Top Banner
Ensuring Security & Compliance in a Data Deluge
36

Ensuring Security and Compliance in a Data Deluge

Jul 16, 2015

Download

Technology

Tripwire
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ensuring Security and Compliance in a Data Deluge

Ensuring Security &

Compliance in a

Data Deluge

Page 2: Ensuring Security and Compliance in a Data Deluge
Page 3: Ensuring Security and Compliance in a Data Deluge

Expanding threat

landscape; more

cybercrime with

sophisticated

adversaries

Market is consolidating

and leaning on

strategic vendor

relationships to

reduce TCO

of existing solutions

Barriers To Success

Existing technology

isn’t providing

expected ROI,

is too expensive and

complex, and only

delivers data

Page 4: Ensuring Security and Compliance in a Data Deluge

Expanding threat

landscape; more

cybercrime with

sophisticated

adversaries

Market is consolidating

and leaning on

strategic vendor

relationships to

reduce TCO

of existing solutions

Barriers To Success

Existing technology

isn’t providing

expected ROI,

is too expensive and

complex, and only

delivers data

Page 5: Ensuring Security and Compliance in a Data Deluge

Don’t know what I don’t know

Too much data to sift through

Cost of being secure, compliant

and efficient is too high and labor

intensiveProve Compliance

Prevent Outages

Protect Sensitive Data

Page 6: Ensuring Security and Compliance in a Data Deluge

Don’t know what I don’t know

Too much data to sift through

Cost of being secure, compliant

and efficient is too high and labor

intensiveProve Compliance

Prevent Outages

Protect Sensitive Data

Page 7: Ensuring Security and Compliance in a Data Deluge
Page 8: Ensuring Security and Compliance in a Data Deluge

Too much data!

Page 9: Ensuring Security and Compliance in a Data Deluge

Source: Aberdeen Group

Page 10: Ensuring Security and Compliance in a Data Deluge
Page 11: Ensuring Security and Compliance in a Data Deluge

Budget Pressure

Unplanned Work

Longer MTTR

OPERATIONS

Branding

Shareholder Value

$$$$

SECURITY

Page 12: Ensuring Security and Compliance in a Data Deluge

Desir

ed S

tate

No Visibility

Drifting

High-risk

Temporary Success

Time

Page 13: Ensuring Security and Compliance in a Data Deluge

No Change Intelligence

No Security

Data Landfill

So What!

Raw Log Data

Detect ChangeGood & Bad

Report ChangeGood & Bad

Page 14: Ensuring Security and Compliance in a Data Deluge

The lack of compliance in PCI DSS Requirement 11 …. Knowing (not just recording) what is actually occurring

within networks and systems is …. critical.

2010

Page 15: Ensuring Security and Compliance in a Data Deluge

Raw Log Data

Event

Correlation

Event Alerts

Too Many Alerts Too Investigate

Miss Complex Scenarios

Page 16: Ensuring Security and Compliance in a Data Deluge

Were changes made?

Who made them?

Did they enable events?

Page 17: Ensuring Security and Compliance in a Data Deluge

FTP Enabled

Were changes made?

Who made them?

Did they enable events?

Page 18: Ensuring Security and Compliance in a Data Deluge

10 failed logins

FTP Enabled

Were changes made?

Who made them?

Did they enable events?

Page 19: Ensuring Security and Compliance in a Data Deluge

FTP event to foreign IP10 failed logins

FTP Enabled

Were changes made?

Who made them?

Did they enable events?

Page 20: Ensuring Security and Compliance in a Data Deluge

Login successful

FTP event to foreign IP10 failed logins

FTP Enabled

Were changes made?

Who made them?

Did they enable events?

Page 21: Ensuring Security and Compliance in a Data Deluge

Problem Discovery

Long time to discover breach

Page 22: Ensuring Security and Compliance in a Data Deluge

Problem Discovery

Page 23: Ensuring Security and Compliance in a Data Deluge

Raw Log Data

Page 24: Ensuring Security and Compliance in a Data Deluge

“We consistently find that nearly 90% of the time logs are available but discovery

[of breaches] via log analysis remains under 5% ”

2010

Page 25: Ensuring Security and Compliance in a Data Deluge

VISIBILITY

Across the entire

IT infrastructure

INTELLIGENCE

Enable better,

faster decisions

AUTOMATION

Reduce manual,

repetitive tasks

A Better Approach

Page 26: Ensuring Security and Compliance in a Data Deluge

Raw Log Data

Events of Interest!

change event

log event

Am I Secure? Is Policy Impacted?

Page 27: Ensuring Security and Compliance in a Data Deluge

Business as usual

Change windows

User ID

Multiple conditions

Auto-retest to policy

Close breach-to-discovery time gap

Immediate time-to-value

Exclusive to Tripwire!

Raw Log Data

Dynamic Policy Testing

Change Process Analysis

Reconcile to Authorization

Page 28: Ensuring Security and Compliance in a Data Deluge
Page 29: Ensuring Security and Compliance in a Data Deluge

Raw Log Data

• High Speed Log Archival• Google like Index• Fast Search • Intelligent Reporting

• Events of Interest• Structured Data • Complex Reporting• Data visualization

Normalization

& Correlation

Page 30: Ensuring Security and Compliance in a Data Deluge

5 failed logins

Logging turned off

Host not generating events

Windows event log cleared

Login successful

Policy test fails

Page 31: Ensuring Security and Compliance in a Data Deluge
Page 32: Ensuring Security and Compliance in a Data Deluge

Assess & Achieve

Maintain

Non-stop monitoring & collection

Dynamic analysis to find suspicious activities

Alert on impact to policy

Remediate options to speed remedy

Desir

ed S

tate

Time

Page 33: Ensuring Security and Compliance in a Data Deluge

Correlate to

Bad Changes

Correlate to

Suspicious Events

Page 34: Ensuring Security and Compliance in a Data Deluge
Page 35: Ensuring Security and Compliance in a Data Deluge

Tripwire is a leading global provider of

IT security and compliance automation

solutions that enable organizations to protect,

control and audit their entire IT infrastructure

Change, Breaches, Audits

and Outages Happen. TAKE CONTROL.

Page 36: Ensuring Security and Compliance in a Data Deluge

Answers For Your Questions