Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining...

76
Contextual Security Intelligence Preventing Data Breaches without Constraining Business Beograd 2016

Transcript of Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining...

Page 1: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Contextual Security Intelligence

Preventing Data Breaches without Constraining Business

Beograd 2016

Page 2: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

LondonTower 42, 25 Old Broad Street, London EC2N 1HN

Paris105, rue Jules Guesde, 92300 Levallois Perret

New York40 Wall St. 28th Floor, NYC, NY 10005

MunichStefan-George-Ring 29. D-81929 München

200+ employees

> 50% y/y growth

over year

100+ resellers

1300+ Customers

BudapestAlíz street 2. H-1117 Budapest

Page 3: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Founded: 2000

Customers: 1300+

Users: 1M+

Specializing: log management, advanced

monitoring, user behavior analytics

Page 4: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 5: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 6: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 7: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Impossible to pre-define all rules

Constant fear of breaches

Activities without context

Page 8: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Impossible to pre-define all rules

Constant fear of breaches

Activities without context

Page 9: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Impossible to pre-define all rules

Constant fear of breaches

Activities without context

Page 10: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

”Professionals are target people. And any solutions will have to target the

people problem, not the math problem”

Page 11: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

CSI

Immediate reactionReal-time knowledge

of all actions

Recognition

of the unusual

Norm and pattern

recognition and learning

Page 12: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Intervention at the most relevant

step of the kill chain

Breach Prevention

Real-time behavior

intelligence

Efficient forensic

investigations

Security Operations

Comprehensive overview of

privileged activities

Decreased cost of compliance

Compliance ROI

Policy breach & account risk

detection

Risk Assessment

CSI

Page 13: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Identify malicious activity by

detecting unusual behavior patterns

● Date, time, geo, commands, keystrokes,

mouse, peer group outliers, etc.

● Insider threats and hijacked

accounts

● APT Kill Chain

● Intervention at the most relevant step of

the kill chain

CSI

Page 14: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Efficient incident response &

forensics capabilities

● Real time behavior intelligence

through alerts

● Automated security reactions &

intervention

CSI

Page 15: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Account and global risk estimation

● Identifying account related policy

violations

● Identify the gap between the

privileges and actual behaviorCSI

Page 16: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Comprehensive audit and review of

application and system level access

● Compliance Plus – integrating existing

data recorded for compliance reasons

into CSI to unveil security risks

● Prioritize recorded audit trails based on

risk

CSI

Page 17: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

PREVENTION BY MONITORINGLET’S EXAMINE A HUMAN ATTACK!

1 2 3 4 5 6 7 8

Time-frame for prevention Forensics

9

Page 18: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Privileged User

User Profiles

•Login Time

•Login Location

•Host login

•Commands

•Keystrokes

•Mouse

•Applications

•Peer groups

Privileged

User

Behavior

Analytics

Log

ActivitySession

Activity

Page 19: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Privileged Imposter

User Profiles

•Login Time

•Login Location

•Host login

•Commands

•Keystrokes

•Mouse

•Applications

•Peer groups

Privileged

User

Behavior

Analytics

Log

ActivitySession

Activity

Page 20: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Privileged Imposter

User Profiles

•Login Time

•Login Location

•Host login

•Commands

•Keystrokes

•Mouse

•Applications

•Peer groups

Privileged

User

Behavior

Analytics

Log

ActivitySession

Activity

Security

Operations

Center

Page 21: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Privileged Imposter

User Profiles

•Login Time

•Login Location

•Host login

•Commands

•Keystrokes

•Mouse

•Applications

•Peer groups

Privileged

User

Behavior

Analytics

Log

ActivitySession

Activity

Security

Operations

Center

Page 22: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 23: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Monitor user activity

● Baseline business-as-usual using

machine learning

● Discover unknown threats based on

deviation from the norm and risk in

real-time

● Investigate and respond immediately

Access

Controls

& PoliciesCSI

Page 24: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Instant access to activity data in forensic situations.

Activity & log data collectionacross the entire enterprise

Transparent session monitoringwith agentless deployment

Real-time data deliveryfor analytics and investigation

Filtering, normalization and enrichment

Vast amount of data Understanding the situation

28

Enriched Data Platform

Integrate contextual information

into a single profile

Drill down into CSI.DATA for

deeper understanding

Video replay & search in user

recordings

Visualize normal behaviour

Machine learning of activities

Anomaly Detection

Real-time intervention

Risk scoring and alerting

The User Perspective Behavioural Analytics

Th

e P

rob

lem

Th

e S

olu

tion

CSI.DATA CSI.USER CSI.RISK

Not asked and not known

Page 25: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 26: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 27: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Syslog-NG & Syslog-ng

STORE BOX

Page 28: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Information on all activities from the systems

● Reliable and secure collection, transport and

storage

● Advanced processing & filtering

Page 29: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Security

DevicesNetwork

Devices

Applications SQL

Servers

Log Sources

Virtual Machines

SYSLOG-NG DESCRIPTION

Filter

Rewrite

Classify

Store

Parse

syslog-ng

Normalize

Flat Files LogstoreTM

SQL

NoSQL

SIEM

Destinations

syslog-ng

Store Box

Log Analysis

Page 30: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Security

DevicesNetwork

Devices

Applications SQL

Servers

Log Sources

Virtual Machines

Data in motion Data at rest

CHALLENGES OFLOG COLLECTION

Page 31: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

syslog-ng Relay

syslog-ng

Serversyslog-ng Relay

syslog-ng Clients

SYSLOG-NG ARCHITECTURE

Page 32: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Filter RewriteClassify Parse Normalize

Makes Log Data Easier to Analyze

REAL TIME TRANSFORMATION

Page 33: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

SYSLOG-NG STORE BOX DESCRIPTION

High performance indexing

100,000 logs/sec sustained

35 GB/hr

Reports

Full text search

Automated Archiving

Raw storage: 1TB - 10 TB

Granular access control

LDAP/Radius Integration

Turnkey solution

Physical / Virtual Appliance

Web- Based Intuitive GUI

Visualization Statistics

RESTful API

Page 34: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Shell Control Box

Page 35: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 36: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Privileged Activity Monitoring = Immediate

Benefits

Implementation without changing

workflows, clients/servers (no agents)

Augmented log data

Centralized authentication and

authorization

Credential management

Audit trails for forensic investigations

Page 37: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

IT Staff

Outsourcing

partners

Managers

Firewall,

Network devices,

Databases,

Web/file servers,

Citrix server…

VDI users

NO AGENTS

TRANSPARENT

PROXY SOLUTION

Page 38: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

IT Staff

Outsourcing

partners

Managers

Firewall,

Network devices,

Databases,

Web/file servers,

Citrix server…

VDI users

USE STANDARD TOOLS

TRANSPARENT

PROXY SOLUTION

Page 39: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

IT Staff

Outsourcing

partners

Managers

Firewall,

Network devices,

Databases,

Web/file servers,

Citrix server…

VDI usersTRANSPARENT

PROXY SOLUTION

TAMPER-PROOF

EVIDENCE

Page 40: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

4-eyes Control

Outsourcee

Page 41: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

4-eyes Control

Outsourcee

Page 42: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

4-eyes Control

Authorizer

Outsourcee

Page 43: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

4-eyes Control

Authorizer

Outsourcee

Page 44: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

4-eyes Control

Authorizer Auditor

Real-Time follow

Outsourcee

Page 45: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

>1234 5678 9123 4567

> scp financial.db

Command detection

Screen-content detection

> cat credit-cards

Window-title detection

Real-time Prevention

Page 46: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Real-time Prevention

Neverreaches

other side

Email SNMP

Page 47: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Review of the Audit Trails

Page 48: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Is reliable data enough?

● How do you know when privileged

users do something bad?

● Are you sure that your people use

their access in a responsible and

compliant way?

● Can you hire enough skilled security

analysts?

● Are you comfortable with your current

method of reviewing logs and

auditing records?

Page 49: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 50: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 51: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Time distributions – Kernel density analysis

Page 52: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Time distributions – Kernel density analysis

● Association rule learning – Frequent itemset

mining

Page 53: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Time distributions – Kernel density analysis

● Association rule learning – Frequent itemset

mining

● Recommender systems & clustering

Page 54: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Time distributions – Kernel density analysis

● Association rule learning – Frequent itemset

mining

● Recommender systems & clustering

● Analysis of commands and window titles – Text

analysis

Page 55: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Time distributions – Kernel density analysis

● Association rule learning – Frequent itemset

mining

● Recommender systems & clustering

● Analysis of commands and window titles – Text

analysis

● Keystroke dynamics – Stochastic outlier

selection

Page 56: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Time distributions – Kernel density analysis

● Association rule learning – Frequent itemset

mining

● Recommender systems & clustering

● Analysis of commands and window titles – Text

analysis

● Keystroke dynamics – Stochastic outlier

selection

● Pointing device detection – Supervised machine

learning on mouse gestures

Page 57: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

● Time distributions – Kernel density analysis

● Association rule learning – Frequent itemset

mining

● Recommender systems & clustering

● Analysis of commands and window titles – Text

analysis

● Keystroke dynamics – Stochastic outlier

selection

● Pointing device detection – Supervised machine

learning on mouse gestures

● Scripted account detection – Statistical

hypothesis testing of periodicity

Page 58: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 59: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

How to Review?

Which part of the audit trails are the

most interesting?

How to choose which vendors should

be reviewed?

Which solution is significantly better

than random sampling?

Page 60: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 61: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 62: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

…and peer group analysis may be able to find this anomaly

as well

● Cheating ALL algorithms requires:

● Several valid user credentials

● Perfect knowledge about ALL of the

algorithms in Blindspotter

● Really lot of time – even years

● Cheating ONE algorithm requires:

● A valid user credential

● Perfect knowledge about the selected

algorithm

● Time

Page 63: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

What is Behavior?

”Behavior is the internally coordinated responses of whole living organisms to internal and/or external stimuli”

Daniel A. Levitis, PhD in Integrative Biology

Page 64: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

0-knowledge ThreatsThings

you do NOT know

Things

you know

Questions

you are NOT asking

Questions

you are asking

Page 65: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

0-knowledge ThreatsThings

you do NOT know

Things

you know

Questions

you are NOT asking

Questions

you are asking

Page 66: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

0-knowledge ThreatsThings

you do NOT know

Things

you know

Questions

you are NOT asking

Questions

you are asking

Page 67: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

0-knowledge ThreatsThings

you do NOT know

Things

you know

Questions

you are NOT asking

Questions

you are asking

UBA

NETWORK

ANALYTICS

SPAM

AVNAC

FWAPP-WL

IDS/IPS

DLP

SIEM

VUL-SCAN

PEN-TEST

FRAUD

Page 68: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

0-knowledge ThreatsThings

you do NOT know

Things

you know

Questions

you are NOT asking

Questions

you are asking

UBA

NETWORK

ANALYTICS

SPAM

AVNAC

FWAPP-WL

IDS/IPS

DLP

SIEM

VUL-SCAN

PEN-TEST

FRAUD

Page 69: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Traditional security approach Contextual security approach

Manually defined Self learning

Enforcing control Real-time knowledge & interaction

Security damages continuity More Security with more freedom

ROI only when accatcked Immediate visibility of ROI

Partial vision Full knowledge of all actions

Page 70: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Traditional security approach Contextual security approach

Manually defined Self learning

Enforcing control Real-time knowledge & interaction

Security damages continuity More Security with more freedom

ROI only when accatcked Immediate visibility of ROI

Partial vision Full knowledge of all actions

Page 71: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Traditional security approach Contextual security approach

Manually defined Self learning

Enforcing control Real-time knowledge & interaction

Security damages continuity More Security with more freedom

ROI only when accatcked Immediate visibility of ROI

Partial vision Full knowledge of all actions

Page 72: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Traditional security approach Contextual security approach

Manually defined Self learning

Enforcing control Real-time knowledge & interaction

Security damages continuity More Security with more freedom

ROI only when accatcked Immediate visibility of ROI

Partial vision Full knowledge of all actions

Page 73: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Traditional security approach Contextual security approach

Manually defined Self learning

Enforcing control Real-time knowledge & interaction

Security damages continuity More Security with more freedom

ROI only when attacked Immediate visibility of ROI

Partial vision Full knowledge of all actions

Page 74: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices

Traditional security approach Contextual security approach

Manually defined Self learning

Enforcing control Real-time knowledge & interaction

Security damages continuity More Security with more freedom

ROI only when attacked Immediate visibility of ROI

Partial vision Full knowledge of all actions

Page 75: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices
Page 76: Contextual Security Intelligence - it-klinika.rs · Preventing Data Breaches without Constraining Business ... NoSQL SIEM Destinations syslog-ng Store Box Log Analysis. Security Devices