SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016
www.lumenate.com
White Paper
Fluency®
Application Based
Correlation
Introduction
FLUENCY IS COMPREHENSIVE VISIBILITY
Fluency® is vision for controlling the modern network. With innovative application awareness,
auto-correlation and big data capacity, Fluency provides insight and understanding far beyonda
single tool or dashboard application. Fluency reduces operating costs while allowing security to
keep pace with modern networks.
Fluency technology:
Provides comprehensive visibility into the network and how applications flow within it.
Automatically correlates disparate security devices into a comprehensible view.
Shows how network behavior and security events relate.
Presents related information, providing a clear understanding to issues.
Network Visibility is a critical aspect to addressing today’s threats. It is know that the common
network infrastructure does not work well in seeing network attacks and a network cannot
defend itself from what cannot be seen. Fluency provides a fundamental shift to how an
organization’s network detects and responds to threats by focusing on showing related data. It
is well known that attackers must use the lines of communication to an organization’s networks
assets. The vision Fluency provides into this communication is an essential aspect to protecting
an organization’s network.
Fluency technology achieves security comprehension by presenting related information needed
for decisions at hand and provides access to significantly more information when needed.
Fluency addresses information overload, not by dumbing down the data, but by better selecting
relevant data. Fluency provides the most comprehensive view of the network, more than any
security or network product in the market today. Fluency technology makes staff more effective
and productive.
Fluency is used by its customers to eliminate disparate views that are the result of multiple
single-brand solutions. Fluency believes that no single vendor has a complete solution and that
a technology must be implemented that leverages all corporate investments.
Fluency customers find that a view based on correlated application flow with security & network
events provides the vision to manage, roadmap and operate the network in a business-like
manner.
Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016
www.lumenate.com
Prior to implementing Fluency, our customers could only gauge their security by being
compliant to the latest trends or by the amount of time spent reacting to issues. After Fluency,
our customers focus on measuring and road mapping their security. Response is a key
element to staying secure, but response includes adjustments at the technical, architectural and
policy levels. The ability to measure and roadmap to these larger issues ensures the best
possible long term security performance and posture.
This paper explores the challenges that organizations face without proper network vision and
the results Fluency provides through application based correlation.
Challenges of the Modern Network
A NEW FOCUS ON INFORMATION ANDMESSAGING
Businesses are discovering that simply putting antivirus on desktops and providing Internet to
employees is not enough. Business today requires operation by efficiency and execution.
Businessesof all sizes need the ability to see, measure and control how work flows within their
network.
Today’s work applications empower companies to execute. Companies have adapted to
application connectivity through mobile support, BYOD integration and distributed/remote
network connectivity. The flow of applications has become independent of theunderlying
network and the traditional approaches conceived a couple of decades ago are no longer a fit
for today’s network and security needs.
Despite huge leaps in technology over the last two decades, log and event management have
not changed from two basic camps: network flow analysis and security event management.
Network flow technology was created in 1996 for network diagnostics, while event management
in 1998 in order to handle alerts from multiple network segments. Although how they are used
has changed, while how they operate has changed little.
This gap between how the network is used today and the technology utilized to manage
environments has grown to a point where many no longer see traditional security event
information managers (SIEM) as relevant. As networks continue to grow in size and
complexity,the simple lists, dashboard gauges and charts add to the information overload and a
lack of managerial control or any real insight. Today organizations are chartered and expected
to provide the needed security posture, which is now becoming more important inthe board
room, even though security teams do not have the needed tools providing the vision necessary
to execute an effective security strategy utilizing the traditional dashboards and SIEMs.
Importance of Related Data
SOLVING INFORMATION OVERLOAD WITHOUT DUMBING DOWN THE DATA
Fluency is a network vision tool that correlates application flows, network logs and security
events. It differs in that it maintains both a traditional transaction oriented view of events and a
graph database that tracks and analyzes the relationships between events and attributes. This
underlying technical difference means that the type of data Fluency produces is significantly
different.
Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016
www.lumenate.com
Fluency offers fast and complete vision into the entire network and all network logs. Fluency
combines big data and event correlation making data access faster, while presenting related
data leading to insight and vision.
Why is related data important? The old saying, “One can’t ask for what one doesn’t know” is
not exactly true. When one shops on Amazon, watches a movie on Netflix or goes to iTunes,
thesystem responds with related material that also might be of interest. Related information is
critical to good insight and decision making. Fluency is the only event management system
that tracks event data and computes the relationships between the data. The ability of
presenting events as relationships to its attributes makes decision making faster and more
insightful. In short, Fluency provides your organization’s most valuable assets, people, to
make faster and better decisions.
On Netflix, a person can look at a movie they like and get a list of movies they might also like.
This relationship is between movies one sees as good. The opposite is also true. In Fluency,
looking at a badly acting system, the system shows other systems, signatures and files related
to that bad actor.
It might seem a silly question, but why is faster and better decision making important? Why not
just hire more people and use the systems that your company has today?
Two things work against this mindset:
First, people are scarce. Not just good people, even average technical people are a scare
commodity.
Second, there are significantly more data sources and more data being produced by a
company’s network. Technology built a decade ago simply cannot handle the data loads of
today. Those technologies are not changing, yesterday’s solutions are just throwing more
machines, processors and disks at the problem. And the breaking point where doing so no
longerworks is happening today.
Solid technical resources are scarce & are increasing in value. The number of unfilled technical
positions continue to increase (1,000,000 security openings in 2016). Between tight budgets
and the difficulty of finding good people, organizations have gaps in personnel and rely heavily
on their best people. Not providing fast and complete access to event and log data is not just
costing money, but is stealing productivity from almost every organizations most valuable
people.
Case Study Summary: The Design Gap
A BUSINESS NETWORK IS NOT A HOMENETWORK
It’s so easy to start a network these days. The moment one buys a home, the local provider
drops a wireless cable modem and one’s house has a network and Internet. One’s phone can
create a hot spot network on the fly. So, what is so hard about a network? It’s not only small
companies, but fairly large ones too, that live off the instant network. “We have no servers, all
we need is Internet access.”
Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016
www.lumenate.com
Small Companies can benefit from good infrastructure.
The problem is that many growing companies have a network infrastructure that has grown
organically through the networking knowledge of their people. On a recent engagement with an
investment firm, Lumenate/Fluency found many of the problems that medium sized companies
have in their infrastructure. When the network started getting bigger, they had outsourced
desktop support.
The systems appeared to be running well, so what could be an issue?
Issues with DNS
Tracking the desktop
Problems with policy
Focus was on devices and connectivity. As long as the device had antivirus, connectivity to the
Internet and printers were good, then the network was considered complete.
Fluency was installed for peace of mind. And that is what they have now, but at first it was an
eye opener.
Most people know how to connect their device to a network. But the judgement of individual
people on what to install on their systems can have a large impact to security. Unwrittenpolicies
assume common sense as the baseline. Without written policy and guidelines for users, bad
decisions can be made. Even with written policy, there needs to be a means to see and enforce
direction.
During the initial profiling and assessment period of Fluency, it became apparent that the
network had no true architecture. Fluency’s profiling detected a desktop that was, among other
issues, performing automated communication not associated with the company. The issue was
not just the need to clean the system, but also to address the network architecture and policy
issues that were the cause of the issue and which hampered response.
The solution was driven by Fluency. Fluency addressed three critical elements that allowed the
problem to be properly understood, tracked to closure and mitigate long-term risk.
Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016
www.lumenate.com
Understanding the Problem
Fluency does not simply correlate data, its sensors listen to the network in order to track
application flow. Every application communication is stored as a record and any other network
alerts associated with the flow are correlated to that flow. This approach is not a traditional SIEM
approach, for traditional SIEMs focus on correlating only alerts. But most issues never generate
alerts until significant impact has been caused.
And so at the firm, it is this vision into application that showed a significant issue. Fluency
profiled all network behaviors; such as mail, phones systems and cloud services. The result
was an outlier that communicated externally on an ongoing basis.
Fluency could subtract all the communications that were considered normal. Each
communication outside of normal for the firm’s business could be marked creating a complete
scope of the issue.
Fluency also overcame the organic network that was created as the firm grew. How the system
joined the network was not controlled and systems bypassed the local name server. Fluency’s
full packet capture was activated allowing for the connecting protocols to be reviewed in detail,
providing the system name, network address and machine address code. Furthermore, policy
issues and network management issues were documented.
Tracking the Problems
Business is about execution. The ability not only to see an issue, but to address it. Properly
addressing issues is where organizations excel over others. This means that ability to measure
a response and validate its closure. Fluency is further unique from SIEMs as it tags elements of
the issues tracking them when they occur to ensure closure.
At the firm, this meant addressing the rogue processes (technical), how the systems connected
to the network (technical) and developing a policy around BYOD (policy). Here Fluency tagged
each element of these issues separately and provided metrics to the firm to measure the
effectiveness of mitigations. Measuring effectiveness is a key difference between Fluencyand
SIEM products. This requires detailed event logging, not just alert logs.
Tags are created in Fluency related to a metric associated to a response decision. Here tags
are created to track:
Unwanted communications from the system in question
How each system connects to the network
The name server (DNS) that the system uses
The type of system based on asset list (BYOD vs. Corporate Asset)
Now each aspect of the three issues can be articulated in numbers, such as the amount and
percentile, based on tags.
Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016
www.lumenate.com
The situation can be managed and answers can be given:
Have all the rogue communications stopped
How many BYOD systems are on the network
How many BYOD systems are mobile devices
What are the names of BYOD systems
Are all systems using the correct name server (DNS)
With Fluency tracking each communication with application tags, questions have definitive
answers. The firm can now track the progress of the response.
Long Term Mitigation
Fluency’s tracking is not a database query. Fluency tags and alerts on all incoming events in
real-time. It’s not reporting but tracking. And since the tagging is built into the system,the
system can continue to monitor and produce metrics.
With Fluency, management can implement changes and measure the results of those changes.
This is a different approach to security than checkbox compliance. The objectives of security
managers can be focused on progress and business execution. The business day is quantified.
Gone is a “whack-a-mole” approach of waiting for issues and then rushing to resolve them.
Fluency provides metrics, which in turn allow management to execute a long-term strategy.
Management can now articulate more than “is it done”, but how much is done and how
effective is the change or response.
Results
When Fluency started with the
firm, the firm had little insight
into their network. Its
corporate measurement for the
network was asking, “Is the
network up?” and “Are we
getting mail?”. Now the firm
knows each system on the
network, how they
communicate and what is
normal. The firm can now
make changes to the network
and measure those changes.
They now have vision into a
valuable aspect of their daily
operation.
Now, the firm knows what is
happening on the network.
Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016
www.lumenate.com
A Solid Home
A HOME, NOT A HEAP OF MATERIAL
Having all the parts does not mean one has a solution. Socrates said, “A disorderly mob isno
more an army than a heap of building materials is a house”. The same can be said of an
organization’s network. Having all the parts and checking all the boxes does not mean that the
network is secure.
Placing all the data into a single location does not mean that one can leverage that data. A
single console is not the real goal; it is integrated data in order to get a holistic view of the
network. From this view, one can make, execute and measure decisions.
At the same time, the amount of manpower to operate the solution needs to be minimal.
Fluency is a designed to reduce operational manpower. Correlation is automated based on the
event parser. The data store is dedicated, just like that of one’s contact list. One does not
have a dedicated administrator to manage their contact list.
Fluency is engineered and built for leveraging data analytics. Fluency’s patented approach.
Conclusion: Fluency’s Business Approach to Security
It’s not just networks that have changed. Companies have brought security to the boardroom.
Executives with security responsibility must operate as thought leaders, which means insightful
decision making, a focus on execution and measuring results. Management relies on vision
and Fluency provides that vision.
For additional information on Fluency, contact Collin Miles at collin.miles@lumenate.com or
214.334.2670.
About Lumenate
Lumenate offers a network security strategy that enables customers to identify the gaps that may
expose their organizations to risk, giving them confidence that their data is protected. We help
protect them from internal and external threats – including data theft – by identifying and
controlling who accesses the data and preventing more complex attacks on their networks.
About Fluency
Fluency Corp, a recognized leader in security innovation, is transforming the way organizations
manage the security of their network. Fluency is focused on improving the network and security
operations of its customers. Fluency provides its customers with engineered solutions that are
built to address business needs of network security and management.

Weitere ähnliche Inhalte

Andere mochten auch

Atlanta Track Club member handbook
Atlanta Track Club member handbookAtlanta Track Club member handbook
Atlanta Track Club member handbookMichelle Bourg
 
21 Top Travel Destinations for Remote Workers
21 Top Travel Destinations for Remote Workers21 Top Travel Destinations for Remote Workers
21 Top Travel Destinations for Remote WorkersRemote Work Hub
 
Cromoterapie
CromoterapieCromoterapie
CromoterapieAna-Gri
 
FY16 Executive Budget Recommendation - Governor Susana Martinez
FY16 Executive Budget Recommendation - Governor Susana MartinezFY16 Executive Budget Recommendation - Governor Susana Martinez
FY16 Executive Budget Recommendation - Governor Susana MartinezMichael Marcelli
 
Near to possession project in noida extension
Near to possession project in noida extensionNear to possession project in noida extension
Near to possession project in noida extensionKrishankant Sharma
 

Andere mochten auch (11)

Atlanta Track Club member handbook
Atlanta Track Club member handbookAtlanta Track Club member handbook
Atlanta Track Club member handbook
 
21 Top Travel Destinations for Remote Workers
21 Top Travel Destinations for Remote Workers21 Top Travel Destinations for Remote Workers
21 Top Travel Destinations for Remote Workers
 
Изменения в законодательстве 2015
Изменения в законодательстве 2015 Изменения в законодательстве 2015
Изменения в законодательстве 2015
 
ლოცვა
ლოცვა ლოცვა
ლოცვა
 
Cromoterapie
CromoterapieCromoterapie
Cromoterapie
 
How to play with your organizations
How to play with your organizationsHow to play with your organizations
How to play with your organizations
 
How To Save Money on Car Repair
How To Save Money on Car RepairHow To Save Money on Car Repair
How To Save Money on Car Repair
 
FY16 Executive Budget Recommendation - Governor Susana Martinez
FY16 Executive Budget Recommendation - Governor Susana MartinezFY16 Executive Budget Recommendation - Governor Susana Martinez
FY16 Executive Budget Recommendation - Governor Susana Martinez
 
lecture11_2013
lecture11_2013lecture11_2013
lecture11_2013
 
Near to possession project in noida extension
Near to possession project in noida extensionNear to possession project in noida extension
Near to possession project in noida extension
 
Ukhuwah - Studi Islam Awal Kuliah (Siwak)
Ukhuwah - Studi Islam Awal Kuliah (Siwak)Ukhuwah - Studi Islam Awal Kuliah (Siwak)
Ukhuwah - Studi Islam Awal Kuliah (Siwak)
 

Kürzlich hochgeladen

VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 

Kürzlich hochgeladen (20)

VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 

Fluency Application-Correlation-White-Paper 20160726

  • 1. Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016 www.lumenate.com White Paper Fluency® Application Based Correlation Introduction FLUENCY IS COMPREHENSIVE VISIBILITY Fluency® is vision for controlling the modern network. With innovative application awareness, auto-correlation and big data capacity, Fluency provides insight and understanding far beyonda single tool or dashboard application. Fluency reduces operating costs while allowing security to keep pace with modern networks. Fluency technology: Provides comprehensive visibility into the network and how applications flow within it. Automatically correlates disparate security devices into a comprehensible view. Shows how network behavior and security events relate. Presents related information, providing a clear understanding to issues. Network Visibility is a critical aspect to addressing today’s threats. It is know that the common network infrastructure does not work well in seeing network attacks and a network cannot defend itself from what cannot be seen. Fluency provides a fundamental shift to how an organization’s network detects and responds to threats by focusing on showing related data. It is well known that attackers must use the lines of communication to an organization’s networks assets. The vision Fluency provides into this communication is an essential aspect to protecting an organization’s network. Fluency technology achieves security comprehension by presenting related information needed for decisions at hand and provides access to significantly more information when needed. Fluency addresses information overload, not by dumbing down the data, but by better selecting relevant data. Fluency provides the most comprehensive view of the network, more than any security or network product in the market today. Fluency technology makes staff more effective and productive. Fluency is used by its customers to eliminate disparate views that are the result of multiple single-brand solutions. Fluency believes that no single vendor has a complete solution and that a technology must be implemented that leverages all corporate investments. Fluency customers find that a view based on correlated application flow with security & network events provides the vision to manage, roadmap and operate the network in a business-like manner.
  • 2. Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016 www.lumenate.com Prior to implementing Fluency, our customers could only gauge their security by being compliant to the latest trends or by the amount of time spent reacting to issues. After Fluency, our customers focus on measuring and road mapping their security. Response is a key element to staying secure, but response includes adjustments at the technical, architectural and policy levels. The ability to measure and roadmap to these larger issues ensures the best possible long term security performance and posture. This paper explores the challenges that organizations face without proper network vision and the results Fluency provides through application based correlation. Challenges of the Modern Network A NEW FOCUS ON INFORMATION ANDMESSAGING Businesses are discovering that simply putting antivirus on desktops and providing Internet to employees is not enough. Business today requires operation by efficiency and execution. Businessesof all sizes need the ability to see, measure and control how work flows within their network. Today’s work applications empower companies to execute. Companies have adapted to application connectivity through mobile support, BYOD integration and distributed/remote network connectivity. The flow of applications has become independent of theunderlying network and the traditional approaches conceived a couple of decades ago are no longer a fit for today’s network and security needs. Despite huge leaps in technology over the last two decades, log and event management have not changed from two basic camps: network flow analysis and security event management. Network flow technology was created in 1996 for network diagnostics, while event management in 1998 in order to handle alerts from multiple network segments. Although how they are used has changed, while how they operate has changed little. This gap between how the network is used today and the technology utilized to manage environments has grown to a point where many no longer see traditional security event information managers (SIEM) as relevant. As networks continue to grow in size and complexity,the simple lists, dashboard gauges and charts add to the information overload and a lack of managerial control or any real insight. Today organizations are chartered and expected to provide the needed security posture, which is now becoming more important inthe board room, even though security teams do not have the needed tools providing the vision necessary to execute an effective security strategy utilizing the traditional dashboards and SIEMs. Importance of Related Data SOLVING INFORMATION OVERLOAD WITHOUT DUMBING DOWN THE DATA Fluency is a network vision tool that correlates application flows, network logs and security events. It differs in that it maintains both a traditional transaction oriented view of events and a graph database that tracks and analyzes the relationships between events and attributes. This underlying technical difference means that the type of data Fluency produces is significantly different.
  • 3. Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016 www.lumenate.com Fluency offers fast and complete vision into the entire network and all network logs. Fluency combines big data and event correlation making data access faster, while presenting related data leading to insight and vision. Why is related data important? The old saying, “One can’t ask for what one doesn’t know” is not exactly true. When one shops on Amazon, watches a movie on Netflix or goes to iTunes, thesystem responds with related material that also might be of interest. Related information is critical to good insight and decision making. Fluency is the only event management system that tracks event data and computes the relationships between the data. The ability of presenting events as relationships to its attributes makes decision making faster and more insightful. In short, Fluency provides your organization’s most valuable assets, people, to make faster and better decisions. On Netflix, a person can look at a movie they like and get a list of movies they might also like. This relationship is between movies one sees as good. The opposite is also true. In Fluency, looking at a badly acting system, the system shows other systems, signatures and files related to that bad actor. It might seem a silly question, but why is faster and better decision making important? Why not just hire more people and use the systems that your company has today? Two things work against this mindset: First, people are scarce. Not just good people, even average technical people are a scare commodity. Second, there are significantly more data sources and more data being produced by a company’s network. Technology built a decade ago simply cannot handle the data loads of today. Those technologies are not changing, yesterday’s solutions are just throwing more machines, processors and disks at the problem. And the breaking point where doing so no longerworks is happening today. Solid technical resources are scarce & are increasing in value. The number of unfilled technical positions continue to increase (1,000,000 security openings in 2016). Between tight budgets and the difficulty of finding good people, organizations have gaps in personnel and rely heavily on their best people. Not providing fast and complete access to event and log data is not just costing money, but is stealing productivity from almost every organizations most valuable people. Case Study Summary: The Design Gap A BUSINESS NETWORK IS NOT A HOMENETWORK It’s so easy to start a network these days. The moment one buys a home, the local provider drops a wireless cable modem and one’s house has a network and Internet. One’s phone can create a hot spot network on the fly. So, what is so hard about a network? It’s not only small companies, but fairly large ones too, that live off the instant network. “We have no servers, all we need is Internet access.”
  • 4. Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016 www.lumenate.com Small Companies can benefit from good infrastructure. The problem is that many growing companies have a network infrastructure that has grown organically through the networking knowledge of their people. On a recent engagement with an investment firm, Lumenate/Fluency found many of the problems that medium sized companies have in their infrastructure. When the network started getting bigger, they had outsourced desktop support. The systems appeared to be running well, so what could be an issue? Issues with DNS Tracking the desktop Problems with policy Focus was on devices and connectivity. As long as the device had antivirus, connectivity to the Internet and printers were good, then the network was considered complete. Fluency was installed for peace of mind. And that is what they have now, but at first it was an eye opener. Most people know how to connect their device to a network. But the judgement of individual people on what to install on their systems can have a large impact to security. Unwrittenpolicies assume common sense as the baseline. Without written policy and guidelines for users, bad decisions can be made. Even with written policy, there needs to be a means to see and enforce direction. During the initial profiling and assessment period of Fluency, it became apparent that the network had no true architecture. Fluency’s profiling detected a desktop that was, among other issues, performing automated communication not associated with the company. The issue was not just the need to clean the system, but also to address the network architecture and policy issues that were the cause of the issue and which hampered response. The solution was driven by Fluency. Fluency addressed three critical elements that allowed the problem to be properly understood, tracked to closure and mitigate long-term risk.
  • 5. Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016 www.lumenate.com Understanding the Problem Fluency does not simply correlate data, its sensors listen to the network in order to track application flow. Every application communication is stored as a record and any other network alerts associated with the flow are correlated to that flow. This approach is not a traditional SIEM approach, for traditional SIEMs focus on correlating only alerts. But most issues never generate alerts until significant impact has been caused. And so at the firm, it is this vision into application that showed a significant issue. Fluency profiled all network behaviors; such as mail, phones systems and cloud services. The result was an outlier that communicated externally on an ongoing basis. Fluency could subtract all the communications that were considered normal. Each communication outside of normal for the firm’s business could be marked creating a complete scope of the issue. Fluency also overcame the organic network that was created as the firm grew. How the system joined the network was not controlled and systems bypassed the local name server. Fluency’s full packet capture was activated allowing for the connecting protocols to be reviewed in detail, providing the system name, network address and machine address code. Furthermore, policy issues and network management issues were documented. Tracking the Problems Business is about execution. The ability not only to see an issue, but to address it. Properly addressing issues is where organizations excel over others. This means that ability to measure a response and validate its closure. Fluency is further unique from SIEMs as it tags elements of the issues tracking them when they occur to ensure closure. At the firm, this meant addressing the rogue processes (technical), how the systems connected to the network (technical) and developing a policy around BYOD (policy). Here Fluency tagged each element of these issues separately and provided metrics to the firm to measure the effectiveness of mitigations. Measuring effectiveness is a key difference between Fluencyand SIEM products. This requires detailed event logging, not just alert logs. Tags are created in Fluency related to a metric associated to a response decision. Here tags are created to track: Unwanted communications from the system in question How each system connects to the network The name server (DNS) that the system uses The type of system based on asset list (BYOD vs. Corporate Asset) Now each aspect of the three issues can be articulated in numbers, such as the amount and percentile, based on tags.
  • 6. Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016 www.lumenate.com The situation can be managed and answers can be given: Have all the rogue communications stopped How many BYOD systems are on the network How many BYOD systems are mobile devices What are the names of BYOD systems Are all systems using the correct name server (DNS) With Fluency tracking each communication with application tags, questions have definitive answers. The firm can now track the progress of the response. Long Term Mitigation Fluency’s tracking is not a database query. Fluency tags and alerts on all incoming events in real-time. It’s not reporting but tracking. And since the tagging is built into the system,the system can continue to monitor and produce metrics. With Fluency, management can implement changes and measure the results of those changes. This is a different approach to security than checkbox compliance. The objectives of security managers can be focused on progress and business execution. The business day is quantified. Gone is a “whack-a-mole” approach of waiting for issues and then rushing to resolve them. Fluency provides metrics, which in turn allow management to execute a long-term strategy. Management can now articulate more than “is it done”, but how much is done and how effective is the change or response. Results When Fluency started with the firm, the firm had little insight into their network. Its corporate measurement for the network was asking, “Is the network up?” and “Are we getting mail?”. Now the firm knows each system on the network, how they communicate and what is normal. The firm can now make changes to the network and measure those changes. They now have vision into a valuable aspect of their daily operation. Now, the firm knows what is happening on the network.
  • 7. Fluency Corp/Lumenate Confidential www.fluencysecurity.com Copyright 2013-2016 www.lumenate.com A Solid Home A HOME, NOT A HEAP OF MATERIAL Having all the parts does not mean one has a solution. Socrates said, “A disorderly mob isno more an army than a heap of building materials is a house”. The same can be said of an organization’s network. Having all the parts and checking all the boxes does not mean that the network is secure. Placing all the data into a single location does not mean that one can leverage that data. A single console is not the real goal; it is integrated data in order to get a holistic view of the network. From this view, one can make, execute and measure decisions. At the same time, the amount of manpower to operate the solution needs to be minimal. Fluency is a designed to reduce operational manpower. Correlation is automated based on the event parser. The data store is dedicated, just like that of one’s contact list. One does not have a dedicated administrator to manage their contact list. Fluency is engineered and built for leveraging data analytics. Fluency’s patented approach. Conclusion: Fluency’s Business Approach to Security It’s not just networks that have changed. Companies have brought security to the boardroom. Executives with security responsibility must operate as thought leaders, which means insightful decision making, a focus on execution and measuring results. Management relies on vision and Fluency provides that vision. For additional information on Fluency, contact Collin Miles at collin.miles@lumenate.com or 214.334.2670. About Lumenate Lumenate offers a network security strategy that enables customers to identify the gaps that may expose their organizations to risk, giving them confidence that their data is protected. We help protect them from internal and external threats – including data theft – by identifying and controlling who accesses the data and preventing more complex attacks on their networks. About Fluency Fluency Corp, a recognized leader in security innovation, is transforming the way organizations manage the security of their network. Fluency is focused on improving the network and security operations of its customers. Fluency provides its customers with engineered solutions that are built to address business needs of network security and management.