SlideShare a Scribd company logo
1 of 41
Download to read offline
SIEM – silver bullet to ITSEC

Data Security
Solutions
Certified IBM
Business Partner for
IBM QRADAR
Security Intelligence
Park Hotel Maritim
28.01.2014
“Data Security Solutions” specializes

Specialization – IT Security

IT Security consulting
(vulnerability
assessment
tests, security audit, new
systems integration, HR
training, technical support)
Innovative & selected
software / hardware & hybrid
solutions
from
leading
technology vendors from
over 10 different countries
Agenda

SIEM – Silver bullet to ITSEC
QRadar Security Intelligence
SIEM Use Cases
Qradar v.7.2 update & integrations
SIEM – heart of your security system

Security information includes log data generated from
numerous sources, including antivirus software,
intrusion-detection systems (IDS), intrusion-prevention
systems (IPS), file systems, firewalls, routers, servers
and switches.

Monitor events in real time.
Display a real-time view of activity.
Aggregate data.
Provide automated incidence response.
Correlate data from multiple sources.
Send alerts and generate reports.
SIEM – SIM & SEM

Security event management (SEM),
which provides real-time monitoring for
security events;
Security information management
(SIM), which provides log management
and reporting for security-related events.
Immediate Problems

The cost and complexity of purchasing and
managing storage and monitoring systems
Difficulty accessing huge amounts of data
Limited ability to make queries against historic
log data
Keeping pace with changing user behavior
outside the control of IT (e.g., mobile computing
and communication devices, and the
pervasiveness of social media)
Loss of data fidelity
Opportunities To Add New Capabilities

Deep, historical analysis of security events over long
periods (years...not days)
Large-scale investigations to detect advanced
persistent threats
More rapid response to compliance and regulatory
inquiries
Establishing benchmarks for employee, contractor,
supplier and partner behavior in regards to data access,
and measuring variations from those benchmarks
Defining and implementing best practices for
information security management and compliance
reporting
Automated filtering of vast log data to isolate
suspicious event patterns meriting manual investigation
Goal of Next-generation SIEM

IT & Network Identity
Management
Operations

Operational
Security

Log management
Compliance reporting
Real-time monitoring
Incident response
Forensic investigation

Log
Tool

Log
Silo

Governance &
Compliance

?

?
? ???
?
?
?? ?? ? ???
? ? ???
?? ? ?
Log Jam
?? ? ?
?
??
? ??
? ??
???
??LOGS
?
??
?
Network

Servers

Databases

???
??
Homegrown
Applications
?
Qradar security intelligence
QRadar Family

Log
Management

SIEM

Risk
Management

Network
Activity &
Anomaly
Detection

Network and
Application
Visibility

• Turnkey log management
• SME to Enterprise
• Upgradeable to enterprise SIEM

•
•
•
•

Integrated log, threat, risk & compliance mgmt.
Sophisticated event analytics
Asset profiling and flow analytics
Offense management and workflow

• Predictive threat modeling & simulation
• Scalable configuration monitoring and audit
• Advanced threat visualization and impact
analysis

• Network analytics
• Behavior and anomaly detection
• Fully integrated with SIEM

• Layer 7 application monitoring
• Content capture
• Physical and virtual environments
QRadar All In One
QRadar Distributed Deployment
Qradar security intelligence

AppScan and QRadar Integration
Guardium and QRadar Integration
QRadar Risk Manager and SIEM
QRadar vulnerability manager
Other IBM Security Systems
AppScan and Qradar Integration

AppScan® Enterprise offers advanced application
security testing and risk management with a platform
that drives governance, collaboration and security
intelligence throughout the application lifecycle.
Guardium and Qradar Integration

Guardium offers insight into both database activity on
the network, such as data transfer, and also on local
database and privileged user activity.
Qradar Risk Manager and SIEM

QRadar Risk Manager adds many key proactive
security intelligence capabilities designed to help IT
security teams minimize network breaches by reducing
their attack surfaces. Some specific abilities include:
Depicts network topology views; visualizes and assesses risk based on
real-time threat environment, vulnerability posture, and network
configurations
Identifies missing, weak, inefficient and unnecessary firewall rules and
IPS signatures, reducing risk and improving firewall performance
Supports policy compliance for network traffic, topology and vulnerability
exposures
Improves QRadar forensics including determination of offense root cause
and visualization of offense attack paths
Collects firewall, switch, router and IPS/IDS configuration data, which
when combined with discovery of network routes and neighbor information
allows a network topology model to be created.
Qradar Vulnerability Manager

QRadar Vulnerability Manager combines automated
vulnerability scanning with a superior understanding of
device configurations, network topology and traffic patterns
to help security teams enact proactive protection measures
in an optimal fashion.
Key integrations for QRadar Vulnerability Manager
include:

Qradar Risk Manager
IBM Security SiteProtector System
X-Force threat intelligence feed
IBM Endpoint Manager
IBM Security AppScan
IBM InfoSphere Guardium Vulnerability Assesment
SIEM Use Cases WordCloud
SIEM Use Cases Definition

Requirements
Scope

Event Sources
Response
Your Use Case

Build YOUR own use case!
React faster
Improve Efficiency
Automate Compliance
Use Cases

Vulnerability Correlation
Suspicious Access Correlation
Flow and Event Combo Correlation
Botnet Application Identity
VMware Flow Analysis
Unidirectional Flows Detection
Vulnerability Reporting
Data Loss Prevention
Double Correlation
Policy and Insider Threat Intelligence (Social Media Use
Case)
Use Cases

Detecting Threats or Suspicious Changes in Behaviour
Preventative Alerting and Monitoring
Compliance Monitoring
Client-side vulnerability correlation
Excessive Failed Logins to Compliance Servers
Remote Access from Foreign Country Logons
Communication with Known Hostile Networks
Long Durations
Multi-Vector Attack
Device stopped sending Data (Out of Compliance)
Social Media Intelligence

Problem:
Social media is an increasing threat to an organization's policies and network;
company employees are the ones who are most likely to fall victim to social
engineering based threats, and serve as entry points for Advanced Persistent
Threats.
Solution: Social media Monitoring& Correlation in real-time:

Qradar’s real-time monitoring and correlation of hundreds of social media sites, such
as Twitter, Facebook, Gmail, LinkedIn, etc., offers automated application aware
insight and identifies social media-based threats by user and application.
Social Media Intelligence

With Qradar, you can:
Identify the user responsible for
the data leak.

With Qradar, you can:
Identify all the source,
destination and the actual
corporate credit card number
leaked.
Data Loss Prevention

Customer Requirement:
Customer wants to detect when an employee may be stealing customer
contact info in preparation for leaving the company
Solution:
Baseline employee access to CRM
Detect deviations from norm: 1,000 transactions (access to customer
records) vs normal 50 per day
BUT…what if the user is tech savvy or has a geek nephew, and makes
a single SQL query to the back end database?
Profile network traffic between workstations and back-end database or
policy shouldn’t allow direct access to database from workstations
Data Loss Prevention
Potential Data Loss?
Who? What? Where?

Who?
An internal user

What?
Oracle data

Where?
Gmail
Indavertent Wrongdoing

A/V Server
Trying to update the
entire internet
Issue bubbled to the
top of the offense
manager immediately
post-installation
Problem had existed for
months, but was lost in
firewall logs.
A/V clients were badly
out of date.
System Misconfiguration

QRadar reports remote sources scanning internal SQL servers
Firewall admin insists QRadar is incorrect – absolutely no inbound
SQL traffic permitted.
But … months earlier user had requested access to SQL server from
outside campus
Administrator fat-fingered the FW rule and unintentionally allowed
SQL access to & from all hosts
Teleportation

Customer Requirement:
Customer wanted to detect users that logged in from IP addresses in
different locations simultaneously.
Solution:
 Create rule to test for 2 or more logins from VPN or AD from different
country within 15 minutes
 Can be extended to check for local login within corporate network and
simultaneous remote login
Purell for your VPN

Customer Requirement:
Customer wanted to detect when external systems over the VPN
accesses sensitive servers
Customer was concerned that external system could be infected /
exploited through split tunneling and infect sensistive internal servers
Solution:
 Use latest VA scan of user systems
 Create BB of OSVDB IDs of concern
 Detect when external systems with vulnerabilities access sensitive
servers
Uninvited Guests

Customer Requirement:
Wants to identify new systems attached to network. There are active wall
jacks throughout building
Solution:
Set asset database retention to just beyond DHCP lease time (1-2
days)—user out of office/on vacation, asset expires
New machine attaches, rule alerts
Flows for real-time detection: no other SIEM can do this
Can alert on VA import
In 7.0, can build up MAC list in reference sets (~2 wks), then alert
when new MAC appears on network
Policy Vialation / Resource Misuse

Customer Requirement:
Detect if there are P2P Server located in Local Area Network
Communication to known Bot C&C

Customer Requirement:
Detect if any of internal system is communicating to known Bot
Command and Contrlol
Forensic of Administrative Change

Customer Requirement:
New User account creation with administrative privileges
System registry change, Application Installed/Uninstalled
Password reset
Service started/stopped
Vulnerability Overview

Customer Requirement:
Generate weekly report for Vulnerabilities
Use Cases Summary

Identify the goal for each
event correlation rule (and
use case).
Determine the conditions
for the alert.
Select the relevant data
sources.
Test the rule.
Determine response
strategies, and document
them.
Qradar v. 7.2 update

Enhanced asset and vulnerability functionality
Centralized license management
Multicultural support (languages)
Improved bar and pie charts on the Dashboard tab
Data obfuscation
Identity and Access Management (IAM) integration
Browser support
Java 7 support
1500 + reports
New ―QRadar 2100 Light‖ appliance
QRadar Vulnerability Scaner

Solution Highlights
New

Unique VA solution integrated
with Security Intelligence
context/data

Providing unified view of all
vulnerability information
Dramatically improving
actionable information through
rich context
Reducing total cost of ownership
through product consolidation

Log
Manager

SIEM

Network
Activity
Monitor

Risk
Manager

Vulnerability
Manager
QRadar Vulnerability Manager Integration

New tab in QRadar
Two new deployable components
- QVM Console
• Scan definitions, scan scheduling engine, scan
results
- QVM Scanner
Third component hosted by IBM
- Hosted Scanner, scans a customers DMZ from the
internet
QRadar 2100 All-In-One Light

This appliance is an all-in-one appliance that provides
the abilities of the QRadar 2100 appliance
Supports 500 Events Per Second (EPS) instead of 1,000
EPS
Includes Built-in Qflow collector for Layer7 analysis
Upgradeable
Q/A
www.dss.lv
info@dss.lv / andris@dss.lv
+371 29162784
+371 26113545

More Related Content

What's hot

Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
Arrow ECS UK
 

What's hot (20)

IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM2012-12-12 Seminar McAfee ESM
2012-12-12 Seminar McAfee ESM
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 
IBM QRadar Xforce
IBM QRadar XforceIBM QRadar Xforce
IBM QRadar Xforce
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Top Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against ThemTop Cybersecurity Threats and How SIEM Protects Against Them
Top Cybersecurity Threats and How SIEM Protects Against Them
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 

Viewers also liked

Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 

Viewers also liked (14)

IBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's NewIBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's New
 
Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence Leverage Big Data for Security Intelligence
Leverage Big Data for Security Intelligence
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016 Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 

Similar to Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
Steve Lim
 

Similar to Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014 (20)

Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
 
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptxIBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
Swascan brochure-eng
Swascan brochure-engSwascan brochure-eng
Swascan brochure-eng
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Brochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On PremiseBrochure SWASCAN-ENG On Premise
Brochure SWASCAN-ENG On Premise
 
Swascan brochure-EN
Swascan brochure-ENSwascan brochure-EN
Swascan brochure-EN
 
cb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digitalcb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digital
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Swascan Cyber Security Testing Platform
Swascan Cyber Security Testing PlatformSwascan Cyber Security Testing Platform
Swascan Cyber Security Testing Platform
 
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
 

More from Andris Soroka

More from Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014

  • 1. SIEM – silver bullet to ITSEC Data Security Solutions Certified IBM Business Partner for IBM QRADAR Security Intelligence Park Hotel Maritim 28.01.2014
  • 2. “Data Security Solutions” specializes Specialization – IT Security IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support) Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries
  • 3. Agenda SIEM – Silver bullet to ITSEC QRadar Security Intelligence SIEM Use Cases Qradar v.7.2 update & integrations
  • 4. SIEM – heart of your security system Security information includes log data generated from numerous sources, including antivirus software, intrusion-detection systems (IDS), intrusion-prevention systems (IPS), file systems, firewalls, routers, servers and switches. Monitor events in real time. Display a real-time view of activity. Aggregate data. Provide automated incidence response. Correlate data from multiple sources. Send alerts and generate reports.
  • 5. SIEM – SIM & SEM Security event management (SEM), which provides real-time monitoring for security events; Security information management (SIM), which provides log management and reporting for security-related events.
  • 6. Immediate Problems The cost and complexity of purchasing and managing storage and monitoring systems Difficulty accessing huge amounts of data Limited ability to make queries against historic log data Keeping pace with changing user behavior outside the control of IT (e.g., mobile computing and communication devices, and the pervasiveness of social media) Loss of data fidelity
  • 7. Opportunities To Add New Capabilities Deep, historical analysis of security events over long periods (years...not days) Large-scale investigations to detect advanced persistent threats More rapid response to compliance and regulatory inquiries Establishing benchmarks for employee, contractor, supplier and partner behavior in regards to data access, and measuring variations from those benchmarks Defining and implementing best practices for information security management and compliance reporting Automated filtering of vast log data to isolate suspicious event patterns meriting manual investigation
  • 8. Goal of Next-generation SIEM IT & Network Identity Management Operations Operational Security Log management Compliance reporting Real-time monitoring Incident response Forensic investigation Log Tool Log Silo Governance & Compliance ? ? ? ??? ? ? ?? ?? ? ??? ? ? ??? ?? ? ? Log Jam ?? ? ? ? ?? ? ?? ? ?? ??? ??LOGS ? ?? ? Network Servers Databases ??? ?? Homegrown Applications ?
  • 10. QRadar Family Log Management SIEM Risk Management Network Activity & Anomaly Detection Network and Application Visibility • Turnkey log management • SME to Enterprise • Upgradeable to enterprise SIEM • • • • Integrated log, threat, risk & compliance mgmt. Sophisticated event analytics Asset profiling and flow analytics Offense management and workflow • Predictive threat modeling & simulation • Scalable configuration monitoring and audit • Advanced threat visualization and impact analysis • Network analytics • Behavior and anomaly detection • Fully integrated with SIEM • Layer 7 application monitoring • Content capture • Physical and virtual environments
  • 13. Qradar security intelligence AppScan and QRadar Integration Guardium and QRadar Integration QRadar Risk Manager and SIEM QRadar vulnerability manager Other IBM Security Systems
  • 14. AppScan and Qradar Integration AppScan® Enterprise offers advanced application security testing and risk management with a platform that drives governance, collaboration and security intelligence throughout the application lifecycle.
  • 15. Guardium and Qradar Integration Guardium offers insight into both database activity on the network, such as data transfer, and also on local database and privileged user activity.
  • 16. Qradar Risk Manager and SIEM QRadar Risk Manager adds many key proactive security intelligence capabilities designed to help IT security teams minimize network breaches by reducing their attack surfaces. Some specific abilities include: Depicts network topology views; visualizes and assesses risk based on real-time threat environment, vulnerability posture, and network configurations Identifies missing, weak, inefficient and unnecessary firewall rules and IPS signatures, reducing risk and improving firewall performance Supports policy compliance for network traffic, topology and vulnerability exposures Improves QRadar forensics including determination of offense root cause and visualization of offense attack paths Collects firewall, switch, router and IPS/IDS configuration data, which when combined with discovery of network routes and neighbor information allows a network topology model to be created.
  • 17. Qradar Vulnerability Manager QRadar Vulnerability Manager combines automated vulnerability scanning with a superior understanding of device configurations, network topology and traffic patterns to help security teams enact proactive protection measures in an optimal fashion. Key integrations for QRadar Vulnerability Manager include: Qradar Risk Manager IBM Security SiteProtector System X-Force threat intelligence feed IBM Endpoint Manager IBM Security AppScan IBM InfoSphere Guardium Vulnerability Assesment
  • 18. SIEM Use Cases WordCloud
  • 19. SIEM Use Cases Definition Requirements Scope Event Sources Response
  • 20. Your Use Case Build YOUR own use case! React faster Improve Efficiency Automate Compliance
  • 21. Use Cases Vulnerability Correlation Suspicious Access Correlation Flow and Event Combo Correlation Botnet Application Identity VMware Flow Analysis Unidirectional Flows Detection Vulnerability Reporting Data Loss Prevention Double Correlation Policy and Insider Threat Intelligence (Social Media Use Case)
  • 22. Use Cases Detecting Threats or Suspicious Changes in Behaviour Preventative Alerting and Monitoring Compliance Monitoring Client-side vulnerability correlation Excessive Failed Logins to Compliance Servers Remote Access from Foreign Country Logons Communication with Known Hostile Networks Long Durations Multi-Vector Attack Device stopped sending Data (Out of Compliance)
  • 23. Social Media Intelligence Problem: Social media is an increasing threat to an organization's policies and network; company employees are the ones who are most likely to fall victim to social engineering based threats, and serve as entry points for Advanced Persistent Threats. Solution: Social media Monitoring& Correlation in real-time: Qradar’s real-time monitoring and correlation of hundreds of social media sites, such as Twitter, Facebook, Gmail, LinkedIn, etc., offers automated application aware insight and identifies social media-based threats by user and application.
  • 24. Social Media Intelligence With Qradar, you can: Identify the user responsible for the data leak. With Qradar, you can: Identify all the source, destination and the actual corporate credit card number leaked.
  • 25. Data Loss Prevention Customer Requirement: Customer wants to detect when an employee may be stealing customer contact info in preparation for leaving the company Solution: Baseline employee access to CRM Detect deviations from norm: 1,000 transactions (access to customer records) vs normal 50 per day BUT…what if the user is tech savvy or has a geek nephew, and makes a single SQL query to the back end database? Profile network traffic between workstations and back-end database or policy shouldn’t allow direct access to database from workstations
  • 26. Data Loss Prevention Potential Data Loss? Who? What? Where? Who? An internal user What? Oracle data Where? Gmail
  • 27. Indavertent Wrongdoing A/V Server Trying to update the entire internet Issue bubbled to the top of the offense manager immediately post-installation Problem had existed for months, but was lost in firewall logs. A/V clients were badly out of date.
  • 28. System Misconfiguration QRadar reports remote sources scanning internal SQL servers Firewall admin insists QRadar is incorrect – absolutely no inbound SQL traffic permitted. But … months earlier user had requested access to SQL server from outside campus Administrator fat-fingered the FW rule and unintentionally allowed SQL access to & from all hosts
  • 29. Teleportation Customer Requirement: Customer wanted to detect users that logged in from IP addresses in different locations simultaneously. Solution:  Create rule to test for 2 or more logins from VPN or AD from different country within 15 minutes  Can be extended to check for local login within corporate network and simultaneous remote login
  • 30. Purell for your VPN Customer Requirement: Customer wanted to detect when external systems over the VPN accesses sensitive servers Customer was concerned that external system could be infected / exploited through split tunneling and infect sensistive internal servers Solution:  Use latest VA scan of user systems  Create BB of OSVDB IDs of concern  Detect when external systems with vulnerabilities access sensitive servers
  • 31. Uninvited Guests Customer Requirement: Wants to identify new systems attached to network. There are active wall jacks throughout building Solution: Set asset database retention to just beyond DHCP lease time (1-2 days)—user out of office/on vacation, asset expires New machine attaches, rule alerts Flows for real-time detection: no other SIEM can do this Can alert on VA import In 7.0, can build up MAC list in reference sets (~2 wks), then alert when new MAC appears on network
  • 32. Policy Vialation / Resource Misuse Customer Requirement: Detect if there are P2P Server located in Local Area Network
  • 33. Communication to known Bot C&C Customer Requirement: Detect if any of internal system is communicating to known Bot Command and Contrlol
  • 34. Forensic of Administrative Change Customer Requirement: New User account creation with administrative privileges System registry change, Application Installed/Uninstalled Password reset Service started/stopped
  • 35. Vulnerability Overview Customer Requirement: Generate weekly report for Vulnerabilities
  • 36. Use Cases Summary Identify the goal for each event correlation rule (and use case). Determine the conditions for the alert. Select the relevant data sources. Test the rule. Determine response strategies, and document them.
  • 37. Qradar v. 7.2 update Enhanced asset and vulnerability functionality Centralized license management Multicultural support (languages) Improved bar and pie charts on the Dashboard tab Data obfuscation Identity and Access Management (IAM) integration Browser support Java 7 support 1500 + reports New ―QRadar 2100 Light‖ appliance
  • 38. QRadar Vulnerability Scaner Solution Highlights New Unique VA solution integrated with Security Intelligence context/data Providing unified view of all vulnerability information Dramatically improving actionable information through rich context Reducing total cost of ownership through product consolidation Log Manager SIEM Network Activity Monitor Risk Manager Vulnerability Manager
  • 39. QRadar Vulnerability Manager Integration New tab in QRadar Two new deployable components - QVM Console • Scan definitions, scan scheduling engine, scan results - QVM Scanner Third component hosted by IBM - Hosted Scanner, scans a customers DMZ from the internet
  • 40. QRadar 2100 All-In-One Light This appliance is an all-in-one appliance that provides the abilities of the QRadar 2100 appliance Supports 500 Events Per Second (EPS) instead of 1,000 EPS Includes Built-in Qflow collector for Layer7 analysis Upgradeable