Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Week #5 1/10 Securing E-Transaction - SIEM.

Slides:



Advertisements
Similar presentations
RiT PatchView Solution
Advertisements

Your Data Any Place, Any Time Manageability. SQL Server 2008 Manageability Challenges Challenges face database administrators today : Managing complex.
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Access Control Chapter 3 Part 5 Pages 248 to 252.
SIEMs - Decoding The Mayhem Bill Dean Director of Computer Forensics Sword & Shield Enterprise Security Inc.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Chapter Physical Database Design Methodology Software & Hardware Mapping Logical Design to DBMS Physical Implementation Security Implementation Monitoring.
SESSION 7 MANAGING DATA DATARESOURCES. File Organization Terms and Concepts Field: Group of words or a complete number Record: Group of related fields.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Security Guidelines and Management
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
OWASP Logging Project Presentation by Marc Chisinevski.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. PCI Compliance & Technology.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
BMC Software confidential. BMC Performance Manager Will Brown.
Module 10 Configuring and Managing Storage Technologies.
Security Information and Event Management Services June, 2011 Minsk, Belarus.
Event Management
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Managing Data Resources
Security Information Management.  Thesis  Managing security event information is a difficult task  Most successful deployments start with a clear understanding.
What is Enterprise Architecture?
The McGraw-Hill Companies, Inc Information Technology & Management Thompson Cats-Baril Chapter 3 Content Management.
Web-Enabled Decision Support Systems
CSI-E Computer Security Investigator – Enterprise.
Identifying Security Opportunities NetIQ Security Solution
Computer Forensics in Practice Armed Forces of the Slovak Republic mjr. Ing. Albert VAJÁNYI 1Lt. Ing. Boris ZEMEK (c) May 2005.
© Siemens AG All rights reserved. openlab III Board of Sponsors 3-4 May 2011 at CERN Joint Report Siemens - CERN.
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Storing Organizational Information - Databases
Chapter 5: Implementing Intrusion Prevention
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
Novell Compliance Management Platform Update CMP & CMP Extension for SAP Environments Leo Castro Product Marketing Manager Patrick Gookin.
Wireless Intrusion Prevention System
Security Information and Event Management
BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData.
Cryptography and Network Security Sixth Edition by William Stallings.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
Managing Data Center Server Compliance Using System Center System Center Microsoft Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Slide 1 © 2016, Lera Technologies. All Rights Reserved. SAP BO vs SPLUNK vs OBIEE By Lera Technologies.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
SIEM Rotem Mesika System security engineering
2016 Citrix presentation.
Leverage What’s Out There
DATS Portfolio.
SECURITY INFORMATION AND EVENT MANAGEMENT
© 2011 ZOHO Corp. All Rights Reserved
Security Operations Without Going Blind
Security Operations Without Going Blind
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
GRC - A Strategic Approach
Presentation transcript:

Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Week #5 1/10 Securing E-Transaction - SIEM

 Security Information and Event Management (SIEM) solutions are a combination of the formerly disparate product categories of SIM (security information management) and SEM (security event manager).security information managementsecurity event manager  SIEM technology provides real-time analysis of security alerts generated by network hardware and applications.  SIEM solutions come as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.  Security Information and Event Management (SIEM) solutions are a combination of the formerly disparate product categories of SIM (security information management) and SEM (security event manager).security information managementsecurity event manager  SIEM technology provides real-time analysis of security alerts generated by network hardware and applications.  SIEM solutions come as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes. 2/10 Securing E-Transaction - SIEM

 The segment of security management that deals with real-time monitoring, correlation of events, notifications and console views is commonly known as Security Event Management (SEM).  The second area provides long-term storage, analysis and reporting of log data and is known as Security Information Management (SIM).  As with many meanings and definitions of capabilities evolving requirements continually shape derivatives of SIEM product categories. The need for voice centric visibility or vSIEM (voice security information and event management) is a recent example of this evolution. 3/10 Securing E-Transaction - SIEM

 The term SIEM, coined by Mark Nicolett and Amrit Williams of Gartner in 2005, describes the product capabilities of  Gathering, analyzing and presenting information from network and security devices  Identity and access management applications.  Vulnerability management and policy compliance tools  Operating system, database and application logs  External threat data. 4/10 Securing E-Transaction - SIEM

 A key focus is to monitor and help manage user and service privileges, directory services and other system configuration changes; as well as providing log auditing and review and incident response.  As of January 2012, Mosaic Security Research identified 85 unique SIEM products. 5/10 Securing E-Transaction - SIEM

 Data Aggregation: SIEM/LM (log management) solutions aggregate data from many sources, including network, security, servers, databases, applications, providing the ability to consolidate monitored data to help avoid missing crucial events.  Correlation: looks for common attributes, and links events together into meaningful bundles. This technology provides the ability to perform a variety of correlation techniques to integrate different sources, in order to turn data into useful information.  Alerting: the automated analysis of correlated events and production of alerts, to notify recipients of immediate issues.  Data Aggregation: SIEM/LM (log management) solutions aggregate data from many sources, including network, security, servers, databases, applications, providing the ability to consolidate monitored data to help avoid missing crucial events.  Correlation: looks for common attributes, and links events together into meaningful bundles. This technology provides the ability to perform a variety of correlation techniques to integrate different sources, in order to turn data into useful information.  Alerting: the automated analysis of correlated events and production of alerts, to notify recipients of immediate issues. Securing E-Transaction - SIEM 6/10

 Dashboards: SIEM/LM tools take event data and turn it into informational charts to assist in seeing patterns, or identifying activity that is not forming a standard pattern.  Compliance: SIEM applications can be employed to automate the gathering of compliance data, producing reports that adapt to existing security, governance and auditing processes.  Retention: SIEM/SIM solutions employ long-term storage of historical data to facilitate correlation of data over time, and to provide the retention necessary for compliance requirements.  Dashboards: SIEM/LM tools take event data and turn it into informational charts to assist in seeing patterns, or identifying activity that is not forming a standard pattern.  Compliance: SIEM applications can be employed to automate the gathering of compliance data, producing reports that adapt to existing security, governance and auditing processes.  Retention: SIEM/SIM solutions employ long-term storage of historical data to facilitate correlation of data over time, and to provide the retention necessary for compliance requirements. Securing E-Transaction - SIEM 7/10

 These products provide:  Reporting and analysis of data to support regulatory compliance initiatives (such as privileged user and access monitoring and compliance reporting).  Internal threat management  Security policy compliance management.  Strong log management capabilities and have the capacity to store multi-terabyte logs over very long periods of time.  Products to be in the SIM category, include: Splunk, ArcSight Logger, Log Logic, RSA envision, NetIQ Security Manager, IBM TCIM, and the eIQnetworks range. Securing E-Transaction - SIEM 8/10

 These products provide:  Strong event management  Real-time threat analysis  Visualization  Ticketing  Incident response  Security operations  Products to be in the SEM category, include: ArcSight ESM, netForensics, Novell Sentinel, Intelitactics, Cisco MARS, and IBM TSOM.  These products provide:  Strong event management  Real-time threat analysis  Visualization  Ticketing  Incident response  Security operations  Products to be in the SEM category, include: ArcSight ESM, netForensics, Novell Sentinel, Intelitactics, Cisco MARS, and IBM TSOM. Securing E-Transaction - SIEM 9/10 They are typically based on enterprise SQL databases such as Oracle. Unlike SIM products, SEM-based products are not ideal for log management and long-term storage of excessive amounts of logs as they are poor at log compression. They are slow when producing reports and rely on a massive index to allow for database queries.

 The following list of best practices will assist organizations in making the right SIEM choice for their environment:  Take Project Ownership  Clearly define your operational requirements  Think outside the square  Don't underestimate the resourcing requirements  Demand a flexible and agile solution  Demand a proof of concept  Not all SIEMs are the same  Make sure you get serious correlation  Appliance vs. Software  Does it meet your compliance initiative?  The following list of best practices will assist organizations in making the right SIEM choice for their environment:  Take Project Ownership  Clearly define your operational requirements  Think outside the square  Don't underestimate the resourcing requirements  Demand a flexible and agile solution  Demand a proof of concept  Not all SIEMs are the same  Make sure you get serious correlation  Appliance vs. Software  Does it meet your compliance initiative? Securing E-Transaction - SIEM 10/10