SIEM
- do you have security intelligence and compliance across your
enterprise?
By Paul Rummery, Securenet Consulting
Are
you're SIEM solutions struggling to keep up with infrastructure
moving to the cloud and more mobile user and device risks - its time
for a new proven solution.
SIEM tools are powerful reporting systems, that pool data from individual hardware and software systems, contextualise the information to address compliance and management questions.
Without
such tools, these individual systems require a lot of human resource
time in compiling and contextualising data into meaningful business
and management information, whilst all the while vulnerabilities go
unchecked and unprotected.
Security
Intelligence Platforms provide a unified architecture for collecting,
storing, analysing and querying log, threat, vulnerability and risk
related data.
As
a result, operators, analysts and auditors benefit from:
- Unified collection, aggregation and analysis architecture for application logs, security events, vulnerability data, identity & access data, configuration files and network flow telemetry.
- A common platform for all searching, filtering, rule writing, and reporting functions.
- A single user interface for all log management, risk modelling, vulnerability prioritisation, incident detection and impact analysis tasks.
- Advanced customisable indexing technology enabling vast amount of data to be processed and intelligence extracted.
- Integration with other network and application data gathering tools
- Automated tools for meeting audit, policy monitoring for compliance reporting, e.g. Payment Card Industry Data Security Standards (PCI DSS) .
Regulations
define specific traffic and firewall policies that must be deployed,
monitored audited, and enforced. Yet many attacks on a network come
from inconsistent network and security configuration practices
highlighting the need for automated network configuration audits and
alerts of policy breaches.
Powerful
Risk Management & Threat Modelling Platform
Network Security Configuration
- Detailed configuration audit helps improve consistency of firewall rules.
- Security-focused network topology enables automated monitoring of configuration rules.
- Configuration change notification quickly alerts risky or out-of-compliance configuration.
Network Activity Monitoring
- Advanced monitoring and analysis of network activity features quickly flag out-of-policy traffic.
- Fast and efficient search of network activity greatly reduces forensics effort.
- Intuitive visualisation tool provides interactive analysis of network activity.
Network / Security Events
- Analysis of firewall allow/deny events to assess of policy effectiveness.
- Automated audit of device configuration, after configuration change events, ensures record of the most up-to-date configuration.
- Advanced asset database leverages information from a wide variety of network/security events and improves accuracy of results.
Vulnerability Scan Results
- Integrated understanding of network topology helps deliver a prioritised list of vulnerabilities to better assess which systems are most vulnerable to attack.
- Centralised policy monitoring delivers improved compliance verification.
- Advanced vulnerability modelling, simulation, and visualisation provides before, during and after assessment of vulnerability risks.
Modelling and Simulation of Network and Security Events
Provides
a graphical representations of the network in two visualisations -
offering network and security teams a revolutionary investigative
capacity by providing before, during and after vulnerability
information.
1) the
“Network Topology”, delivers detailed views into how network
traffic can and does traverse a network. Different than all other
network topologies, this insight comes from a unique combination of
data sources, including device configuration, network activity data
(from flows), and security events (i.e. firewall allows/ denies).
2) the
“Connection Monitor” is a fast and efficient tool for
investigating and analysing historical network activity. Adding value
to these visualisations are network mappings that allow
visualisations to assess when traffic can and does occur with
specific geographic regions or known high risk networks.
Leverage
Cloud Investments
We
know many of you have built significant private and public cloud
infrastructures and are looking for new virtual workloads to deploy
in the cloud.
You
can now deploy data collectors virtually, providing more ways to use
your cloud environment to gain richer security intelligence.
These
Collectors provide continuous event logging capabilities, even when
network connectivity is unreliable. They collect event logs and
forward them to an event processor or all-in-one appliance for
correlation, analysis and long-term storage. If network
connectivity is lost, they can queue events in a storage buffer and
then forward them upon re-connecting. (We call this “store
and forward.”) In addition to serving locations with
intermittent network connections (like naval vessels), event
collectors are well-suited for collecting logs in distributed
locations with low to moderate event volumes, such as retail stores
and satellite offices. A large retailer, for example, might
have hundreds of stores in which they want to collect event data, but
the data generated in each location is modest enough that event
processors (with terabytes of storage per appliance) aren't required.
You
can limit forwarding by bandwidth utilisation (e.g., never consume
>1MB/second), and/or set an hourly, daily or weekly forwarding
schedule. In addition, event collectors can filter event data
before it is forwarded for correlation, reporting and long-term
storage.
---------------------------------------------------------------------------------------------------------------
WANT TO LEARN MORE? Contact Securenet Consulting
---------------------------------------------------------------------------------------------------------------
WANT TO LEARN MORE? Contact Securenet Consulting