project and compliance risk
Expert handling and management of project and compliance risk
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
The Buyers Guide to RMIS (Risk Management Information System)
The Buyers Guide to RMIS (Risk Management Information System)The Buyers Guide to RMIS (Risk Management Information System)
The Buyers Guide to RMIS (Risk Management Information System)
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
 
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
ConceptOne - Whitepaper - Achieving Regulatory Alpha Through Regulatory Risk ...
 
Business Continuity Getting Started
Business Continuity Getting StartedBusiness Continuity Getting Started
Business Continuity Getting Started
 
Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docx
 
LicencesAren'tAssets
LicencesAren'tAssetsLicencesAren'tAssets
LicencesAren'tAssets
 
From Regulatory-driven Risk Operating Models to Improved ECM and Client Cent...
From Regulatory-driven Risk  Operating Models to Improved ECM and Client Cent...From Regulatory-driven Risk  Operating Models to Improved ECM and Client Cent...
From Regulatory-driven Risk Operating Models to Improved ECM and Client Cent...
 
Gmid associates services portfolio bank
Gmid associates  services portfolio bankGmid associates  services portfolio bank
Gmid associates services portfolio bank
 
1.Innova Zurich
1.Innova Zurich1.Innova Zurich
1.Innova Zurich
 

Dernier

Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
HyderabadDolls
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Bertram Ludäscher
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
ranjankumarbehera14
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
SayantanBiswas37
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
HyderabadDolls
 

Dernier (20)

Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 

HP ArcSight Demonstrating ROI For a SIEM Solution

  • 1. DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper
  • 2. 2 Introduction Security professionals sometimes struggle to demonstrate the return on investment for new solutions. Showing clear long-term cost savings or conducting a total cost of ownership (TCO) comparison is a very effective way to show the value of a security investment. Doing so also allows the security team to align with management to make a positive contribution to the business. In this whitepaper, we look at several examples where significant cost savings are demonstrated and the cost of purchase of security information and event management (SIEM) technology has been realized in short periods of time following the SIEM implementation. Calculating ROI for Security Investments Making a business justification for investing in SIEM technology is often the hardest part of the security project. The value of security investments can be realized in the form of “soft benefits,” such as increased situational awareness, reduced organizational risk, broader security visibility and better brand awareness – benefits that are hard to compute. However, hard figures can often be calculated up front and verified over time. The business justification of a SIEM investment can be quantified by looking at cost break-even points, and the costs avoided with the SIEM technology. SIEM technology can help by: • Removing inefficiencies through automation • Avoiding infrastructure expansion costs • Preventing expenditures for compliance penalties • Reducing loss through fraud • Averting losses due to system outages By taking this approach, the security team is able to demonstrate the monetary value of SIEM investment, and align with business units to build a business case. We will describe several real-world examples of how organizations have seen quick break-even points, reduced their total cost of ownership and realized efficiencies with the help of their SIEM investment. ROI Examples Prevent Personnel Expansion As a company’s size and reliance on technology increases, so does the volume of logs it needs to collect, store and analyze. This was the case with a regional health insurance and care provider, who was generating over four terabytes of operating system, database and application log data each quarter. To maintain their security and ensure HIPAA compliance, the company needed a staff of six analysts to manually review the activity logs, and another two to manage the alerts and notifications at a cost of about $1.4 million per year. The requirements and increasing demands placed on these individuals caused a high turnover in the team, adding to the complexity of the situation. To combat the challenges, the healthcare group decided to automate security and compliance monitoring tasks with ArcSight ESM. At the heart of their decision was a TCO analysis over a three-year period. By implementing ArcSight ESM they concluded they would reduce their security and compliance expenditure by about 85% over three years, and their ArcSight ESM investment would be recovered through cost savings in just over three months. Prevent Personnel Expansion ORGANIZATION Healthcare Insurance and Services Provider HARD DOLLAR BENEFIT Savings of $3.5 million over three years from staff reallocation TIME TO PAYBACK 3 months, 12 days SOFT BENEFITS Better enterprise visibility Faster incident response Less employee turnover Reduce Critical Incident Rate Managed security service providers (MSSPs) have large IT footprints and can generate hundreds of millions, even billions, of events per day. Successful threat mitigation depends on being able to quickly identify the critical events so that they can be handled before they can cause a big impact. In a traditional MSSP monitoring 250 enterprise customers, they had to analyze 3000 incidents per hour. Many of these alerts were prioritized incorrectly, were repeat alerts about already handled events or false positives. As a result, a substantial security team was required to process the alerts. To help them bring the critical event volume under control, the MSSP turned to ArcSight. They used the ArcSight ESM correlation and rule building framework to optimize their security alerts. With the appropriate correlation rules and alerts, ArcSight ESM was able to reduce the number of false positives the MSSP saw and remove the redundant alerts through aggregation. The MSSP was also able to fine-tune the priorities of critical events, allowing security analysts to see the most important items first and provide better service to their customers. The MSSP was able to reduce the critical incident rate to fewer than 200 per hour, a decrease of over 93%. They were also able to repurpose 75% of their security staff to strategic efforts and improved service. With these savings, their ArcSight SIEM platform investment broke even in just over six months.
  • 3. 3 Reduce Critical Incident Rate ORGANIZATION Managed Security Services Provider (MSSP) HARD DOLLAR BENEFIT Annual savings of $1 million from staff reduction and reallocation TIME TO PAYBACK 6 months, 20 days SOFT BENEFITS Better incident prioritization Focused alert resolution Improved customer service Reduce SOX Compliance Reporting Effort Preparing for audits manually is usually a time- consuming, resource intensive process. One regional publicly traded utility company estimated that it took them 8,500 man-hours at a cost of roughly $1.5 million to prepare for their SOX audit. They used an external consulting firm teamed with internal staff to test controls, document processes and compile all the results into reports for auditors. The organization conducted a study of the three-year total cost of ownership of SIEM solutions. They selected the ArcSight SIEM platform to automate many of the manual tasks involved with preparing for their SOX audit. The benefits they accomplished with ArcSight ESM were a drastic reduction of costs and labor involved. ArcSight ESM was able to execute all their control testing and reporting with only 900 man-hours of work – a reduction of nearly 90% with a total payback period of just 39 days. The organization also experienced soft benefits, gaining better, unprecedented awareness of their compliance status at any given moment. Reduce SOX Compliance Reporting Effort ORGANIZATION Regional Electric Utilities Company HARD DOLLAR BENEFIT Savings of $4.6 million over three years from elimination of 7,600 work-hours TIME TO PAYBACK 39 days SOFT BENEFITS Fewer compliance violations Proactive compliance program More consistency in controls and processes Extend Useful Life of Legacy Applications Shared accounts often are utilized to access internal systems and data stores, and in some cases, legacy applications. This is a material violation for many compliance mandates, and organizations fail their audits because accounts are shared between individuals. One of the largest Canadian credit unions was faced with a material compliance violation because their financial reporting systems had generic usernames and passwords hard coded into legacy applications. There was no way to identify which individual performed what specific transaction on the financial systems. Faced with the daunting task of rewriting their applications to include individual accountability at a cost of $8 million over a year’s time, the credit union solicited help from ArcSight. For a fraction of the cost, ArcSight ESM, coupled with ArcSight IdentityView, allowed the organization to extend the life of their legacy applications by correlating user information with activity logs. ArcSight ESM also enabled real-time alerts when users would access financial systems without authorization. The credit union was not only able to avoid a major application redevelopment expense, but saw their ArcSight ESM investment recouped in just five weeks. Extend Useful Life of Legacy Applications ORGANIZATION Credit Union HARD DOLLAR BENEFIT Savings of $8 million by deferring software rewrite TIME TO PAYBACK 3 weeks SOFT BENEFITS Audit violations removed Avoided risk of technology replacement Gained visibility into user activity Prevent Internal Resource Abuse Using SIEM solutions, organizations often accomplish other operational benefits and savings that are unrelated to security or compliance. A global telecommunications provider initially implemented ArcSight products to monitor their 4500 seat call center. Call centers generally have lower skilled employees and high turn over rates; add in easy access to customer data and you have a propensity for data theft. While monitoring call center representative behavior, ArcSight discovered an unusually heavy use of printing resources – roughly a million pages at a cost of about $100,000 in printer lease, paper and toner cartridges each month. A quick investigation unveiled the fact that most of the employees were also students and were using the organization’s resources to print textbooks, papers and a host of material unrelated to their job. This analysis alone demonstrated an ArcSight ESM investment payback period of just 2 ½ months, and the on-going savings have paid back the initial SIEM outlay many times over.
  • 4. 4 Prevent Internal Resource Abuse ORGANIZATION Global Telecommunications Company HARD DOLLAR BENEFIT Savings of $3.6 million over three years from office supplies usage reduction TIME TO PAYBACK 2 months, 15 days SOFT BENEFITS Increased call center productivity Improved recruiting processes New visibility into user activity Prevent Funds Transfer Fraud A regional bank in the Midwestern United States using ArcSight ESM for compliance monitoring and reporting was facing a growing fraud problem that they could not keep up with. The fraudulent activity involved moving funds around different accounts within and outside the bank, and using long time frames and knowledge of the bank transfer approval process to conduct the transactions. The bank expanded their existing ArcSight ESM solution to include rules and alerts for fraud monitoring. Using the new intelligence the firm’s anti-fraud team was able to stop illegitimate bank transfers worth nearly $900,000 within the first week. The combination of real-time correlation and pin-point accuracy allowed the bank to find and stop these transactions, translating to a payback period of less than a week. Prevent Funds Transfer Fraud ORGANIZATION Regional Financial Institution HARD DOLLAR BENEFIT Prevent fraud worth $900K TIME TO PAYBACK Less than 1 week SOFT BENEFITS Increased visibility into transfer operations Proactive, not reactive, fraud prevention Additional use cases ArcSight Products for Security and Compliance ArcSight provides a complete, integrated set of products to address security and compliance needs. With ArcSight SIEM and log management solutions, organizations are able to easily demonstrate the value brought to the organization in the form of real cost savings. The ArcSight SIEM platform includes the following products: • ArcSight ESM – Enterprise Event Correlation ArcSight ESM is a SIEM solution that brings total environment visibility. ArcSight ESM collects event information from every system and device and categorizes it for analysis. With the ArcSight ESM correlation capability, analysts are able to focus on the events that matter most. It allows security, compliance and anti-fraud personnel to quickly identify and prevent network security attacks, compliance violations and fraudulent business transactions. The ArcSight common event format (CEF) allows customers to reduce their training costs, gain real-time visibility into their security and compliance status and scale to the needs of the organization. • ArcSight Logger – Efficient and Self-Managing Storage and Compliance Reporting ArcSight Logger provides a complete, market-leading log management solution for long-term data retention. Compliance mandates usually require companies to retain event log data for long periods of time, making storage efficiency and compression format very important. Demonstrating compliance also means the data must be readily available for fast searching, reporting and analysis. With ArcSight Logger, enterprises are able to efficiently collect, centrally store and provide interactive search and analysis capabilities across all log data. ArcSight Logger also allows easy compliance reporting, historical data analysis and fast forensic search. ArcSight Logger delivers search rates in the range of 3,000,000 events per second without any significant tradeoff on collection rates or storage efficiency. ArcSight Logger eliminates the tradeoffs seen in competing log management products, which require customers to trade off between fast data capture, fast search and high compression. ArcSight Logger provides a unique data storage architecture that captures logs at high speeds, supports high speed simultaneous search, and compresses data at an average ratio of 10:1. WHAT Historical Analysis WHAT Asset Value WHERE Contextual Analysis WHEN Time Window HOW Correlation Engine
  • 5. © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. All other product and company names may be trademarks or registered trademarks of their respective owners. ESP-BWP018-101409-02, Created August 2011 • ArcSight SmartConnectors In order to understand the overall security posture of the organization, it is necessary to collect event logs from all devices across the network. ArcSight allows out-of-the-box event log collection from over 275 devices through pre-built ArcSight Connectors. These connectors collect event logs in their native format and then normalize and categorize them to the ArcSight CEF for easy correlation and analysis. The ArcSight Connector architecture enables “future-proof” monitoring, as the system will continue to work even when network technologies are swapped out and replaced with those from new vendors. By relying on ArcSight CEF, ArcSight Connectors insulate your analysis from your product and vendor choice. For example, ArcSight allows an organization to swap its Cisco firewall infrastructure with Checkpoint without impacting the rules, reports, alerts and dashboards that have already been built. • ArcSight Compliance Insight Packages ArcSight Compliance Insight Packages (CIPs) provide the deep and focused resources needed to efficiently demonstrate compliance. CIPs help minimize the labor and human error component of compliance initiatives. By automating real-time monitoring and reporting across the full range of audit, business and security controls, companies can dramatically lower the cost of compliance. ArcSight CIPs collect relevant enterprise events across all locations and sources, and then correlate this data in real time to detect compliance violations, data breaches or other fraudulent activity. All audit-relevant information is stored in accordance with mandated retention policies, and visualized through dashboards and reports that simplify and automate audits while providing continuous visibility into the compliance posture. With ArcSight CIPs in place, organizations can not only achieve ongoing compliance, but also safeguard their assets and enforce corporate policies and processes. ArcSight CIPs are available for a variety regulations, industry mandates and control frameworks including SOX, PCI, FISMA, HIPAA, NERC, Basel II and European Data Privacy Directive. • ArcSight Express – Your Expert “In a Box” for Security Monitoring ArcSight Express is a fully contained, appliance-based SIEM solution geared to the mid-market customer. It focuses on the needs of corporations with limited resources for installation and ongoing administration. With ArcSight Express, the mid-market organization can easily detect problems by consolidating security information to one central location. ArcSight Express comes with the necessary best practices and security expertise built in, including rules, alerts, reports and dashboards that are focused on the common areas of risk. Summary SIEM can deliver tremendous value to an organization, as demonstrated by the examples in this whitepaper. This whitepaper clearly demonstrates that the benefits of SIEM far outweigh the acquisition cost, and the expense is usually paid off within a few weeks or months. “Hard benefits” are most often quantified through total cost of ownership comparisons between on-going manual security tasks and the cost of deploying SIEM automation. In addition, organizations that deploy SIEM technology gain “soft benefits” in the form of better security situational awareness, reduced risk and other operational benefits.