Top Banner
Security Data Lake Leveraging Big Data Platform to build stronger cyber defense Rujirapong Ritwong CEO, Co-founder Softnix Technology
51

Softnix Security Data Lake

Jan 22, 2018

Download

Data & Analytics

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Softnix Security Data Lake

SecurityDataLake LeveragingBigDataPlatformtobuildstrongercyberdefense

RujirapongRitwongCEO,Co-founderSoftnix Technology

Page 2: Softnix Security Data Lake

YouCan’tProtectWhatYouCan’tSee

Page 3: Softnix Security Data Lake

ITSecurityneedto

Visibility

Page 4: Softnix Security Data Lake

(source:www.fbi.gov)

Unauthorizedaccesstodatasystem

Dataleakage/loss

72%

(source:www.fbi.gov)

Page 5: Softnix Security Data Lake

Waytoincreaseyourvisibility

Page 6: Softnix Security Data Lake

Definition• SecurityDataLakeisDataLakeappearinginthesecurityfield.

• DataLakeisamethodofstoringdatawithinBigDatasystem

• SecurityDataLakecentrallocationwhereallsecuritydata

• SimilarLogManagement,SIEM

Page 7: Softnix Security Data Lake

TraditionalSecurityManagement• SIEMaresecuritymonitor,logmanagementactedas

thedatastoreforsecuritydata.• Technologiesused15yearsago.• Relationaldatabasesarenotwellsuitedforlarge

amountsofdata.• ACID- Fastwritesorfastreads,butnotboth• Realtimecorrelation(rules)enginerunonsingle

machine.• Notbuildtoletotherproductsreuse.• Expensiveforexplaining

Page 8: Softnix Security Data Lake

Howlongdoyoucurrentlystoreeventandlogdata forSIEM

http://go.cyphort.com/rs/181-NTN-682/images/Cyphort-Ponemon-SIEM-Report.pdf

RetentiondataforcomplianceISO27001 ,PCI-DSS,HIPAA,FISMA,Sarbanes-Oxley(SOX)

Page 9: Softnix Security Data Lake

UnknownEventsDataCredit:Hortonworks

Page 10: Softnix Security Data Lake

ComparingSecurityDataLaketoSIEMSecurityDataLakeisnotareplaceforSIEMSecurityDataLakeObjective;◦ datastorage◦ dataprocessing◦ PurposefunctionofaSIEMcovers

Page 11: Softnix Security Data Lake

LimitationofSIEMs

ScalabilityOpenness

Page 12: Softnix Security Data Lake

BigDataTechnology

AttemptingsolutionstotheTWOmainproblemsofSIEMs

Page 13: Softnix Security Data Lake

Hadoopbasic

Page 14: Softnix Security Data Lake

2.25xMorelikelyTodetectthreatsWithinminutes

Timetodetectandidentifyasecurityincident

https://www.cloudera.com/content/dam/www/marketing/resources/analyst-reports/big-data-cybersecurity-analytics-research-report.pdf.landing.html

Page 15: Softnix Security Data Lake

Reportuserdemandforcybersecurityanalyticsontherisethepast12months71%

Organizationsneedtoreport

Page 16: Softnix Security Data Lake

Moreinformation:https://www.ponemon.org/local/upload/file/Big_Data_Analytics_in_Cyber_Defense_V12.pdf

82%BigDataPlatform+SecurityTechnologies=StrongerCyberDefense

Page 17: Softnix Security Data Lake

It’sstilldifficulttodeployBigDatacybersecurityanalytics.

Page 18: Softnix Security Data Lake

WhatisstoppingBigDataanalyticsadoption?

https://www.cloudera.com/content/dam/www/marketing/resources/analyst-reports/big-data-cybersecurity-analytics-research-report.pdf.landing.html

Page 19: Softnix Security Data Lake

Oforganizationssayit’simpossibletoleverageBigDataanalyticswithtraditionalsystem

72%

https://www.cloudera.com/content/dam/www/marketing/resources/analyst-reports/big-data-cybersecurity-analytics-research-report.pdf.landing.html

Page 20: Softnix Security Data Lake

ButSecurityDataLake(Hadoopbased)can.

29 % 72 % 43%

increasedatavolumesmorethan100%

increasedataprocessingmorethan76%

increasedataaccessforanalyticsmorethan100%

https://www.cloudera.com/content/dam/www/marketing/resources/analyst-reports/big-data-cybersecurity-analytics-research-report.pdf.landing.html

Page 21: Softnix Security Data Lake

TopUseCase

BIGDATAAnalytics

Page 22: Softnix Security Data Lake

UseCase

VodafoneUK’snewSIEMsystemreliesonApacheFlumeandApacheKafkatoingestnearly1millioneventspersecond.

Page 23: Softnix Security Data Lake

OpenSourceBigDataforCybersecurity

http://spot.incubator.apache.org

Page 24: Softnix Security Data Lake

ApacheSpot

Page 25: Softnix Security Data Lake

OpenSourceBigDataforCybersecurity

http://metron.apache.org

Page 26: Softnix Security Data Lake

ApacheMetron

Page 27: Softnix Security Data Lake

DatafeedforSecurityDataLake

SecurityTechnologiesData NonSecurityData

http://go.cyphort.com/rs/181-NTN-682/images/Cyphort-Ponemon-SIEM-Report.pdf

Page 28: Softnix Security Data Lake

100%

Allorganizationuse Firewallbypass Can’tmonitor.It’sBigData.

100% 100%

DNStraffic

Page 29: Softnix Security Data Lake

OptimizeyourSIEM

Page 30: Softnix Security Data Lake

OptimizeyourSIEM

Splitconnectionsetup

Page 31: Softnix Security Data Lake

SecurityDatalakehelpoptimizeSIEMCost-EffectivelyIncreaseEnterpriseVisibilityAnalyticsFlexibilitySIEMLock-inDeploymentFlexibility

Page 32: Softnix Security Data Lake

Ourhistory

Page 33: Softnix Security Data Lake

Logger LoggerCloudforMSP

DataPlatformAuthenticator

LoggerforAWS

LoggerforAzure

“BigDataPlatformCompany”

Collector

EdgePoint

All-in-one LawCompliance Security&ITServices

MonitoringbyZABBIX

BigDataAnalytics

Page 34: Softnix Security Data Lake
Page 35: Softnix Security Data Lake

TechnologyPartner

Page 36: Softnix Security Data Lake

Softnix DataPlatformBigDataAnalyticPlatform

Any DeviceAnyPlatform

Dashboard&VisualizeIntegrationtoEnterpriseAnalyticSystem

Softnix DataPlatformBigDataAnalyticPlatform

Page 37: Softnix Security Data Lake

SolutionofSoftnix DataPlatform

Page 38: Softnix Security Data Lake

ArchitectureSoftnixDataPlatformSoftnixDataPlatformArchitecture

Page 39: Softnix Security Data Lake

CapabilityüSupportmachinedatawithanytypeüDataextractiontoanalyticformatüSupportdataindexingandaggregationüFull-textsearchorspecificsearch

üVisualizedataforhumanunderstandüSchedulesendreporttoemail

Page 40: Softnix Security Data Lake

OurProcess

CollectionofData

DataEnrichment

ConvertintoStructured

AnalysisofData

VirtualizationofData

Page 41: Softnix Security Data Lake

DashboardSystem

Page 42: Softnix Security Data Lake

Full-TextSearch&Specificsearch

EventDetection

DataExtraction

Visualizedata

Page 43: Softnix Security Data Lake

SimpleDataVisualization

Page 44: Softnix Security Data Lake

DataAggregation

Page 45: Softnix Security Data Lake

UseCase:SecurityDashboard

Page 46: Softnix Security Data Lake
Page 47: Softnix Security Data Lake

UseCase:AuthenticationMonitor

Page 48: Softnix Security Data Lake

UseCase:DNSDashboard

Page 49: Softnix Security Data Lake

UseCase:CloudFirewallforMSP

Page 50: Softnix Security Data Lake

Multipledashboardperproject

Page 51: Softnix Security Data Lake

ContactUs

www.softnix.co.thfacebook.com/softnixtechtwitter.com/softnix

medium.com/@softnix

[email protected]