SlideShare una empresa de Scribd logo
1 de 28
SIEM
Your Complete IT Security Arsenal
8 Things You Should Know About Choosing an SIEM Solution
Joel Fernandes
Sr. Product Marketing Analyst
SIEM Solutions
ManageEngine
joeljohn.f@manageengine.com
Speaker
Webinar “Housekeeping” Tips
• Use the “question” box in the lower right corner to
submit your questions
• Questions will be answered during the Q&A session
at the end of the webinar
• We will do our best to answer as many questions as
possible in the allotted time
• This webinar is getting recorded and will be shared
to you via email
Agenda
• About ManageEngine
• Log management challenges
• What is SIEM?
• Why is SIEM necessary?
• 2012 Data Breach Analysis
• Typical working of an SIEM solution
• 8 critical things you should know about choosing an SIEM solution
• Business benefits of SIEM solutions
• ManageEngine SIEM product offering – Overview
• Quick Demo - ManageEngine SIEM product offering
• Conclusion
• Q&A
About ManageEngine
– IT Management Software division of Zoho
Corporation
– Established in 2002
– ManageEngine covers the complete gamut of
IT solutions
• 21 Products | 20 Free tools | 2 SAAS
offerings
– Trusted by over 72,000 customers across
200+ countries
– 3 out of every 5 Fortune 500 companies are
ManageEngine customers
Log Management Challenges
• Analyzing Logs for Relevant Security
Intelligence
• Centralizing Log Collection
• Meeting IT Compliance
Requirements
• Conducting Effective Root Cause
Analysis
• Making Log Data More Meaningful
• Tracking Suspicious User Behavior
What is SIEM?
• The term „SIEM‟ was coined by Mark Nicolett
and Amrit Williams (Gartner Analysts) in 2005
• In simple words, SIEM is a combination of
two different types of technologies:
– SIM (Security Information Management) that
focuses on log collection and report generation
– SEM (Security Event Manager) that analyzes
events in real-time using event correlation and
alerting mechanism
• SIEM technology provides network security
intelligence and real-time monitoring for
network devices, systems, and applications
Typical Working of an SIEM Solution
Why is SIEM necessary?
 Rise in data breaches due to internal and external threats
 Attackers are smart and traditional security tools just don‟t suffice
 Mitigate sophisticated cyber-attacks
 Manage increasing volumes of logs from multiple sources
 Meet stringent compliance requirements
Biggest Data Breaches in 2013
Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
2012 Data Breach Analysis
Source: Verizon 2013 Data Breach Investigations Report
Threat categories over timeVictims
8 Things You Should Know About
Choosing an SIEM Solution
#1. Log Collection
• Universal Log Collection to collect logs from
heterogeneous sources (Windows systems, Unix/Linux
systems, applications, databases, routers, switches, and
other devices)
• Log collection method - agent-based or
agentless
– Both Recommended
• Centralized log collection
• Events Per Second (EPS) – Rate at which
your IT infrastructure sends events.
– If not calculated properly the SIEM solution will start
dropping events before they are stored in the
database leading to incorrect reports, search results,
alerts, and correlation.
#2. User Activity Monitoring
• SIEM solutions should have Out-of-the-box
user activity monitoring, Privileged user
monitoring and audit (PUMA) reporting
feature
• Ensure that the SIEM solution gives the
‘Complete audit trail’
– Know which user performed the action,
what was the result of the action, on
what server it happened, and user
workstation/device from where the
action was triggered.
#3. Real Time Event Correlation
• Real-time event correlation is all about
proactively dealing with threats
• Correlation boosts network security by
processing millions of events simultaneously
to detect anomalous events on the network
• Correlation can be based on log search,
rules and alerts
– Predefined rules and alerts are not
sufficient. Custom rule and alert builder
is a must for every SIEM solution.
– Ensure that the process of correlating
events is easy.
#4. Log Retention
• SIEM solutions should automatically
archive all log data from systems,
devices & applications to a
„centralized’ repository
• Ensure that the SIEM solution has
‘Tamper Proof’ feature which
„encrypts’ and „time stamps’ them
for compliance and forensics
purposes
• Ease of retrieving and analyzing
archived log data
#5. IT Compliance Reports
• IT compliance is the core of every SIEM
solution
• Ensure that the SIEM solution has out-
of-the-box regulatory compliance
reports such as PCI DSS, FISMA,
GLBA, SOX, HIPAA, etc.
• SIEM solutions should also have the
capability to customize and build new
compliance reports to comply with
future regulatory acts
#6. File Integrity Monitoring
• File integrity monitoring helps security
professionals in monitoring business
critical files and folders.
• Ensure that the SIEM solution tracks and
reports on all changes happening such as
when files and folders are created,
accessed, viewed, deleted, modified,
renamed and much more.
• The SIEM solution should also send real-
time alerts when unauthorized users
access critical files and folders
#7. Log Forensics
• SIEM solutions should allow users to
track down a intruder or the event
activity using log search capability
• The log search capability should be very
intuitive and user-friendly, allowing IT
administrators to search through the raw
log data quickly
#8. Dashboards
• Dashboards drive SIEM solutions and
help IT administrators take timely action
and make the right decisions during
network anomalies.
• Security data must be presented in a
very intuitive and user-friendly manner.
• The dashboard must be fully
customizable so that IT administrators
can configure the security information
they wish to see.
8 Critical Things – At a glance
Business Benefits of SIEM Solutions
• Real-time Monitoring
– For operational efficiency
and IT security purposes
• Cost Saving
• Compliance
• Reporting
• Rapid ROI
ManageEngine‟s SIEM Offering
– Easy of deploy
– Cost-effective
– Customizable dashboard
with drag and drop
widgets
– Uses both Agent and
Agentless log collection
mechanism
Universal Log Collection
– Supports heterogeneous
log sources
– Universal log collection
capability helps index any
type of log regardless of
the format and source
– Allows you to index log
data and generate reports
for custom in-
house/proprietary
applications
Real Time Event Correlation and Log Forensics
– Correlation using Search: Correlate
events using log search with Wild-
cards, Phrases and Boolean operators
– Correlation using Alerts: Correlate
events using custom and predefined
alerts to mitigate threats in real-time
– Notifications are send in real-time via
Email and SMS
– Conduct root cause analysis by diving
into raw logs and generate forensic
reports in minutes!
5,000+ customers across 110+ countries
Get your 30 Day Free Trial Now!
www.eventloganalyzer.com
Quick Glance
Conclusion
• A SIEM solution can provide enormous security benefits to the company by
protecting the network with real-time log analysis.
• Most organizations think that SIEM solutions have a steep learning curve
and are expensive, complex, and hard to deploy.
• This claim may be true about many SIEM vendors. However, the right
SIEM solution is one that can be easily deployed, is cost-effective, and
meets all your IT security needs with a single tool.
Q&A

Más contenido relacionado

La actualidad más candente

Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SHRIYARAI4
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemSBWebinars
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptxneoalt
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdfPencilData
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadarPencilData
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Security operation center
Security operation centerSecurity operation center
Security operation centerMuthuKumaran267
 

La actualidad más candente (20)

Siem ppt
Siem pptSiem ppt
Siem ppt
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 

Destacado

Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and LessonsAnton Chuvakin
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...Anton Chuvakin
 
Microsoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManagerMicrosoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManagerManageEngine
 
Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015n|u - The Open Security Community
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 Andris Soroka
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
Centralized logging
Centralized loggingCentralized logging
Centralized loggingblessYahu
 
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...Anton Chuvakin
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Error Handling Framework in Mule ESB
Error Handling Framework in Mule ESBError Handling Framework in Mule ESB
Error Handling Framework in Mule ESBSashidhar Rao GDS
 

Destacado (20)

Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
HP ArcSight
HP ArcSight HP ArcSight
HP ArcSight
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
SIEM: Is It What Is SIEMs? Security Information and Event Management Summit a...
 
Microsoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManagerMicrosoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManager
 
Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011 SIEM vs Log Management - Data Security Solutions 2011
SIEM vs Log Management - Data Security Solutions 2011
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
Centralized logging
Centralized loggingCentralized logging
Centralized logging
 
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Error Handling Framework in Mule ESB
Error Handling Framework in Mule ESBError Handling Framework in Mule ESB
Error Handling Framework in Mule ESB
 

Similar a 8 Things to Know When Choosing a SIEM Solution

Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-networkhardik soni
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Managementkarthikvcyber
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log AnalysisJim Kaplan CIA CFE
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​Zoho Corporation
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0Rasmi Swain
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Precisely
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityTripwire
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance WebinarSolarWinds
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 

Similar a 8 Things to Know When Choosing a SIEM Solution (20)

Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-network
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Security Information Event Management Security Information Event Management
Security Information Event Management Security Information Event ManagementSecurity Information Event Management Security Information Event Management
Security Information Event Management Security Information Event Management
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
EventLog Analyzer - Product overview
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overview
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
Wc4
Wc4Wc4
Wc4
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
 
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for SecurityA Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
PKI.pptx
PKI.pptxPKI.pptx
PKI.pptx
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

8 Things to Know When Choosing a SIEM Solution

  • 1. SIEM Your Complete IT Security Arsenal 8 Things You Should Know About Choosing an SIEM Solution Joel Fernandes Sr. Product Marketing Analyst SIEM Solutions ManageEngine joeljohn.f@manageengine.com Speaker
  • 2. Webinar “Housekeeping” Tips • Use the “question” box in the lower right corner to submit your questions • Questions will be answered during the Q&A session at the end of the webinar • We will do our best to answer as many questions as possible in the allotted time • This webinar is getting recorded and will be shared to you via email
  • 3. Agenda • About ManageEngine • Log management challenges • What is SIEM? • Why is SIEM necessary? • 2012 Data Breach Analysis • Typical working of an SIEM solution • 8 critical things you should know about choosing an SIEM solution • Business benefits of SIEM solutions • ManageEngine SIEM product offering – Overview • Quick Demo - ManageEngine SIEM product offering • Conclusion • Q&A
  • 4. About ManageEngine – IT Management Software division of Zoho Corporation – Established in 2002 – ManageEngine covers the complete gamut of IT solutions • 21 Products | 20 Free tools | 2 SAAS offerings – Trusted by over 72,000 customers across 200+ countries – 3 out of every 5 Fortune 500 companies are ManageEngine customers
  • 5. Log Management Challenges • Analyzing Logs for Relevant Security Intelligence • Centralizing Log Collection • Meeting IT Compliance Requirements • Conducting Effective Root Cause Analysis • Making Log Data More Meaningful • Tracking Suspicious User Behavior
  • 6. What is SIEM? • The term „SIEM‟ was coined by Mark Nicolett and Amrit Williams (Gartner Analysts) in 2005 • In simple words, SIEM is a combination of two different types of technologies: – SIM (Security Information Management) that focuses on log collection and report generation – SEM (Security Event Manager) that analyzes events in real-time using event correlation and alerting mechanism • SIEM technology provides network security intelligence and real-time monitoring for network devices, systems, and applications
  • 7. Typical Working of an SIEM Solution
  • 8. Why is SIEM necessary?  Rise in data breaches due to internal and external threats  Attackers are smart and traditional security tools just don‟t suffice  Mitigate sophisticated cyber-attacks  Manage increasing volumes of logs from multiple sources  Meet stringent compliance requirements Biggest Data Breaches in 2013 Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 9. 2012 Data Breach Analysis Source: Verizon 2013 Data Breach Investigations Report Threat categories over timeVictims
  • 10. 8 Things You Should Know About Choosing an SIEM Solution
  • 11. #1. Log Collection • Universal Log Collection to collect logs from heterogeneous sources (Windows systems, Unix/Linux systems, applications, databases, routers, switches, and other devices) • Log collection method - agent-based or agentless – Both Recommended • Centralized log collection • Events Per Second (EPS) – Rate at which your IT infrastructure sends events. – If not calculated properly the SIEM solution will start dropping events before they are stored in the database leading to incorrect reports, search results, alerts, and correlation.
  • 12. #2. User Activity Monitoring • SIEM solutions should have Out-of-the-box user activity monitoring, Privileged user monitoring and audit (PUMA) reporting feature • Ensure that the SIEM solution gives the ‘Complete audit trail’ – Know which user performed the action, what was the result of the action, on what server it happened, and user workstation/device from where the action was triggered.
  • 13. #3. Real Time Event Correlation • Real-time event correlation is all about proactively dealing with threats • Correlation boosts network security by processing millions of events simultaneously to detect anomalous events on the network • Correlation can be based on log search, rules and alerts – Predefined rules and alerts are not sufficient. Custom rule and alert builder is a must for every SIEM solution. – Ensure that the process of correlating events is easy.
  • 14. #4. Log Retention • SIEM solutions should automatically archive all log data from systems, devices & applications to a „centralized’ repository • Ensure that the SIEM solution has ‘Tamper Proof’ feature which „encrypts’ and „time stamps’ them for compliance and forensics purposes • Ease of retrieving and analyzing archived log data
  • 15. #5. IT Compliance Reports • IT compliance is the core of every SIEM solution • Ensure that the SIEM solution has out- of-the-box regulatory compliance reports such as PCI DSS, FISMA, GLBA, SOX, HIPAA, etc. • SIEM solutions should also have the capability to customize and build new compliance reports to comply with future regulatory acts
  • 16. #6. File Integrity Monitoring • File integrity monitoring helps security professionals in monitoring business critical files and folders. • Ensure that the SIEM solution tracks and reports on all changes happening such as when files and folders are created, accessed, viewed, deleted, modified, renamed and much more. • The SIEM solution should also send real- time alerts when unauthorized users access critical files and folders
  • 17. #7. Log Forensics • SIEM solutions should allow users to track down a intruder or the event activity using log search capability • The log search capability should be very intuitive and user-friendly, allowing IT administrators to search through the raw log data quickly
  • 18. #8. Dashboards • Dashboards drive SIEM solutions and help IT administrators take timely action and make the right decisions during network anomalies. • Security data must be presented in a very intuitive and user-friendly manner. • The dashboard must be fully customizable so that IT administrators can configure the security information they wish to see.
  • 19. 8 Critical Things – At a glance
  • 20. Business Benefits of SIEM Solutions • Real-time Monitoring – For operational efficiency and IT security purposes • Cost Saving • Compliance • Reporting • Rapid ROI
  • 21. ManageEngine‟s SIEM Offering – Easy of deploy – Cost-effective – Customizable dashboard with drag and drop widgets – Uses both Agent and Agentless log collection mechanism
  • 22. Universal Log Collection – Supports heterogeneous log sources – Universal log collection capability helps index any type of log regardless of the format and source – Allows you to index log data and generate reports for custom in- house/proprietary applications
  • 23. Real Time Event Correlation and Log Forensics – Correlation using Search: Correlate events using log search with Wild- cards, Phrases and Boolean operators – Correlation using Alerts: Correlate events using custom and predefined alerts to mitigate threats in real-time – Notifications are send in real-time via Email and SMS – Conduct root cause analysis by diving into raw logs and generate forensic reports in minutes!
  • 24. 5,000+ customers across 110+ countries
  • 25. Get your 30 Day Free Trial Now! www.eventloganalyzer.com
  • 27. Conclusion • A SIEM solution can provide enormous security benefits to the company by protecting the network with real-time log analysis. • Most organizations think that SIEM solutions have a steep learning curve and are expensive, complex, and hard to deploy. • This claim may be true about many SIEM vendors. However, the right SIEM solution is one that can be easily deployed, is cost-effective, and meets all your IT security needs with a single tool.
  • 28. Q&A

Notas del editor

  1. Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/