Fernando Imperiale - Security Intelligence para PYMES

Sales Engineer at Security Advisor um Security Advisor
5. Jul 2016
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
1 von 10

Más contenido relacionado

Was ist angesagt?

Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siemvictor bueno
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforcesreenivas1591
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Alert Logic


Magento News @ Magento Meetup Wien 17Magento News @ Magento Meetup Wien 17
Magento News @ Magento Meetup Wien 17Matthias Glitzner-Zeis
Diapo bourse aux sportsDiapo bourse aux sports
Diapo bourse aux sportsmfrfye
Carla Casilli - Cineca + open badges - May 2015Carla Casilli - Cineca + open badges - May 2015
Carla Casilli - Cineca + open badges - May 2015Bestr
Yasemin yilmazer latifepalta_zeynepucarYasemin yilmazer latifepalta_zeynepucar
Yasemin yilmazer latifepalta_zeynepucarzeynepucarr
Nutrifit parcial vaneNutrifit parcial vane
Nutrifit parcial vanevanessaghia12

Similar a Fernando Imperiale - Security Intelligence para PYMES

Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
MID_SIEM_Boubker_ENVladyslav Radetsky
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
IBM Security StrategyIBM Security Strategy
IBM Security StrategyCamilo Fandiño Gómez
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius

Similar a Fernando Imperiale - Security Intelligence para PYMES(20)

Fernando Imperiale - Security Intelligence para PYMES

Hinweis der Redaktion

  1. Several years ago, we introduced the term “Security Intelligence” to describe the value organizations can gain from their security data. It’s a notion that’s similar to Business Intelligence, in that both initiatives can treat and analyze great volumes of data to great advantage for today’s businesses . . . Where Business intelligence reaps benefits that help focus a company’s marketing and sales efforts, Security Intelligence allows highly focused security awareness and protection.   They say imitation is the sincerest form of flattery, and our competition is flattering us, because the term Security Intelligence has really caught on!  We’re also seeing this term being used more and more by customers, vendors, pundits and industry experts -  but what’s interesting is that when they use it, there’s some haziness that they introduce into it, in terms of exactly what they’re talking about. To avoid confusion, we are explicitly stating our own definition.  So here it is: Security Intelligence is actionable information derived from the analysis of all security-related data available to an organization. So . . . We’re talking about data . . . What data exactly is it exactly that we’re talking about? It’s typically volumes and volumes of data, and there’s a lot to it -- logs, events, network flows, user identities and activities, asset profiles and locations, vulnerabilities, asset configurations and external threat data.  Data, data and more data. The good news? As you’ll see, IBM’s Security Intelligence platform was built from the start with this focus on handling tremendous amounts of data. It is well architected and can be scaled in a simple/straightforward manner to meet the needs of customers regardless of their size of the extremes of the data that needs analyzing. IBM’s Security Intelligence Platform provides analytics to answer fundamental questions that cover the full “before-during-and-after” timeline of risk and threat management. You may still hear of customers who say they want a Security Operations Center or SOC. They may want tools to support a 24x7 center that has the absolute requirement to stay on top of the status of their operational environment and to understand and even anticipate attacks, breaches, penetrations, whatever . . . to allow the business to remediate any such problems and to do it efficiently. Well . . . think of IBM’s Security Intelligence QRadar offerings as a Security Operations Center on steroids . . . By the time I finish this presentation, you should have an appreciation for why I say that . . . But let’s start at the beginning . . . Let’s look at the challenges customers talk to us about, always with goals like protecting their operational environment and clearly understanding the status and the effectiveness of the IT security capabilities they have in place, at any given point in time.
  2. It’s great to be selling IT security . . . Because the need for useful and insightful tools is more pronounced now than ever before. And as a security seller, you benefit from the facts that threats are escalating, IT environments are growing in complexity and our customers’ security teams are pressured to deal with everything they need to deal with, in order to try to keep their operational environments safe. The escalating threats are reported on all the time . . . And these shocking stories become motivation for boards of directors to take security more and more serious as a topic from year to year. We hear about this things daily . . . Attacks involving Organized crime, espionage, hacktivists, social engineering . . . Just recently, there have been attacks on the international department store Target, attacks on governments, by governments . . . And this is story is ever on the rise. As far as complexity goes, we understand that the growing complexity (mobile, cloud, social and beyond) only add to the need for better protection. There are more areas where data needs to be protected, there are new technologies that need to be protected from new types of attacks . . . And on top of all of this we know there are resource constraints when it comes to IT Security . . . that there’s a gap between the level of needs that businesses have today for good security-skilled staff and the people who are available and able to fill those jobs. The bottom line really comes in the form of a question . . . How many businesses today can say that they are immune to all of this? Let’s face it . . . Everyone’s being attacked and no one is immune to the pressures being described on this chart.
  3. To protect against attacks, there are a good number of metrics that have been added to the systems, appliances and applications making up today’s computing environments. Metrics in the form of audit logs, alerts and events . . . And there’s a tremendous amount of information contained in all the flows that are bouncing around all the time. So, think about the volume of log records and events that get generated daily, in any reasonably sized IT shop today. Imagine you are the person in that IT shop who’s responsible for analyzing the incoming data and you’re measured on how well you understand the security status of that IT shop, how quick you are to react to real problems versus the “noise” that kind of predominates the high number of inputs coming in. Do you really want that job? I mean How do human beings deal with those kinds of volumes? We know, for example, that a top 5 energy company in the United States – a current QRadar customer of ours -- is generating more than 2 billion log records every day . . . Do you really want to be the manager or be in the department responsible for determining which of those bits of information flying by is really critical, which ones relate to one another and maybe form the basis for a major concern that your IT shop is under attack? It’s this kind of understanding that companies are striving for . . . That understanding is the security intelligence we talk about. But expecting a human beings or team of human beings to be able to do this manually is totally impractical. What’s needed is a tool that automates this analysis and can find not just the needles in the haystack, but can draw significant connections among the needles and evaluate them in terms of their danger to the business.
  4. That’s where QRadar comes into the picture. The 3 key theme words for QRadar as a Security Intelligence platform are Intelligence, Integration and Automation. Intelligence refers to QRadar being able to not only discern threats but to determine their impacts. QRadar takes in huge amounts of security data and identifies anomalies. It helps customers both after an exploit has occurred and beforehand . . . Proactively . . . to help them minimize the possibilities of exploits occurring and to help prevent serious damage from happening. QRadar is truly integrated, based on all the components of the solution having a common architecture. It helps customers bring together analytics that previously were in separate silos (and therefore were not able to be correlated). The QRadar “single pane of glass” brings it all together for the various admin, auditor and analyst users of QRadar. And the integrated architecture means QRadar is highly scalable . . . offering customers the flexibility and adaptability that today’s security operations centers require. Finally, automation refers to QRadar being a solution that has been architected to deal with large volumes of data . . . it’s easy to deploy, and it delivers immediate and obvious benefits when it’s initially deployed and over time, it can easily expand to meet future growth. And the automation that’s delivered with QRadar offers dramatic efficiencies in how quickly security administrators and analysts can accomplish their tasks.
  5. For security threat management the key challenge is to reduce millions of logs down to actionable intelligence that identifies key threats. Traditional first Generation SIEMs achieve this by leveraging correlation – so ‘five failed logins followed by a successful login’ as a simple example – and the correlation helps identify suspected security incidents. Event correlation is a very, very important tool, but it’s not enough. There are two problems. First, consider a 100,000 to 1 reduction ratio of events to correlated incidents. On the surface, this sounds impressive, but for companies generating 2 billion events per day (and you don’t need to be a massive company to do that), it will leave that company’s security team with 20,000 incidents per day to investigate. Traditional SIEM correlation can’t get the data reduced enough and of course Log Managers can’t even get a 10,000 to 1 reduction ratio. The 2nd problem is that relying exclusively on event correlation assumes that the criminals who are intent on attacking your company won’t figure out ways to disable or bypass logging infrastructure – but let’s face it . . . that’s practically their entire focus and when they erase the logs, you’re in trouble . . . because you can’t correlate logs that aren’t there! This limitation results in missed threats or a very poor understanding of the impact of a breach. QRadar vastly expands the capabilities of traditional SIEMs by incorporating new analytics techniques and broader intelligence. Unlike any other SIEM in the market today, QRadar captures all activity on the network for assets, users and attackers before, during, and after an exploit . . . and it analyzes all suspected incidents in this context. QRadar uses analytical techniques such as activity baselining and anomaly detection. It notifies analysts about ‘offenses’ . . . Where an “offense” is a correlated set of incidents with all of the essential, associated network, asset, vulnerability and identity context. By adding business and historical context to suspected incidents and applying new analytic techniques, massive data reduction is realized and threats otherwise missed will be detected. QRadar has an impressive list of over 400 data sources for log and audit data, and there are many examples of customers achieving results that are in line with what is portrayed on this slide . . . That is, volumes of data from many, many data sources that is reduced down to a reasonable number of true offense possibilities that can be focused on for investigation . . . the classic example being a Fortune 100 energy company in the U.S. that typically experiences more than 2 billion log records being generated each day, and with QRadar, they’re able instead to just take a look at QRadar’s display of in the neighborhood of 25 or so high priority offenses. As anyone in security knows, any portfolio of security offerings is only as good as how current the research is that’s feeding into it. Consider that there are on average 7,000 vulnerabilities reported each year, which means there are many new ones every day. IBM differentiates its Security Intelligence capabilities by offering an X-Force Threat Intelligence feed that includes vulnerabilities, known bad URLs, histories of past attacks, etc. QRadar employs a number of threat and security sources to provide external security context and geographical context. This is integrated into all views and capabilities within the product. Sources include but are not limited to: *IBM's X-Force Intelligence Threat Feed (via subscription) based on the real-time monitoring of 13 billion security events per day, on average, for nearly 4,000 clients in more than 130 countries. *Geographic inputs from Maxmind *Top Targeted Ports, botnets, emerging threats, and other lists of botnets, hostile nets and so on. These services are updated out to our customers through a free auto-update service. This update service also includes updates for event mappings, vulnerability mappings, applications mappings, new Device Support Modules and updates.
  6. A lot of work has gone into making QRadar’s Security Intelligence tasks as automated as possible. When you add it up, it’s an impressive list. There’s simplified deployment that helps deliver quick time to value for customers . . . There’s “passive flow asset detection” populating QRadar’s asset database and allowing policy compliance checks and analysis of configurations to take place . . . . There are out-of-the-box rules and reports that are a key part of QRadar. These have the goal of reducing incident investigations and helping customers meet compliance mandates. Customers appreciate the simplicity delivered by this well thought-through solution. Contrast this story we can tell with many of our competitors, where they are essentially selling toolkits and high-tech tools for high-tech people. The toolkit approach puts the onus on the customer to wring the value out of the provided tools by customizing them or paying significant sums of money to have them customized. Finally, QRadar’s Security Intelligence Platform stays current, through daily and weekly automated updates to rules, reports, vulnerabilities, patches, searches, support modules, protocols and signatures . . . and via immediate discovery where when an asset connects to the network, that triggers proactive vulnerability scans, configuration comparisons and policy compliance checks. Like the title of this slide says, this drives simplicity and accelerates time to value.
  7. Made available with 7.2 MR1: Virtual Appliance’s maximum capacity increased (to be close to Appliance and Software) The managed entitlement process can be used to convert AIO to Console and transfer EPS/Flows. Handling software trade-up request by selling SIEM Virtual Appliance and offer a deeper discount. Made available with 7.2.2: Data Node