SlideShare a Scribd company logo
1 of 10
Download to read offline
Advanced Threat Detection
A technical overview of how the Interset platform
can quickly and accurately alert you to when
your sensitive data is under threat.
2 WHITE PAPER – ADVANCED THREAT DETECTION
Introduction
The sensitive data (Intellectual Property, trade secrets, business plans, MandA data and customer data)
of a company represents its most important assets and is a critical component of the company’s ability to
compete on a global scale. The loss of this data to either an insider attack, a targeted outside attack, or
the negligence of an employee, contractor or partner can be catastrophic and companies are spending
thousands and even millions of dollars to protect it. So why are the headlines still full of data loss incidents?
It seems that every month a new story of significant data loss makes the headlines and another organization
that invested major resources to protect their data is dealing with the fallout of bad PR, fines, and worse
potentially large amounts of lost revenue. This white paper explores the challenges of protecting this
critical data, examines why existing technologies and approaches to data protection have largely failed and
introduces a different approach to protecting sensitive data, like intellectual property (IP) and trade secrets,
based on advanced behavioral analytics: the Interset Enterprise Threat Detection Platform.
Defining the Risks and Threats to Organizations
Regardless of size or vertical, organizations drive competitive advantage and revenue from the sensitive
data assets they create or acquire. Many of these organizations are populated by highly skilled and highly
valued employees (engineers, software developers, designers, researchers, scientists, and technicians)
who work in highly creative and dynamic environments. Almost all organizations have extensive partnerships
including; OEM partners, suppliers, dealers, outsources, services firms and sometimes even competitors.
Organizations also have a variety of internal end users such as contractors, consultants, and auditors who
are not employees, but still have access to critical data. Connecting the high value workers, partners and
their work are integrated computing and file share systems that purposely make access to software
applications and data both easy and pervasive.
Internal end users, whether employees, third parties, or partners have access to sensitive data and are all
capable of causing a data compromise either through carelessness, ignorance or malicious activity. The most
dangerous and difficult to detect is a malicious insider. Beyond the infamous names of Manning and Snowden,
these types of attacks have become so widespread that the FBI has added ‘insider threat’ as a major focus
in its counter intelligence effort1
. With over 70% of insider attacks going unreported, US CERT statistics shows
that the average cost of an insider attack exceeded $1 Million USD in almost 50% of cases investigated2
.
Insider attacks by privileged users of all types define a significant and growing data loss risk to the enterprise.
At the same time, companies with valuable data are being targeted by a growing threat of skilled, motivated,
organized and often state-funded attackers willing to push the limits on corporate espionage via malware
and bribing employees to steal IP. These attackers can avoid investing billions of dollars in costs by stealing
the RandD, testing and manufacturing data from established companies. The consequences for legitimate
companies are enormous with losses of revenue in the millions from being cut out of foreign markets or
price undercutting in existing markets.
1 http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat
2 http://www.cert.org/blogs/insider_threat/2013/12/theft_of_ip_by_insiders.html
3 WHITE PAPER – ADVANCED THREAT DETECTION
Defining a New Approach
A system that looks holistically across the activities and events of an organization is able to build a series
of baselines that define normal business behavior. This system understands the context of normal behavior
and provides visibility into IT and operational risk. Further, it searches out events in real-time that do not
match normal behavior. These events are the anomalies that represent possible attacks from both insiders
and outsiders. When found, alerts are surfaced so that the appropriate individuals can be quickly investigated.
This new approach offers significant advantages, such as:
• The overall number of alerts and false positives are greatly reduced when compared to DLP or SIEM
tools because alerts are based on anomalies as compared to normal baseline behavior.
• The information about an alert is presented in the context of the event so that investigators do not waste
time trying to correlate who did what, when, and with what file.
• The events include the context of the file or files involved, and are not limited by file types so that
specialized applications and data types that include IP and trade secrets can be protected.
• The sensors that capture the relationships between users, files, and endpoints, are not limited when they
are offline or in virtual or cloud environments and can see data moving to mobile devices, eliminating
much of the challenges of integrated and new technology.
• The system works across all users, whether privileged IT admins, knowledge workers, contractors or
partners when deployed in their organization.
• Events from an attack, whether from an insider or from an outsider who attempts surreptitious access
for the purpose of exfiltration, show up immediately because they trigger anomaly alerts. The analytics
engine finds these attacks, and sends an alert as soon as the anomaly is discovered, providing security
managers time to react and quick access to information so they can stop the threat before data is
compromised.
This is the approach used by the Interset Platform, powered by a cutting edge behavioral analytics engine
and innovative big data collection and aggregation capabilities.
4 WHITE PAPER – ADVANCED THREAT DETECTION
How Interset Works
Behavioral Analytics are not new, but applying these proven methodologies for identifying and mitigating
risk within security is a paradigm shift. To make behavioral analytics truly effective, a rich set of information
must be collected and modelled so that anomalies can be accurately surfaced. The Interset platform is
specifically designed to optimize the threat detection process from metadata collection to analytical modeling.
Event Data Collection
Interset offers multiple agentless and agent-based data collection capabilities and is continually increasing
collection capabilities over time to drive ever richer data sets. Agentless data collection starts with specialized
Interset connectors that gather data from existing enterprise applications and systems. With a focus on
applications where IP and trade secrets are created, managed and stored, Interset connectors collect log
data from source code management systems, product lifecycle management systems, enterprise content
management systems, identity management systems, and security information and event management (SIEM)
systems. Examples of such systems include Perforce, Windchill, SharePoint, Active Directory, and Splunk.
Interset also offers a lightweight endpoint sensor that can be deployed across your organization on desktops,
laptops, workstations and servers. The collector works at the system level to continuously track data
interactions, user events, and system events. Once deployed, interactions are recorded every day, ranging
from what applications are opened to whether the user has taken a screenshot of a sensitive document,
or attempted to “print to file.” Supported on both Windows and Mac, the Interset endpoint sensor is also
designed to work on and offline and maintains a minimal footprint, such that system performance is not
affected.
Log data collected via a connector or endpoint sensor includes the following fields: user, IP address,
timestamp, action (commit, sync, get, etc.), resource (folder, file, path, etc.) and other specialized data fields
that may be helpful. This data is then aggregated and stored in Hadoop and retrieved by Apache Spark and
Phoenix for analytics. After collection, aggregation, and analysis is completed, the results can be explored via
the Interset UI or exported through an open API to SIEM solutions or into a Security Operations Center (SOC).
Behavioral Analytics
The Interset Behavioral Analytics Engine is driven
by two main classes of mathematics; behavioral risk
modeling, and entity risk modeling. Behavioral risk
models are multivariate math models that take in all
available contexts for each event that occur across
an organization and combine event and context in
a meaningful way to produce a Behavior Risk Score.
Entity Risk Models are a second set of math models
that drive Entity Risk Scores for Users, Machines and
Assets adjusting these risk scores over time based on
events that occur. Every entity (user, machine and asset)
maintains its own risk score. Assets are most commonly
files but can also be applications, source code and
other valuable objects. Entity risk models create the
normal activity baselines that are then compared
against events to determine how anomalous an event
is in the behavioral risk model.
The connected relationship model between
events, behavioral risk, behavioral risk scores,
entities and entity risk scores.
5 WHITE PAPER – ADVANCED THREAT DETECTION
The Interset Behavioral Analytics Engine sees
and understands the relationship between Events
and Entities as it observes activities across the
organization. The analytics engine builds and
maintains irrevocable relationships between entities
as events occur. As Interset observes activities and
builds relationships, the analytics engine continuously
creates and refines metrics that drive behavioral
baselines. The engine is able to see each anomalous
behavior and connect the dots of a series of behaviors
in terms of its context (files touched, application
used, machines involved, projects accessed, users
involved) to offer a complete picture of the threat as
it is occurring. By connecting the events, the Interset
Platform creates stories — a series of anomalous
events which enables the analytics engine to remove
noise and false positives.
In addition, through statistical analysis, the engine
quantifies just how anomalous an observed behavior
is. As usage and anomaly patterns are refined, the
analytics engine learns which users create more risk, which files are the most at risk, and which machines
are most often part of risky activities. Interset actively maintains a risk score for all of these entities using
normalized values. The more an entity is involved in high-risk anomalous activities, the more its risk score
will increase. Conversely, an entity that is not involved in high-risk activities, and that doesn’t trigger alerts,
will have its risk score decrease over time. When entities are involved in anomaly alerts, the alerts will
be presented in a prioritized order based on the risk score.
Entities and Risk
Entities are defined as users, machines (identities) and assets. A core feature of Interset is its ability to
accurately model the risk of all entities in your organization. Entity risk needs to be more than just a simple
one-time data classification exercise: entity risk changes over time, and needs to respond automatically over
time, to result in a maintainable, scalable system.
Tracking user risk enables IT teams to identify persons of interest. For example, as users (or their accounts)
exhibit more behavior with indicators of compromise, or their activity starts to show anomalous events
(and therefore are possible indicators of an account takeover), or their activity starts to show indications
of becoming a leaver (and therefore is statistically prone to IP exfiltration), the user risk score will increase
correspondingly to signal a warranted follow up investigation. With Interset, the ability to instantly show the
top most risky users in the organization is a very valuable way to focus the investigation team and maintain
a scalable process. Such a view shows the users that, among your entire organization, have accumulated
the most risk. Clicking on the user then allows you to see the underlying alerts and events that have
resulted in the system increasing the user risk score.
Machine risk tracks suspicious behaviors that accumulate on certain machines. Are some machines more
prone to store important files and become vulnerable to exfiltration? If so, that will be reflected in a high
machine risk score. For all machines monitored by an endpoint sensor, Interset will show the machines that
are most at risk. This risk can be due to compromise of the machine by malware, usage of the machine
by an insider, or high value assets being moved to or stored in machines making them more at risk.
The behavior risk score is an aggregate
of identity (user or machine), activity, asset,
and asset movement risk scores involved in
the behavior.
6 WHITE PAPER – ADVANCED THREAT DETECTION
Asset risk is a different set of models that identify where important data such as IP or trade secrets have
collected within your organization. Having Asset risk tracked through a separate and accurate set of models
is important because file contents change over time. Some files, for example, may be highly important and
therefore any anomalous behaviors or violations involving those assets should respond more rapidly than
other files. Computing a higher importance value for those files compared to others quantifies this relationship.
As the Interset platform defines important files, machine learning methods are used to learn common
attributes of these files, and discover and identify other, new files that are likely to be important as well.
The “vulnerability” of an entity is used to amplify the entity’s importance over time, based on the observed
behaviors involving that entity. As every user, file or machine exhibits anomalies, violations and exits, the
vulnerability of the entities involved are increased in proportion to the severity and recency of the event.
In other words, the more serious the bad event, and the more that happen close together, the more quickly
the vulnerability and overall risk score of the entity increases.
The relationship of Events, Behavioral Risk and Entity Risk: Three events drive all risk
scores higher.
The figure above illustrates a simple three event example that shows the relationship between behavioral
and entity risk models and how entity risk scores change over time. As J Mason executes three events, the
anomalous nature and riskiness of each event creates higher behavioral risk scores. To start, the entity risk
scores begin very low, showing little danger across the user, the machine that is logged into and the file that
has been accessed. As each event occurs, the behavior and entity risk scores climb. The Interset Behavioral
Analytics Engine then surfaces the threat across the event as well as the entities. The derivative file created
is also surfaced as it inherits the high risk score of its parent asset.
Rules
The Interset Platform also utilizes a rules engine, which complements the behavioral analytics engine, and
is applied at two points in the threat detection process. The first is prior to full behavioral analysis, and is the
point where corporate or compliance policies can be defined in the system. Policies can be defined to govern
user access, applications usage including cloud, USB devices, and the access of sensitive files. The alerts
based on these policies can be measured against risk thresholds, so that alerts are triggered only when these
7 WHITE PAPER – ADVANCED THREAT DETECTION
thresholds are exceeded. Companies can quickly identify prioritized gaps in their existing IT systems
and policies through Interset’s visibility into the activities between users, files and devices and the risk
measurements Interset applies. Interset rules can also be set to interact directly with the end user whose
actions are creating the violation, offering a powerful real-time training and awareness tool to help
employees understand and self-correct risky behavior.
Reducing noise and false positives
Through Interset’s stories approach which are driven by various behavioral and entity risk models, security
teams are able to cut through noise and false positive events that currently overwhelm them. As an example
— suppose “John Sneakypants” was detected accessing an important network share, an unusual event,
given his historical access patterns and/or the patterns of his peers in the same role. This may be suspicious,
but it could also be a false positive if John has had a recent role change or has been assigned to a new
project. But suppose that John also accessed this file at a time of day that he was never active at before,
and that he also just took files from a source code project that had been inactive for months, and that he
also copied an unusually large amount of sensitive files to a USB drive. Suddenly, this event is a lot more
suspicious. It is this intuition that the entity risk models capture, in real time, via mathematics.
This enables the Interset platform to automatically focus in and alert on actual threats, while tuning out the
massive amounts of uninteresting noise that overwhelm existing tools and the security teams that operate
them. The stories approach can vastly improve an organization’s ability to quickly determine the root cause
of a threat and respond proactively before critical data is compromised.
Interset Enterprise Risk and Threat Detection Architecture.
8 WHITE PAPER – ADVANCED THREAT DETECTION
Proactive Forensics
Leveraging end-user behavioral analytics is also key to lowering the cost of the forensic investigations.
It illuminates patterns and relationships created by the habits and activities of users and their devices.
By capturing the relationships between identities, activities, assets (files and machines), and the movement
of the data, an investigation can quickly and accurately identify the information that defines the risk or threat
down to the user, application or file in question. Since all activity is captured, a complete historical record of
the events related to the threat and all relationships is immediately available. This enables you to reconstruct
the activities that led up to the event, automating the reconstruction and loss analysis, compressing the
time it takes to determine the root cause and extent of a breach. Forensics are no longer reactive, but rather
proactive dramatically lowering the cost to investigate an incident and enable fast pursuit of legal action
or policy adjustments to prevent or reduce the risk of a future breach.
Use Cases
Beyond the protection of intellectual property and trade secrets, the Interset Platform addresses several
other use cases:
• Employee Resignation
The US CERT reports that more than 70% of resigning employees leave with IP, trade secrets and other
sensitive business data. Interset captures all end user file level events and when an employee announces
their resignation, reports can be quickly generated to see what sensitive data was accessed and where
it was moved to. HR departments can include these reports in their exit interviews and take effective
action to eliminate this common data loss risk. Similarly, when employees have not yet announced their
resignation but have planned to leave with malicious intent, the Interset Platform captures the behavioral
changes of such users and can alert security and HR to prevent data exfiltration. With its unique and
extensive visibility, Interset can see and capture all sensitive file movements involving, USB devices, cloud
environments, and also whether the machine is on or off the corporate network or completely offline.
• IT Controls/Policy Violations
Risks from improper application usage, improper file access and storage, usage of unauthorized cloud
storage systems are all captured by Interset and can be easily seen through the Interset UI. Common
risks like USB device usage, web mail attachments and employees emailing work home is also captured.
It is very common for scientists, researchers and technicians to “bring their work home,” and in some
cases even approved, but Interset can provide an understanding of how users are moving the data home
and what risk they are creating when they do. One Life Sciences customer had an IT control on Outlook
attachment size to minimize storage and help with some compliance regulations. Interset quickly showed
that employees were bypassing the control by attaching large files to webmail and using that for data
transfer to other employees and partners creating even greater risk of data loss and non-compliance.
• Education
Interset also supports the notion that your best data security tool is an educated employee. This
is especially true in highly creative and open industries. When Interset recognizes that a user is
violating a policy or taking an unusual risk, real-time notifications detailing what the violation or risk is
and alternative paths the employee can choose are immediately sent to the user. Education on corporate
policy, awareness of new risks and self-remediation on improper activity represent the most effective
IT control available.
9 WHITE PAPER – ADVANCED THREAT DETECTION
Conclusion
Using the science of Behavioral Analytics, Interset helps IP and trade secret centric companies and partners
gain visibility into what is truly happening across their collaborative enterprise. The ability to detect risky user
behaviors, processes, and controls enable companies to quickly detect and take action on anomalies that
represent insider and outsider threats. This level of risk visibility and detection provides you with the power
to secure high-value intellectual property and trade secrets, as well as other sensitive business data.
Interset’s innovative approach offers significant advantages, including;
• Reducing noise and false positives so that security teams can focus on material risks and actual threats
• Reducing the time required to forensically investigate a risky event or anomaly
• Expanding protection to include all types of IP and trade secrets including specialized design, engineering,
PLM and source code management applications
• Expanding protection to endpoints, whether they are on the corporate network or offline
• Accurately detecting insider and outside attacks during their early stages, enabling the attack to be
stopped before sensitive data is compromised
These advantages reduce the overall cost and complexity of a threat detection and data protection program
while increasing a security team’s ability to reduce risk and surface actual threats to the organization. In doing
this, Interset enables security teams and companies of all sizes to be more efficient, effectively protect their
IP and trade secrets, and most importantly be more competitive in global markets.
About Interset
Interset provides a highly intelligent and accurate insider and targeted outsider threat
detection solution that unlocks the power of behavioral analytics, machine learning and big
data. Interset provides the fastest, most flexible and affordable way for IT teams of all sizes
to operationalize a data protection program. Utilizing lightweight endpoint sensors, agentless
data collectors, advanced behavioral analytics and an intuitive user interface; Interset provides
unparalleled visibility over sensitive data, enabling early attack detection and actionable
forensic intelligence without false positives or white noise.
For more information, visit www.interset.com and follow us on twitter @intersetca
16 Fitzgerald Road, Suite 150, Ottawa, ON K2H 8R6, Canada
Phone: (613) 226-9445 | Fax: (613) 226-5299
© 2015 Interset Software, Inc. All Rights Reserved. Interset, the Interset logo, FileTrek and the FileTrek logo are trademarks of Interset Software, Inc.
All other logos are the property of their respective owners. The content of this document is subject to change without notice.

More Related Content

What's hot

Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurityscoopnewsgroup
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Gross, Mendelsohn & Associates
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityEMC
 
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...Phil Legg
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixPrachi Joshi
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 

What's hot (20)

Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrix
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 

Viewers also liked

Argie bond quant track record
Argie bond quant track recordArgie bond quant track record
Argie bond quant track recordFrancisco Prack
 
Certificado criatividade e inovação
Certificado  criatividade e inovaçãoCertificado  criatividade e inovação
Certificado criatividade e inovaçãoMônica Sobrenome
 
Social Média
Social MédiaSocial Média
Social MédiaLudi Dls
 
The AAA Method of Program Development
The AAA Method of Program DevelopmentThe AAA Method of Program Development
The AAA Method of Program DevelopmentDanielle Apfelbaum
 
Argie bond quant track record
Argie bond quant track recordArgie bond quant track record
Argie bond quant track recordFrancisco Prack
 
Windows shell integration advanced
Windows shell integration advancedWindows shell integration advanced
Windows shell integration advancedEric Roselier
 
Final Confrontations
Final ConfrontationsFinal Confrontations
Final ConfrontationsBibleTalk.tv
 
Theories daniel chandler
Theories daniel chandlerTheories daniel chandler
Theories daniel chandlerconallenx
 
Social Media Content Generation
Social Media Content GenerationSocial Media Content Generation
Social Media Content GenerationTaylor Hulyksmith
 
VNS INTRODUCTION
VNS INTRODUCTIONVNS INTRODUCTION
VNS INTRODUCTIONTony Nguyen
 

Viewers also liked (12)

Argie bond quant track record
Argie bond quant track recordArgie bond quant track record
Argie bond quant track record
 
Certificado criatividade e inovação
Certificado  criatividade e inovaçãoCertificado  criatividade e inovação
Certificado criatividade e inovação
 
Social Média
Social MédiaSocial Média
Social Média
 
The AAA Method of Program Development
The AAA Method of Program DevelopmentThe AAA Method of Program Development
The AAA Method of Program Development
 
Argie bond quant track record
Argie bond quant track recordArgie bond quant track record
Argie bond quant track record
 
Windows shell integration advanced
Windows shell integration advancedWindows shell integration advanced
Windows shell integration advanced
 
Community and Social Change in ASRH Programs Strategies For Measuring Change
Community and Social Change in ASRH Programs Strategies For Measuring ChangeCommunity and Social Change in ASRH Programs Strategies For Measuring Change
Community and Social Change in ASRH Programs Strategies For Measuring Change
 
navyltr
navyltrnavyltr
navyltr
 
Final Confrontations
Final ConfrontationsFinal Confrontations
Final Confrontations
 
Theories daniel chandler
Theories daniel chandlerTheories daniel chandler
Theories daniel chandler
 
Social Media Content Generation
Social Media Content GenerationSocial Media Content Generation
Social Media Content Generation
 
VNS INTRODUCTION
VNS INTRODUCTIONVNS INTRODUCTION
VNS INTRODUCTION
 

Similar to Interset-advanced threat detection wp

IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET Journal
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfforladies
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS Accelerite
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security reportGabe Akisanmi
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygieneThiagu Haldurai
 

Similar to Interset-advanced threat detection wp (20)

IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
UEBA
UEBAUEBA
UEBA
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot SystemIRJET- Data Security using Honeypot System
IRJET- Data Security using Honeypot System
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS
 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 

More from CMR WORLD TECH

Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCMR WORLD TECH
 
Cpq basics bycesaribeiro
Cpq basics bycesaribeiroCpq basics bycesaribeiro
Cpq basics bycesaribeiroCMR WORLD TECH
 
Questoes processautomation
Questoes processautomationQuestoes processautomation
Questoes processautomationCMR WORLD TECH
 
Aws migration-whitepaper-en
Aws migration-whitepaper-enAws migration-whitepaper-en
Aws migration-whitepaper-enCMR WORLD TECH
 
Delivery readness for pick season and higth volume
Delivery readness for pick season and higth volumeDelivery readness for pick season and higth volume
Delivery readness for pick season and higth volumeCMR WORLD TECH
 
Why digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagementWhy digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagementCMR WORLD TECH
 
Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure CMR WORLD TECH
 
Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance CMR WORLD TECH
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusCMR WORLD TECH
 
Apexand visualforcearchitecture
Apexand visualforcearchitectureApexand visualforcearchitecture
Apexand visualforcearchitectureCMR WORLD TECH
 
Trailblazers guide-to-apps
Trailblazers guide-to-appsTrailblazers guide-to-apps
Trailblazers guide-to-appsCMR WORLD TECH
 
Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1CMR WORLD TECH
 
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_CMR WORLD TECH
 
Salesforce voice-and-tone
Salesforce voice-and-toneSalesforce voice-and-tone
Salesforce voice-and-toneCMR WORLD TECH
 

More from CMR WORLD TECH (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
 
CPQ Básico
CPQ BásicoCPQ Básico
CPQ Básico
 
Cpq basics bycesaribeiro
Cpq basics bycesaribeiroCpq basics bycesaribeiro
Cpq basics bycesaribeiro
 
Apexbasic
ApexbasicApexbasic
Apexbasic
 
Questoes processautomation
Questoes processautomationQuestoes processautomation
Questoes processautomation
 
Process automationppt
Process automationpptProcess automationppt
Process automationppt
 
Transcript mva.cesar
Transcript mva.cesarTranscript mva.cesar
Transcript mva.cesar
 
Aws migration-whitepaper-en
Aws migration-whitepaper-enAws migration-whitepaper-en
Aws migration-whitepaper-en
 
Delivery readness for pick season and higth volume
Delivery readness for pick season and higth volumeDelivery readness for pick season and higth volume
Delivery readness for pick season and higth volume
 
Why digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagementWhy digital-will-become-the-primary-channel-for-b2 b-engagement
Why digital-will-become-the-primary-channel-for-b2 b-engagement
 
Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure Transcript Micrsosft Java Azure
Transcript Micrsosft Java Azure
 
Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance Buisiness UK Trading Marketing Finance
Buisiness UK Trading Marketing Finance
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensus
 
Master lob-e-book
Master lob-e-bookMaster lob-e-book
Master lob-e-book
 
Apexand visualforcearchitecture
Apexand visualforcearchitectureApexand visualforcearchitecture
Apexand visualforcearchitecture
 
Trailblazers guide-to-apps
Trailblazers guide-to-appsTrailblazers guide-to-apps
Trailblazers guide-to-apps
 
Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1Berkeley program on_data_science___analytics_1
Berkeley program on_data_science___analytics_1
 
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
Rep consumer experience_in_the_retail_renaissance_en_28_mar18_final_dm_
 
Salesforce voice-and-tone
Salesforce voice-and-toneSalesforce voice-and-tone
Salesforce voice-and-tone
 

Recently uploaded

SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 

Recently uploaded (20)

2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 

Interset-advanced threat detection wp

  • 1. Advanced Threat Detection A technical overview of how the Interset platform can quickly and accurately alert you to when your sensitive data is under threat.
  • 2. 2 WHITE PAPER – ADVANCED THREAT DETECTION Introduction The sensitive data (Intellectual Property, trade secrets, business plans, MandA data and customer data) of a company represents its most important assets and is a critical component of the company’s ability to compete on a global scale. The loss of this data to either an insider attack, a targeted outside attack, or the negligence of an employee, contractor or partner can be catastrophic and companies are spending thousands and even millions of dollars to protect it. So why are the headlines still full of data loss incidents? It seems that every month a new story of significant data loss makes the headlines and another organization that invested major resources to protect their data is dealing with the fallout of bad PR, fines, and worse potentially large amounts of lost revenue. This white paper explores the challenges of protecting this critical data, examines why existing technologies and approaches to data protection have largely failed and introduces a different approach to protecting sensitive data, like intellectual property (IP) and trade secrets, based on advanced behavioral analytics: the Interset Enterprise Threat Detection Platform. Defining the Risks and Threats to Organizations Regardless of size or vertical, organizations drive competitive advantage and revenue from the sensitive data assets they create or acquire. Many of these organizations are populated by highly skilled and highly valued employees (engineers, software developers, designers, researchers, scientists, and technicians) who work in highly creative and dynamic environments. Almost all organizations have extensive partnerships including; OEM partners, suppliers, dealers, outsources, services firms and sometimes even competitors. Organizations also have a variety of internal end users such as contractors, consultants, and auditors who are not employees, but still have access to critical data. Connecting the high value workers, partners and their work are integrated computing and file share systems that purposely make access to software applications and data both easy and pervasive. Internal end users, whether employees, third parties, or partners have access to sensitive data and are all capable of causing a data compromise either through carelessness, ignorance or malicious activity. The most dangerous and difficult to detect is a malicious insider. Beyond the infamous names of Manning and Snowden, these types of attacks have become so widespread that the FBI has added ‘insider threat’ as a major focus in its counter intelligence effort1 . With over 70% of insider attacks going unreported, US CERT statistics shows that the average cost of an insider attack exceeded $1 Million USD in almost 50% of cases investigated2 . Insider attacks by privileged users of all types define a significant and growing data loss risk to the enterprise. At the same time, companies with valuable data are being targeted by a growing threat of skilled, motivated, organized and often state-funded attackers willing to push the limits on corporate espionage via malware and bribing employees to steal IP. These attackers can avoid investing billions of dollars in costs by stealing the RandD, testing and manufacturing data from established companies. The consequences for legitimate companies are enormous with losses of revenue in the millions from being cut out of foreign markets or price undercutting in existing markets. 1 http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat 2 http://www.cert.org/blogs/insider_threat/2013/12/theft_of_ip_by_insiders.html
  • 3. 3 WHITE PAPER – ADVANCED THREAT DETECTION Defining a New Approach A system that looks holistically across the activities and events of an organization is able to build a series of baselines that define normal business behavior. This system understands the context of normal behavior and provides visibility into IT and operational risk. Further, it searches out events in real-time that do not match normal behavior. These events are the anomalies that represent possible attacks from both insiders and outsiders. When found, alerts are surfaced so that the appropriate individuals can be quickly investigated. This new approach offers significant advantages, such as: • The overall number of alerts and false positives are greatly reduced when compared to DLP or SIEM tools because alerts are based on anomalies as compared to normal baseline behavior. • The information about an alert is presented in the context of the event so that investigators do not waste time trying to correlate who did what, when, and with what file. • The events include the context of the file or files involved, and are not limited by file types so that specialized applications and data types that include IP and trade secrets can be protected. • The sensors that capture the relationships between users, files, and endpoints, are not limited when they are offline or in virtual or cloud environments and can see data moving to mobile devices, eliminating much of the challenges of integrated and new technology. • The system works across all users, whether privileged IT admins, knowledge workers, contractors or partners when deployed in their organization. • Events from an attack, whether from an insider or from an outsider who attempts surreptitious access for the purpose of exfiltration, show up immediately because they trigger anomaly alerts. The analytics engine finds these attacks, and sends an alert as soon as the anomaly is discovered, providing security managers time to react and quick access to information so they can stop the threat before data is compromised. This is the approach used by the Interset Platform, powered by a cutting edge behavioral analytics engine and innovative big data collection and aggregation capabilities.
  • 4. 4 WHITE PAPER – ADVANCED THREAT DETECTION How Interset Works Behavioral Analytics are not new, but applying these proven methodologies for identifying and mitigating risk within security is a paradigm shift. To make behavioral analytics truly effective, a rich set of information must be collected and modelled so that anomalies can be accurately surfaced. The Interset platform is specifically designed to optimize the threat detection process from metadata collection to analytical modeling. Event Data Collection Interset offers multiple agentless and agent-based data collection capabilities and is continually increasing collection capabilities over time to drive ever richer data sets. Agentless data collection starts with specialized Interset connectors that gather data from existing enterprise applications and systems. With a focus on applications where IP and trade secrets are created, managed and stored, Interset connectors collect log data from source code management systems, product lifecycle management systems, enterprise content management systems, identity management systems, and security information and event management (SIEM) systems. Examples of such systems include Perforce, Windchill, SharePoint, Active Directory, and Splunk. Interset also offers a lightweight endpoint sensor that can be deployed across your organization on desktops, laptops, workstations and servers. The collector works at the system level to continuously track data interactions, user events, and system events. Once deployed, interactions are recorded every day, ranging from what applications are opened to whether the user has taken a screenshot of a sensitive document, or attempted to “print to file.” Supported on both Windows and Mac, the Interset endpoint sensor is also designed to work on and offline and maintains a minimal footprint, such that system performance is not affected. Log data collected via a connector or endpoint sensor includes the following fields: user, IP address, timestamp, action (commit, sync, get, etc.), resource (folder, file, path, etc.) and other specialized data fields that may be helpful. This data is then aggregated and stored in Hadoop and retrieved by Apache Spark and Phoenix for analytics. After collection, aggregation, and analysis is completed, the results can be explored via the Interset UI or exported through an open API to SIEM solutions or into a Security Operations Center (SOC). Behavioral Analytics The Interset Behavioral Analytics Engine is driven by two main classes of mathematics; behavioral risk modeling, and entity risk modeling. Behavioral risk models are multivariate math models that take in all available contexts for each event that occur across an organization and combine event and context in a meaningful way to produce a Behavior Risk Score. Entity Risk Models are a second set of math models that drive Entity Risk Scores for Users, Machines and Assets adjusting these risk scores over time based on events that occur. Every entity (user, machine and asset) maintains its own risk score. Assets are most commonly files but can also be applications, source code and other valuable objects. Entity risk models create the normal activity baselines that are then compared against events to determine how anomalous an event is in the behavioral risk model. The connected relationship model between events, behavioral risk, behavioral risk scores, entities and entity risk scores.
  • 5. 5 WHITE PAPER – ADVANCED THREAT DETECTION The Interset Behavioral Analytics Engine sees and understands the relationship between Events and Entities as it observes activities across the organization. The analytics engine builds and maintains irrevocable relationships between entities as events occur. As Interset observes activities and builds relationships, the analytics engine continuously creates and refines metrics that drive behavioral baselines. The engine is able to see each anomalous behavior and connect the dots of a series of behaviors in terms of its context (files touched, application used, machines involved, projects accessed, users involved) to offer a complete picture of the threat as it is occurring. By connecting the events, the Interset Platform creates stories — a series of anomalous events which enables the analytics engine to remove noise and false positives. In addition, through statistical analysis, the engine quantifies just how anomalous an observed behavior is. As usage and anomaly patterns are refined, the analytics engine learns which users create more risk, which files are the most at risk, and which machines are most often part of risky activities. Interset actively maintains a risk score for all of these entities using normalized values. The more an entity is involved in high-risk anomalous activities, the more its risk score will increase. Conversely, an entity that is not involved in high-risk activities, and that doesn’t trigger alerts, will have its risk score decrease over time. When entities are involved in anomaly alerts, the alerts will be presented in a prioritized order based on the risk score. Entities and Risk Entities are defined as users, machines (identities) and assets. A core feature of Interset is its ability to accurately model the risk of all entities in your organization. Entity risk needs to be more than just a simple one-time data classification exercise: entity risk changes over time, and needs to respond automatically over time, to result in a maintainable, scalable system. Tracking user risk enables IT teams to identify persons of interest. For example, as users (or their accounts) exhibit more behavior with indicators of compromise, or their activity starts to show anomalous events (and therefore are possible indicators of an account takeover), or their activity starts to show indications of becoming a leaver (and therefore is statistically prone to IP exfiltration), the user risk score will increase correspondingly to signal a warranted follow up investigation. With Interset, the ability to instantly show the top most risky users in the organization is a very valuable way to focus the investigation team and maintain a scalable process. Such a view shows the users that, among your entire organization, have accumulated the most risk. Clicking on the user then allows you to see the underlying alerts and events that have resulted in the system increasing the user risk score. Machine risk tracks suspicious behaviors that accumulate on certain machines. Are some machines more prone to store important files and become vulnerable to exfiltration? If so, that will be reflected in a high machine risk score. For all machines monitored by an endpoint sensor, Interset will show the machines that are most at risk. This risk can be due to compromise of the machine by malware, usage of the machine by an insider, or high value assets being moved to or stored in machines making them more at risk. The behavior risk score is an aggregate of identity (user or machine), activity, asset, and asset movement risk scores involved in the behavior.
  • 6. 6 WHITE PAPER – ADVANCED THREAT DETECTION Asset risk is a different set of models that identify where important data such as IP or trade secrets have collected within your organization. Having Asset risk tracked through a separate and accurate set of models is important because file contents change over time. Some files, for example, may be highly important and therefore any anomalous behaviors or violations involving those assets should respond more rapidly than other files. Computing a higher importance value for those files compared to others quantifies this relationship. As the Interset platform defines important files, machine learning methods are used to learn common attributes of these files, and discover and identify other, new files that are likely to be important as well. The “vulnerability” of an entity is used to amplify the entity’s importance over time, based on the observed behaviors involving that entity. As every user, file or machine exhibits anomalies, violations and exits, the vulnerability of the entities involved are increased in proportion to the severity and recency of the event. In other words, the more serious the bad event, and the more that happen close together, the more quickly the vulnerability and overall risk score of the entity increases. The relationship of Events, Behavioral Risk and Entity Risk: Three events drive all risk scores higher. The figure above illustrates a simple three event example that shows the relationship between behavioral and entity risk models and how entity risk scores change over time. As J Mason executes three events, the anomalous nature and riskiness of each event creates higher behavioral risk scores. To start, the entity risk scores begin very low, showing little danger across the user, the machine that is logged into and the file that has been accessed. As each event occurs, the behavior and entity risk scores climb. The Interset Behavioral Analytics Engine then surfaces the threat across the event as well as the entities. The derivative file created is also surfaced as it inherits the high risk score of its parent asset. Rules The Interset Platform also utilizes a rules engine, which complements the behavioral analytics engine, and is applied at two points in the threat detection process. The first is prior to full behavioral analysis, and is the point where corporate or compliance policies can be defined in the system. Policies can be defined to govern user access, applications usage including cloud, USB devices, and the access of sensitive files. The alerts based on these policies can be measured against risk thresholds, so that alerts are triggered only when these
  • 7. 7 WHITE PAPER – ADVANCED THREAT DETECTION thresholds are exceeded. Companies can quickly identify prioritized gaps in their existing IT systems and policies through Interset’s visibility into the activities between users, files and devices and the risk measurements Interset applies. Interset rules can also be set to interact directly with the end user whose actions are creating the violation, offering a powerful real-time training and awareness tool to help employees understand and self-correct risky behavior. Reducing noise and false positives Through Interset’s stories approach which are driven by various behavioral and entity risk models, security teams are able to cut through noise and false positive events that currently overwhelm them. As an example — suppose “John Sneakypants” was detected accessing an important network share, an unusual event, given his historical access patterns and/or the patterns of his peers in the same role. This may be suspicious, but it could also be a false positive if John has had a recent role change or has been assigned to a new project. But suppose that John also accessed this file at a time of day that he was never active at before, and that he also just took files from a source code project that had been inactive for months, and that he also copied an unusually large amount of sensitive files to a USB drive. Suddenly, this event is a lot more suspicious. It is this intuition that the entity risk models capture, in real time, via mathematics. This enables the Interset platform to automatically focus in and alert on actual threats, while tuning out the massive amounts of uninteresting noise that overwhelm existing tools and the security teams that operate them. The stories approach can vastly improve an organization’s ability to quickly determine the root cause of a threat and respond proactively before critical data is compromised. Interset Enterprise Risk and Threat Detection Architecture.
  • 8. 8 WHITE PAPER – ADVANCED THREAT DETECTION Proactive Forensics Leveraging end-user behavioral analytics is also key to lowering the cost of the forensic investigations. It illuminates patterns and relationships created by the habits and activities of users and their devices. By capturing the relationships between identities, activities, assets (files and machines), and the movement of the data, an investigation can quickly and accurately identify the information that defines the risk or threat down to the user, application or file in question. Since all activity is captured, a complete historical record of the events related to the threat and all relationships is immediately available. This enables you to reconstruct the activities that led up to the event, automating the reconstruction and loss analysis, compressing the time it takes to determine the root cause and extent of a breach. Forensics are no longer reactive, but rather proactive dramatically lowering the cost to investigate an incident and enable fast pursuit of legal action or policy adjustments to prevent or reduce the risk of a future breach. Use Cases Beyond the protection of intellectual property and trade secrets, the Interset Platform addresses several other use cases: • Employee Resignation The US CERT reports that more than 70% of resigning employees leave with IP, trade secrets and other sensitive business data. Interset captures all end user file level events and when an employee announces their resignation, reports can be quickly generated to see what sensitive data was accessed and where it was moved to. HR departments can include these reports in their exit interviews and take effective action to eliminate this common data loss risk. Similarly, when employees have not yet announced their resignation but have planned to leave with malicious intent, the Interset Platform captures the behavioral changes of such users and can alert security and HR to prevent data exfiltration. With its unique and extensive visibility, Interset can see and capture all sensitive file movements involving, USB devices, cloud environments, and also whether the machine is on or off the corporate network or completely offline. • IT Controls/Policy Violations Risks from improper application usage, improper file access and storage, usage of unauthorized cloud storage systems are all captured by Interset and can be easily seen through the Interset UI. Common risks like USB device usage, web mail attachments and employees emailing work home is also captured. It is very common for scientists, researchers and technicians to “bring their work home,” and in some cases even approved, but Interset can provide an understanding of how users are moving the data home and what risk they are creating when they do. One Life Sciences customer had an IT control on Outlook attachment size to minimize storage and help with some compliance regulations. Interset quickly showed that employees were bypassing the control by attaching large files to webmail and using that for data transfer to other employees and partners creating even greater risk of data loss and non-compliance. • Education Interset also supports the notion that your best data security tool is an educated employee. This is especially true in highly creative and open industries. When Interset recognizes that a user is violating a policy or taking an unusual risk, real-time notifications detailing what the violation or risk is and alternative paths the employee can choose are immediately sent to the user. Education on corporate policy, awareness of new risks and self-remediation on improper activity represent the most effective IT control available.
  • 9. 9 WHITE PAPER – ADVANCED THREAT DETECTION Conclusion Using the science of Behavioral Analytics, Interset helps IP and trade secret centric companies and partners gain visibility into what is truly happening across their collaborative enterprise. The ability to detect risky user behaviors, processes, and controls enable companies to quickly detect and take action on anomalies that represent insider and outsider threats. This level of risk visibility and detection provides you with the power to secure high-value intellectual property and trade secrets, as well as other sensitive business data. Interset’s innovative approach offers significant advantages, including; • Reducing noise and false positives so that security teams can focus on material risks and actual threats • Reducing the time required to forensically investigate a risky event or anomaly • Expanding protection to include all types of IP and trade secrets including specialized design, engineering, PLM and source code management applications • Expanding protection to endpoints, whether they are on the corporate network or offline • Accurately detecting insider and outside attacks during their early stages, enabling the attack to be stopped before sensitive data is compromised These advantages reduce the overall cost and complexity of a threat detection and data protection program while increasing a security team’s ability to reduce risk and surface actual threats to the organization. In doing this, Interset enables security teams and companies of all sizes to be more efficient, effectively protect their IP and trade secrets, and most importantly be more competitive in global markets.
  • 10. About Interset Interset provides a highly intelligent and accurate insider and targeted outsider threat detection solution that unlocks the power of behavioral analytics, machine learning and big data. Interset provides the fastest, most flexible and affordable way for IT teams of all sizes to operationalize a data protection program. Utilizing lightweight endpoint sensors, agentless data collectors, advanced behavioral analytics and an intuitive user interface; Interset provides unparalleled visibility over sensitive data, enabling early attack detection and actionable forensic intelligence without false positives or white noise. For more information, visit www.interset.com and follow us on twitter @intersetca 16 Fitzgerald Road, Suite 150, Ottawa, ON K2H 8R6, Canada Phone: (613) 226-9445 | Fax: (613) 226-5299 © 2015 Interset Software, Inc. All Rights Reserved. Interset, the Interset logo, FileTrek and the FileTrek logo are trademarks of Interset Software, Inc. All other logos are the property of their respective owners. The content of this document is subject to change without notice.