SlideShare una empresa de Scribd logo
1 de 22
1
Survey: Security Analytics and Intelligence
A look at the impact of security threats and the use of security analytics
and intelligence to mitigate those threats
© 2013, SolarWinds Worldwide, LLC. All rights reserved.
Conducted by SANS Institute
June/July 2013
2
Introduction
» SolarWinds, in conjunction
with SANS, recently
conducted a survey on
Security Analytics and
Intelligence with
participation from over
600 IT professionals
» This presentation provides
insight into IT budgets for
security, difficulties faced
in identifying attacks and
breaches, and more
2
The Agenda
• Participants: Whom did we
survey?
• Results: What did they say?
• Key Take Away: What does
the survey mean to you?
• Recommendations: What
can you do?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
3
Whom Did We Survey?
3
19.0%
17.2%
15.6%
8.7% 8.7% 8.2%
7.0%
5.9%
5.1%
2.9% 0.9% 0.9%
Government/Military
Financial
Services/Banking
Other
Education
HighTech
Health
care/Pharmaceutical
Telecommunications
Carrier/Service…
Manufacturing
Energy/Utilities
Retail
Engineering/Construc
tion
HostingService
Provider
Participants: Industry wise
SANS & SOLARWINDS IT SECURITY SURVEY 2013
45% of the survey
taker organizations
were from
Federal, BFSI and
Healthcare
4
IT Budget Spent on IT Security
• 45% of the survey takers were spending less than 20% of their IT budget on information security
management, compliance and response
• About 30% spent less than 10% on information security management, compliance and response
Unknown, 40.0%
Less than 5%, 21.3%
6% to 10%, 16.0%
11% to 20%, 7.9%
21% to 30%, 7.3%
31% to 40%, 2.0%
41% to 50%, 1.2%
51% to 60%, 0.9%
Greater than 60%, 1.7%
Other, 1.6%
SANS & SOLARWINDS IT SECURITY SURVEY 2013
5
Threat Detection and Response
SANS & SOLARWINDS IT SECURITY SURVEY 2013
6
Difficulty in Detecting Threats
33.4%
23.5%
21.1%
7.8%
5.7%
3.0% 2.8%
1.3% 1.3%
Noattacks(thatwe
knowabout)
2to5
Unknown
1
6to10
11to20
21to50
51to100
Morethan100
Difficulty in detecting threats
In the past two years,
45% of the respondent
companies had 1 or more
attacks that were difficult
to detect.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
7
Time Taken to Detect the Impact of the Attacks
• 30% of the organizations took up to a week to detect the impact
• 14% of them took about 1-3 months
Within the same
day
One week or less
A month or less
Three months or
less
Five months or less
10 months or less
More than 10
months
Unknown
SANS & SOLARWINDS IT SECURITY SURVEY 2013
8
Time Taken for Attack Remediation
• 35% of companies took up to a week to remediate after the initial knowledge of an attack
• About 11% of the companies took 1-3 months
Within the same
day
One week or less
A month or less
Three months or
less
Five months or less
10 months or less
More than 10
months
Unknown
SANS & SOLARWINDS IT SECURITY SURVEY 2013
9
Data Collection and Correlation
SANS & SOLARWINDS IT SECURITY SURVEY 2013
10
Top 3 Impediments to Discovering
and Following Up on Attacks
39%
21%
19%
Not collecting appropriate
security data
Not Identifying relevant event
context (Event correlation)
Lack of system awareness and
vulnerability awareness
SANS & SOLARWINDS IT SECURITY SURVEY 2013
11
Types of Operational and Security Data Collected
for Security Analytics
Top 3 Types of Data
Currently Collected:
• Log data from network
devices, servers and
applications
• Monitoring data from
firewalls, vulnerability
scanners, IDS/IPS
• Access data
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Log data from network (routers/switches) and
servers, applications and/or endpoints
Monitoring data provided through firewalls, network-
based vulnerability scanners, IDS/IPS, UTMs, etc.
Access data from applications and access control systems
Unstructured data-at-rest and RAM data from endpoints
(servers and end-user devices)
Security assessment data from endpoint (aka from
NAC/MDM scans), application and server monitoring tools
Assessment and exception data (not on the whitelist of
approved behaviors) taken from mobile/BYOD endpoints…
Monitoring and exception data pertaining to internal
virtual and cloud environments
Monitoring and exception data pertaining to public cloud
usage
Other
Unknown Don't plan to collect Plan to collect within 12 months Currently collect
Top 3 Within 12 Months:
• Security assessment data
from
endpoint, application and
server monitoring tools
• Monitoring and exception
data from internal virtual
and cloud environments
• Access data from
applications and access
control systems
12
How Satisfied are Organizations
with their Security Tools?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
13
Alarming Factor!!
59% of the organizations
don’t know whether they
are collecting security data
in real time or not.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
14
Correlation of Event Logs
• 30% of the organizations did not have any automated correlation of log data
• 45% of the organizations manually scripted searches based on hunches
• 39% of them had no third party intelligence tools
0% 10% 20% 30% 40% 50%
Other
Hadoop or other free or distributed data
analysis tools
Unstructured data analysis tools with NoSQL
and other methods.
Advanced intelligence/threat profiling
database
No automated correlation of logs, just
manual scanning for exceptions by experts
Manual and manually-scripted searches
based on evidence and hunches
Use of SIEM technologies and systems
Dedicated log management platform used for
IT security and operations
SANS & SOLARWINDS IT SECURITY SURVEY 2013
15
More on Correlation
38% of the
respondent
organizations did
not have log
correlation for
external threat
intelligence tools
And guess what???
44% of the organizations are doing only up to 25% of their inquiries to
detect threats in real time.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
About 36% of the organizations
never had any automated
pattern recognition
16
Satisfaction with Current Analytics
and Intelligence Capabilities
• About 59% of the organizations are not satisfied with their library of appropriate
queries and reports
• 56% of the organizations are not satisfied with their relevant event context intelligence
• 56% of them have no visibility into actionable security events
1.25 1.30 1.35 1.40 1.45 1.50 1.55 1.60 1.65 1.70 1.75
Producing or having a library of appropriate…
Relevant event context (intelligence) to observe…
Training/intelligence expertise
Integration of other monitoring systems into…
Costs for tools, maintenance and personnel
Visibility into actionable security events across…
Ability to alert based on exceptions to what is…
Reduction of false positives and/or false negatives
Performance and response time issues
Other
Storage capacity and access of data in needed formats
SANS & SOLARWINDS IT SECURITY SURVEY 2013
17
Primary Use Cases for Evaluation of Security Tools
External malware
Advanced Persistent threats
Compliance monitoring
0%
5%
10%
15%
20%
25%
SANS & SOLARWINDS IT SECURITY SURVEY 2013
24% - External malware
13% - Advanced
persistent threats
11% - Compliance
monitoring
18
Top 3 Future Investments in Security
SANS & SOLARWINDS IT SECURITY SURVEY 2013
0%
10%
20%
30%
40%
50%
60%
70%
Securityinformationmanagement
tools/SIEMsystemswithbuilt-in
analyticscapabilities
Personnel/trainingtodetect
patterns(analytics)andmanage
systems
Vulnerabilitymanagement
Networkprotections
(UTM,IDS/IPS,etc.)
Endpointvisibility
Applicationprotectionsand
visibility
Intelligenceproductsorservices
Analyticsengines
Other
Top 3 Future Investments
in Security:
1. SIEM Tools
2. Training
3. Vulnerability
Management
19
For truly effective security and threat management, organizations
need to:
 Collect and correlate appropriate log and event data across all
relevant sources throughout the IT infrastructure
 Handle larger volumes of log data efficiently
 Establish a baseline of “normal” behavior in order to identify
anomalies
 Identify threats and attacks in real time
 Reduce the time between detection and response
 Implement the right tools for advanced analytics and intelligence
Key Takeaways
SANS & SOLARWINDS IT SECURITY SURVEY 2013
20
» Event correlation for event context and
actionable intelligence
» Real-time analysis for immediate threat
detection and mitigation
» Advanced IT search to simplify event
forensics and expedite root cause analysis
» Built-in reporting to streamline security
and compliance
How Can SIEM Solutions Help You?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
65% of the
organizations
want to make
their security
investments on
SIEM systems
21
SolarWinds Log & Event Manager
 Log Collection, Analysis, and Real-Time
Correlation
 Collects log & event data from tens of
thousands of devices & performs true
real-time, in-memory correlation
 Powerful Active Response technology
enables you to quickly & automatically
take action against threats
 Advanced IT Search employs highly
effective data visualization tools –
word clouds, tree maps, & more
 Quickly generates compliance reports
for PCI DSS, GLBA, SOX, NERC
CIP, HIPAA, & more
 Built-in correlation rules, reports, &
responses for out-of-the-box visibility
and proactive threat protection
SANS & SOLARWINDS IT SECURITY SURVEY 2013
22
Thank You!
SANS & SOLARWINDS IT SECURITY SURVEY 2013

Más contenido relacionado

La actualidad más candente

Email Management Survey: North America
Email Management Survey: North AmericaEmail Management Survey: North America
Email Management Survey: North America
SolarWinds
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
SolarWinds
 
Automation in Public Sector IT Systems
Automation in Public Sector IT SystemsAutomation in Public Sector IT Systems
Automation in Public Sector IT Systems
SolarWinds
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sector
SolarWinds
 
New IT Survey: Germany
New IT Survey: GermanyNew IT Survey: Germany
New IT Survey: Germany
SolarWinds
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UK
SolarWinds
 

La actualidad más candente (20)

Email Management Survey: North America
Email Management Survey: North AmericaEmail Management Survey: North America
Email Management Survey: North America
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016
 
Automation in Public Sector IT Systems
Automation in Public Sector IT SystemsAutomation in Public Sector IT Systems
Automation in Public Sector IT Systems
 
IT Trends Report 2015: Business at the Speed of IT, Public Sector Results
IT Trends Report 2015: Business at the Speed of IT, Public Sector ResultsIT Trends Report 2015: Business at the Speed of IT, Public Sector Results
IT Trends Report 2015: Business at the Speed of IT, Public Sector Results
 
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
 
SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)SolarWinds Application Performance End User Survey (North America)
SolarWinds Application Performance End User Survey (North America)
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
SolarWinds Application Performance End User Survey (UK)
SolarWinds Application Performance End User Survey (UK)SolarWinds Application Performance End User Survey (UK)
SolarWinds Application Performance End User Survey (UK)
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
New IT Survey: Australia
New IT Survey: AustraliaNew IT Survey: Australia
New IT Survey: Australia
 
UK IT Pros Survey: Network Complexity
UK IT Pros Survey: Network ComplexityUK IT Pros Survey: Network Complexity
UK IT Pros Survey: Network Complexity
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management Solutions
 
Systems Administrators UK Survey Results
Systems Administrators UK Survey ResultsSystems Administrators UK Survey Results
Systems Administrators UK Survey Results
 
Solar winds appstack public sector
Solar winds appstack public sectorSolar winds appstack public sector
Solar winds appstack public sector
 
SolarWinds Application Performance End User Survey (Denmark)
SolarWinds Application Performance End User Survey (Denmark)SolarWinds Application Performance End User Survey (Denmark)
SolarWinds Application Performance End User Survey (Denmark)
 
New IT Survey: Germany
New IT Survey: GermanyNew IT Survey: Germany
New IT Survey: Germany
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 
SolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring SurveySolarWinds State of Government IT Management and Monitoring Survey
SolarWinds State of Government IT Management and Monitoring Survey
 
New IT Survey: UK
New IT Survey: UKNew IT Survey: UK
New IT Survey: UK
 

Destacado

New IT Survey: North America
New IT Survey: North AmericaNew IT Survey: North America
New IT Survey: North America
SolarWinds
 

Destacado (10)

Netadmin and Sysadmin Survey Results - AUS
Netadmin and Sysadmin Survey Results - AUSNetadmin and Sysadmin Survey Results - AUS
Netadmin and Sysadmin Survey Results - AUS
 
Systems Administrators AUS Survey Results
Systems Administrators AUS Survey ResultsSystems Administrators AUS Survey Results
Systems Administrators AUS Survey Results
 
Netadmin and Sysadmin Survey Results - UK
Netadmin and Sysadmin Survey Results - UKNetadmin and Sysadmin Survey Results - UK
Netadmin and Sysadmin Survey Results - UK
 
New IT Survey: Brazil
New IT Survey: BrazilNew IT Survey: Brazil
New IT Survey: Brazil
 
IT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEsIT Survey: UK and Germany SMEs
IT Survey: UK and Germany SMEs
 
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
 
New IT Survey: North America
New IT Survey: North AmericaNew IT Survey: North America
New IT Survey: North America
 
Systems Administrators Survey Results
Systems Administrators Survey ResultsSystems Administrators Survey Results
Systems Administrators Survey Results
 
Top 5 Reasons to Use Kiwi Syslog Server
Top 5 Reasons to Use Kiwi Syslog ServerTop 5 Reasons to Use Kiwi Syslog Server
Top 5 Reasons to Use Kiwi Syslog Server
 
Top 5 Reasons to Use Kiwi CatTools
Top 5 Reasons to Use Kiwi CatToolsTop 5 Reasons to Use Kiwi CatTools
Top 5 Reasons to Use Kiwi CatTools
 

Similar a Survey: Security Analytics and Intelligence

SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
anhlodge
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-response
Maciej Buczkowski
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
LeilaniPoolsy
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Anjoum .
 

Similar a Survey: Security Analytics and Intelligence (20)

Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015Sans cyber-threat-intelligence-survey-2015
Sans cyber-threat-intelligence-survey-2015
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-response
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
SOC Analysis
SOC AnalysisSOC Analysis
SOC Analysis
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 

Más de SolarWinds

Más de SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Survey: Security Analytics and Intelligence

  • 1. 1 Survey: Security Analytics and Intelligence A look at the impact of security threats and the use of security analytics and intelligence to mitigate those threats © 2013, SolarWinds Worldwide, LLC. All rights reserved. Conducted by SANS Institute June/July 2013
  • 2. 2 Introduction » SolarWinds, in conjunction with SANS, recently conducted a survey on Security Analytics and Intelligence with participation from over 600 IT professionals » This presentation provides insight into IT budgets for security, difficulties faced in identifying attacks and breaches, and more 2 The Agenda • Participants: Whom did we survey? • Results: What did they say? • Key Take Away: What does the survey mean to you? • Recommendations: What can you do? SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 3. 3 Whom Did We Survey? 3 19.0% 17.2% 15.6% 8.7% 8.7% 8.2% 7.0% 5.9% 5.1% 2.9% 0.9% 0.9% Government/Military Financial Services/Banking Other Education HighTech Health care/Pharmaceutical Telecommunications Carrier/Service… Manufacturing Energy/Utilities Retail Engineering/Construc tion HostingService Provider Participants: Industry wise SANS & SOLARWINDS IT SECURITY SURVEY 2013 45% of the survey taker organizations were from Federal, BFSI and Healthcare
  • 4. 4 IT Budget Spent on IT Security • 45% of the survey takers were spending less than 20% of their IT budget on information security management, compliance and response • About 30% spent less than 10% on information security management, compliance and response Unknown, 40.0% Less than 5%, 21.3% 6% to 10%, 16.0% 11% to 20%, 7.9% 21% to 30%, 7.3% 31% to 40%, 2.0% 41% to 50%, 1.2% 51% to 60%, 0.9% Greater than 60%, 1.7% Other, 1.6% SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 5. 5 Threat Detection and Response SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 6. 6 Difficulty in Detecting Threats 33.4% 23.5% 21.1% 7.8% 5.7% 3.0% 2.8% 1.3% 1.3% Noattacks(thatwe knowabout) 2to5 Unknown 1 6to10 11to20 21to50 51to100 Morethan100 Difficulty in detecting threats In the past two years, 45% of the respondent companies had 1 or more attacks that were difficult to detect. SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 7. 7 Time Taken to Detect the Impact of the Attacks • 30% of the organizations took up to a week to detect the impact • 14% of them took about 1-3 months Within the same day One week or less A month or less Three months or less Five months or less 10 months or less More than 10 months Unknown SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 8. 8 Time Taken for Attack Remediation • 35% of companies took up to a week to remediate after the initial knowledge of an attack • About 11% of the companies took 1-3 months Within the same day One week or less A month or less Three months or less Five months or less 10 months or less More than 10 months Unknown SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 9. 9 Data Collection and Correlation SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 10. 10 Top 3 Impediments to Discovering and Following Up on Attacks 39% 21% 19% Not collecting appropriate security data Not Identifying relevant event context (Event correlation) Lack of system awareness and vulnerability awareness SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 11. 11 Types of Operational and Security Data Collected for Security Analytics Top 3 Types of Data Currently Collected: • Log data from network devices, servers and applications • Monitoring data from firewalls, vulnerability scanners, IDS/IPS • Access data 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Log data from network (routers/switches) and servers, applications and/or endpoints Monitoring data provided through firewalls, network- based vulnerability scanners, IDS/IPS, UTMs, etc. Access data from applications and access control systems Unstructured data-at-rest and RAM data from endpoints (servers and end-user devices) Security assessment data from endpoint (aka from NAC/MDM scans), application and server monitoring tools Assessment and exception data (not on the whitelist of approved behaviors) taken from mobile/BYOD endpoints… Monitoring and exception data pertaining to internal virtual and cloud environments Monitoring and exception data pertaining to public cloud usage Other Unknown Don't plan to collect Plan to collect within 12 months Currently collect Top 3 Within 12 Months: • Security assessment data from endpoint, application and server monitoring tools • Monitoring and exception data from internal virtual and cloud environments • Access data from applications and access control systems
  • 12. 12 How Satisfied are Organizations with their Security Tools? SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 13. 13 Alarming Factor!! 59% of the organizations don’t know whether they are collecting security data in real time or not. SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 14. 14 Correlation of Event Logs • 30% of the organizations did not have any automated correlation of log data • 45% of the organizations manually scripted searches based on hunches • 39% of them had no third party intelligence tools 0% 10% 20% 30% 40% 50% Other Hadoop or other free or distributed data analysis tools Unstructured data analysis tools with NoSQL and other methods. Advanced intelligence/threat profiling database No automated correlation of logs, just manual scanning for exceptions by experts Manual and manually-scripted searches based on evidence and hunches Use of SIEM technologies and systems Dedicated log management platform used for IT security and operations SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 15. 15 More on Correlation 38% of the respondent organizations did not have log correlation for external threat intelligence tools And guess what??? 44% of the organizations are doing only up to 25% of their inquiries to detect threats in real time. SANS & SOLARWINDS IT SECURITY SURVEY 2013 About 36% of the organizations never had any automated pattern recognition
  • 16. 16 Satisfaction with Current Analytics and Intelligence Capabilities • About 59% of the organizations are not satisfied with their library of appropriate queries and reports • 56% of the organizations are not satisfied with their relevant event context intelligence • 56% of them have no visibility into actionable security events 1.25 1.30 1.35 1.40 1.45 1.50 1.55 1.60 1.65 1.70 1.75 Producing or having a library of appropriate… Relevant event context (intelligence) to observe… Training/intelligence expertise Integration of other monitoring systems into… Costs for tools, maintenance and personnel Visibility into actionable security events across… Ability to alert based on exceptions to what is… Reduction of false positives and/or false negatives Performance and response time issues Other Storage capacity and access of data in needed formats SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 17. 17 Primary Use Cases for Evaluation of Security Tools External malware Advanced Persistent threats Compliance monitoring 0% 5% 10% 15% 20% 25% SANS & SOLARWINDS IT SECURITY SURVEY 2013 24% - External malware 13% - Advanced persistent threats 11% - Compliance monitoring
  • 18. 18 Top 3 Future Investments in Security SANS & SOLARWINDS IT SECURITY SURVEY 2013 0% 10% 20% 30% 40% 50% 60% 70% Securityinformationmanagement tools/SIEMsystemswithbuilt-in analyticscapabilities Personnel/trainingtodetect patterns(analytics)andmanage systems Vulnerabilitymanagement Networkprotections (UTM,IDS/IPS,etc.) Endpointvisibility Applicationprotectionsand visibility Intelligenceproductsorservices Analyticsengines Other Top 3 Future Investments in Security: 1. SIEM Tools 2. Training 3. Vulnerability Management
  • 19. 19 For truly effective security and threat management, organizations need to:  Collect and correlate appropriate log and event data across all relevant sources throughout the IT infrastructure  Handle larger volumes of log data efficiently  Establish a baseline of “normal” behavior in order to identify anomalies  Identify threats and attacks in real time  Reduce the time between detection and response  Implement the right tools for advanced analytics and intelligence Key Takeaways SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 20. 20 » Event correlation for event context and actionable intelligence » Real-time analysis for immediate threat detection and mitigation » Advanced IT search to simplify event forensics and expedite root cause analysis » Built-in reporting to streamline security and compliance How Can SIEM Solutions Help You? SANS & SOLARWINDS IT SECURITY SURVEY 2013 65% of the organizations want to make their security investments on SIEM systems
  • 21. 21 SolarWinds Log & Event Manager  Log Collection, Analysis, and Real-Time Correlation  Collects log & event data from tens of thousands of devices & performs true real-time, in-memory correlation  Powerful Active Response technology enables you to quickly & automatically take action against threats  Advanced IT Search employs highly effective data visualization tools – word clouds, tree maps, & more  Quickly generates compliance reports for PCI DSS, GLBA, SOX, NERC CIP, HIPAA, & more  Built-in correlation rules, reports, & responses for out-of-the-box visibility and proactive threat protection SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 22. 22 Thank You! SANS & SOLARWINDS IT SECURITY SURVEY 2013