1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM.

Slides:



Advertisements
Similar presentations
Applying Technical Solutions. The ables Addressable Arguable Reasonable.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Complete Event Log Viewing, Monitoring and Management.
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
The State of Security Management By Jim Reavis January 2003.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Unified Logs and Reporting for Hybrid Centralized Management
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
EHealth Network Monitoring Network Tool Presentation J. Gaston Senior Network Design Seminar Professor Morteza Anvari 10 December 2004.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Centralizing and Analyzing Security Events: Deploying Security Information Management Systems Lynn Ray Towson University Copyright Lynn Ray, This.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
EDUCAUSE Security 2006 Internet John Brown University.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. PCI Compliance & Technology.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
© 2011 Cisco and/or its affiliates. All rights reserved. 1 High Performance Network Analysis Enterprise Operate Practice Cisco Services Andrew Wojtkowiak.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Network security Product Group 2 McAfee Network Security Platform.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Microsoft Management Seminar Series SMS 2003 Change Management.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
SQL Server 2008 R2 Manageability. Challenges facing database administrators today: Scaling management to multiple data centers Proactively monitoring.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Critical Security Controls
Hybrid Management and Security
2016 Citrix presentation.
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Virtualization & Security real solutions
Infrastructure, Data Center & Managed Services
THE NEXT GENERATION MSSP
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Chapter 4: Protecting the Organization
Intrusion Detection system
Presentation transcript:

1 © 2005 Cisco Systems, Inc. All rights reserved. CISCO SECURITY MONITORING, ANALYSIS & RESPONSE SYSTEM

222 © 2005 Cisco Systems, Inc. All rights reserved. Mandates: Increase customer retention and acquisition Build systems around customer/partner access while preserving customer privacy Avoid downtime Disruptions: Direct revenue losses Average $2,000,000 / incident Median.067% of revenue / incident Recovery costs Average = $74,000 per incident Mean = $6,000 per incident Frequency and duration One incident per year Downtime: 22 hours $0 $5 $10 $15 $ Internet business disruption loss rates (millions) Number of incidents Median revenue losses Average recovery costs * Aberdeen Group, Automating Information Access Benchmark Research Report, September 2004 Mandates and Disruptions

333 © 2005 Cisco Systems, Inc. All rights reserved. Constant Threat of Attacks and Zero-Day Threats Companies experience 30+ attacks / week Virus and worms attacks increasing at 11% annually Slammer infected 75,000 hosts in 11 minutes Network Computing estimates the cost per single incident of unknown buffer overflow attack to be $98,306 Variants, scripts, and automated tools essentially yield a persistent attack on open exposures Persistent Attacks and Zero Day Threats

444 © 2005 Cisco Systems, Inc. All rights reserved. 82%: prevention and avoidance 9%: recovery and restoration 9%: containment Intrusion prevention for Networks and/or hosts Security event correlation and management Firewalls at network Gateways and/or PCs Threat assessment and management tools 0% 10% 20% 30% 40% 50% 60% RecoverContainPreventUncertain * Aberdeen Group, Automating Information Access Benchmark Research Report, September 2004 Solutions to Overcome Disruptions

555 © 2005 Cisco Systems, Inc. All rights reserved. Network & Security Event Noise Inefficient Attack Identification & Response Compliance & Audit Mandates Never enough Security Staff “after patching, putting out fires, investigation and remediation… produce the audit report” alarms, disconnected events, false positives, network anomalies Sarbox, HIPAA, GLBA, FISMA, Basel II… due care and process un-prioritized blended attacks, day zero attacks, worms… and network issues Costly Business Dilemma Mitigate Attacks Security Challenge = Business Problem

666 © 2005 Cisco Systems, Inc. All rights reserved. Defense-in-depth Firewalls Proxies VPN Anti-virus Network IDS/IPS Host IDS/IPS Vulnerability Assessment Patch Management Policy Compliance Router Switch Integrated Management Components of a Self-Defending Network

777 © 2005 Cisco Systems, Inc. All rights reserved. Reactive Steps: 1.Escalated Alert 2.Investigate 3.Coordinate 4.Mitigate Network Operations Security Operations Firewall IDS/IPS VPN Vulnerability Scanners Authentication Servers Router/Switch Anti-virus 10K Win, 100’s UNIX Collect Network Diagram Read and Analyze TONS of Data… Repeat Always Too Late Security Operations Response

888 © 2005 Cisco Systems, Inc. All rights reserved. CS-MARS transforms raw network and security data into actionable intelligence used to subvert real security incidents, as well as maintain corporate compliance Network-intelligent correlation Incident validation Attack visualization Automated investigation Leveraged mitigation Compliance management High performance Low TCO Introducing Cisco Security Monitoring, Analysis & Response System (CS-MARS)

999 © 2005 Cisco Systems, Inc. All rights reserved. Centrally aggregate logs… limited event reduction and correlation No network intelligence… isolated device events Basic alerts, workflow, and reports… lacks details for timely response Integrated network intelligence for superior event aggregation, reduction, and correlation Visually depicts topology, valid incidents; attack path details with layer 2 / 3 leveraged mitigation Events are dynamically NAT resolved, correlated, grouped, and validated CS-MARS Enterprise Threat Mitigation Costly to buy, deploy, maintain Lowest TCO; immediate results, easy to use and cost-effective deployment Alternative SIM Approaches Poor performance; achieved with costly platforms and / or clustering Full correlation in excess of 10,000 EPS and 300,000 flows / sec CS-MARS Value Proposition

10 © 2005 Cisco Systems, Inc. All rights reserved. Gain Network Intelligence Topology, traffic flow, device configuration, and enforcement devices ContextCorrelation™ Correlates, reduces and categorizes events Validates incidents Valid Incidents Sessions Rules Verify Isolated Events Correlation Reduction Router Cfg. Firewall Log Switch Cfg. Switch Log Server Log AV Alert App Log VA Scanner Firewall Cfg. Netflow NAT Cfg. IDS Event CS-MARS: “Know the Battlefield”

11 © 2005 Cisco Systems, Inc. All rights reserved. CS-MARS: “Command and Control”

12 © 2005 Cisco Systems, Inc. All rights reserved. CS-MARS: “Connect the Dots” SureVector™ Analysis Visible and accurate attack path Drill-down, full incident and raw event details Pinpoint the true sources of anomalous and attack behavior More complete and accurate story 1. Host A Port Scans Target X 2. Host A Buffer Overflow Attacks X Where X is behind NAT device and Where X is Vulnerable to attack 3. Target X executes Password Attacks Target Y located downstream from NAT Device

13 © 2005 Cisco Systems, Inc. All rights reserved. CS-MARS “Leveraged Mitigation” Use control capabilities within your infrastructure Layer 2/3 attack path is clearly visible Mitigation enforcement devices are identified Exact mitigation command is provided Firewall Router Switch ]

14 © 2005 Cisco Systems, Inc. All rights reserved. CS-MARS: Compliance Reports Popular reports with customization and distribution options Queries saved as rules or reports – intuitive framework (no SQL)

15 © 2005 Cisco Systems, Inc. All rights reserved. CS-MARS: Correlation and Reduction Descriptive rule framework and incident details Significant consolidation

16 © 2005 Cisco Systems, Inc. All rights reserved. The CS-MARS Advantage Superior Functionality, Lowest TCO Immediate results Quick install, out-of-box use, web-based HTML console Agentless capture, embedded Oracle®, no dba necessary Supports popular network and security device Optimized performance and scalability Rapid in-line processing ~over 10,000 EPS with all features active High capacity RAID storage, continuous NFS archive Global controller supports distributed CS-MARS management

17 © 2005 Cisco Systems, Inc. All rights reserved. CS-MARS Lineup Appliance convenience Complete integrated system; no additional hardware, platform, database, or agent software to purchase, install, and maintain No need to determine nodes, admins, agents or other licensing Hardened OS, roles-based admin. and secure communications Model CS-MARS 20CS-MARS 50CS-MARS 100eCS-MARS 100CS-MARS 200 CS-MARS GC Events / Sec.5001,0003,0005,00010,000na Flow / Sec.10,00025,00075,000150,000300,000na RAID Storage120GB + 240GB750GB 1TB +not RAID

18 © 2005 Cisco Systems, Inc. All rights reserved. Enterprise Threat Mitigation Empowers operators to maintain network availability Leverages network and security infrastructure Reduces noise and false alarms for better response Streamlines investigation, compliance and management Identifies significant, sophisticated, rapid threats Delivers return on security investment CS-MARS Effective. Efficient. Integrated.

19 © 2005 Cisco Systems, Inc. All rights reserved.