SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Securely explore your data
SQRRL WEBINAR
Reducing “Mean Time to Know”
© 2015 Sqrrl | All Rights Reserved 2
YOUR WEBINAR HOSTS
•  Sqrrl cofounder / VP Business Development
•  Former Director of Cybersecurity at the
National Security Council Staff / White House
•  Degrees from Wharton and Harvard
•  Sqrrl VP Products
•  Former Director of Product Management at
Vertica, Imprivata, and DataSynapse
•  CS degree from MIT
© 2015 Sqrrl | All Rights Reserved
From securing the country to securing your enterprise
SQRRL HISTORY
Google’s
BigTable
Paper
2006
NSA Builds
Accumulo
2008
Sqrrl
Founded
2012
Sqrrl
Enterprise
1.0
2013
Sqrrl
Enterprise
2.0
2015
Investors: Patented Technology:
3
© 2015 Sqrrl | All Rights Reserved
Sqrrl’s focus today is on Detection and Analysis (i.e., cybersecurity
investigations)
INCIDENT RESPONSE LIFECYCLE
4
Source: NIST
© 2015 Sqrrl | All Rights Reserved 5
CYBERSECURITY INVESTIGATIONS TAXONOMY
Cybersecurity
Investigations
Detection Analysis
Hunting /
IOCs
Threat
Intelligence
Alerting
Alert
Resolution
Incident
Triage
Root Cause /
Forensics
Rule-Based Algorithmic
© 2015 Sqrrl | All Rights Reserved
How do we decrease Mean Time To Know?
MEAN TIME TO KNOW
Mean Time To Identify (MTTI): Detect
than an incident has occurred
Mean Time To Know (MTTK):
Understand root cause of an incident
25%
75%
MTTK
MTTI
% Time Spent on MTTI vs. MTTK
Source: Ponemon Institute
6
© 2015 Sqrrl | All Rights Reserved
Sqrrl MTTK Case Study
Large Telecommunications Company
Results
Challenge Sqrrl Solution
Ensured
compliance with
data security
regulations
Reduce
investigation time
from days/weeks to
minutes
Visibility across
more data than
previously possible
Analyzing more than 1 year of
multi-structured security data including
for Advanced Persistent (APT), fraud,
and insider threats
•  Aggregate and store all data
•  Gather and profile employee
and device behaviors
•  Search, query and analyze
behaviors, details and anomalies
7
© 2015 Sqrrl | All Rights Reserved 8
TOP 5 WAYS TO REDUCE MTTK
1.  Big Data
2.  Linked Data Visualization
3.  Graph Exploration
4.  Investigation Workflow
5.  Advanced Analytics
© 2015 Sqrrl | All Rights Reserved 9
#1 BIG DATA
Current solutions can’t
easily handle the variety
and volume of data that
security analysts need
Volume and Variety of Data
© 2015 Sqrrl | All Rights Reserved 10
Performance Measures
#1 BIG DATA
Source: http://www.pdl.cmu.edu/SDI/2013/slides/
big_graph_nsa_rd_2013_56002v1.pdf
Source: http://arxiv.org/pdf/1406.4923v1.pdf
•  Sqrrl indexes and
stores 25,000 events
per second per node
•  Sqrrl’s core has
proven near-linear
scalability to 2000+
nodes
•  Clustered support for
processing Trillions
of events per day
Data Source Record Count
Ne#low	
   2,109,409,060	
  
Cisco	
  ASA	
  Firewall	
   2,982,124,483	
  
Websense	
   924,819,607	
  
MsDns	
   503,237,033	
  
IsaFw	
   207,834,546	
  
IIS	
   38,941,968	
  
Damballa	
   16,060	
  
Apache	
  Webserver	
   5,615,832	
  
ISE	
   671,006	
  
Radius	
   1,138,001	
  
Windows	
  Events	
   12,220,081	
  
Symantec	
  EP	
   1,040,871	
  
FireEye	
   4,305	
  
Total	
  Records	
   6,787,072,853	
  
Node	
  *	
  Seconds	
   	
  271,800	
  	
  
Records/Second/Node	
   	
  24,971	
  	
  
© 2015 Sqrrl | All Rights Reserved 11
#2 LINKED DATA VISUALIZATION
LOGS
VS.
LINKED DATA
© 2015 Sqrrl | All Rights Reserved
LINKED DATA
•  Organizes data into entities
and relationships (links)
•  More intuitive visualization
•  Surfaces meaning & context
•  Enables faster analysis
12
© 2015 Sqrrl | All Rights Reserved 13
LINKED DATA VISUALIZATION DEMO
© 2015 Sqrrl | All Rights Reserved 14
Pattern Discovery and Matching
#3 GRAPH EXPLORATION
•  Hunting for known patterns
•  Search for the HTTP transaction “triangle”
•  Locate specific instance quickly amongst large volume of transactions
© 2015 Sqrrl | All Rights Reserved 15
GRAPH EXPLORATION DEMO
© 2015 Sqrrl | All Rights Reserved 16
It is easy to get lost in a maze of searches during an investigation
#4 INVESTIGATION WORKFLOW
© 2015 Sqrrl | All Rights Reserved 17
INVESTIGATION WORKFLOW DEMO
© 2015 Sqrrl | All Rights Reserved 18
#5 ADVANCED ANALYTICS
Peer Group
Outlier
Algorithmic approaches to anomaly detection
© 2015 Sqrrl | All Rights Reserved 19
ADVANCED ANALYTICS DEMO
© 2015 Sqrrl | All Rights Reserved 20
www.sqrrl.com
HOW TO LEARN MORE?
• Read our white paper or product paper
• Schedule a demo or proof of concept
• Request a VM or evaluation software

Más contenido relacionado

La actualidad más candente

Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera, Inc.
 

La actualidad más candente (13)

Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spot
 
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Data Tools and the Data Scientist Shortage
Data Tools and the Data Scientist ShortageData Tools and the Data Scientist Shortage
Data Tools and the Data Scientist Shortage
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
 
Modern Honey Network at Bay Area Open Source Security Hackers
Modern Honey Network at Bay Area Open Source Security HackersModern Honey Network at Bay Area Open Source Security Hackers
Modern Honey Network at Bay Area Open Source Security Hackers
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Hopper energyservices
Hopper energyservicesHopper energyservices
Hopper energyservices
 
Apache Spot
Apache SpotApache Spot
Apache Spot
 

Similar a Reducing Mean Time to Know

Similar a Reducing Mean Time to Know (20)

Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
How to Build Continuous Ingestion for the Internet of Things
How to Build Continuous Ingestion for the Internet of ThingsHow to Build Continuous Ingestion for the Internet of Things
How to Build Continuous Ingestion for the Internet of Things
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solution
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps Platform
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber Solution
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Building a Security Operations Center
Building a Security Operations CenterBuilding a Security Operations Center
Building a Security Operations Center
 
Building+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.pptBuilding+a+Security+Operations+Center.ppt
Building+a+Security+Operations+Center.ppt
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionCisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 
RapidScale Virtualization GPU Compute
RapidScale Virtualization GPU ComputeRapidScale Virtualization GPU Compute
RapidScale Virtualization GPU Compute
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
Transform your organization with cisco cloud
Transform your organization with cisco cloudTransform your organization with cisco cloud
Transform your organization with cisco cloud
 
A Connected Data Landscape: Virtualization and the Internet of Things
A Connected Data Landscape: Virtualization and the Internet of ThingsA Connected Data Landscape: Virtualization and the Internet of Things
A Connected Data Landscape: Virtualization and the Internet of Things
 

Más de Sqrrl

Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
Sqrrl
 

Más de Sqrrl (20)

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
 
What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 
Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in Accumulo
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Último (20)

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Reducing Mean Time to Know

  • 1. Securely explore your data SQRRL WEBINAR Reducing “Mean Time to Know”
  • 2. © 2015 Sqrrl | All Rights Reserved 2 YOUR WEBINAR HOSTS •  Sqrrl cofounder / VP Business Development •  Former Director of Cybersecurity at the National Security Council Staff / White House •  Degrees from Wharton and Harvard •  Sqrrl VP Products •  Former Director of Product Management at Vertica, Imprivata, and DataSynapse •  CS degree from MIT
  • 3. © 2015 Sqrrl | All Rights Reserved From securing the country to securing your enterprise SQRRL HISTORY Google’s BigTable Paper 2006 NSA Builds Accumulo 2008 Sqrrl Founded 2012 Sqrrl Enterprise 1.0 2013 Sqrrl Enterprise 2.0 2015 Investors: Patented Technology: 3
  • 4. © 2015 Sqrrl | All Rights Reserved Sqrrl’s focus today is on Detection and Analysis (i.e., cybersecurity investigations) INCIDENT RESPONSE LIFECYCLE 4 Source: NIST
  • 5. © 2015 Sqrrl | All Rights Reserved 5 CYBERSECURITY INVESTIGATIONS TAXONOMY Cybersecurity Investigations Detection Analysis Hunting / IOCs Threat Intelligence Alerting Alert Resolution Incident Triage Root Cause / Forensics Rule-Based Algorithmic
  • 6. © 2015 Sqrrl | All Rights Reserved How do we decrease Mean Time To Know? MEAN TIME TO KNOW Mean Time To Identify (MTTI): Detect than an incident has occurred Mean Time To Know (MTTK): Understand root cause of an incident 25% 75% MTTK MTTI % Time Spent on MTTI vs. MTTK Source: Ponemon Institute 6
  • 7. © 2015 Sqrrl | All Rights Reserved Sqrrl MTTK Case Study Large Telecommunications Company Results Challenge Sqrrl Solution Ensured compliance with data security regulations Reduce investigation time from days/weeks to minutes Visibility across more data than previously possible Analyzing more than 1 year of multi-structured security data including for Advanced Persistent (APT), fraud, and insider threats •  Aggregate and store all data •  Gather and profile employee and device behaviors •  Search, query and analyze behaviors, details and anomalies 7
  • 8. © 2015 Sqrrl | All Rights Reserved 8 TOP 5 WAYS TO REDUCE MTTK 1.  Big Data 2.  Linked Data Visualization 3.  Graph Exploration 4.  Investigation Workflow 5.  Advanced Analytics
  • 9. © 2015 Sqrrl | All Rights Reserved 9 #1 BIG DATA Current solutions can’t easily handle the variety and volume of data that security analysts need Volume and Variety of Data
  • 10. © 2015 Sqrrl | All Rights Reserved 10 Performance Measures #1 BIG DATA Source: http://www.pdl.cmu.edu/SDI/2013/slides/ big_graph_nsa_rd_2013_56002v1.pdf Source: http://arxiv.org/pdf/1406.4923v1.pdf •  Sqrrl indexes and stores 25,000 events per second per node •  Sqrrl’s core has proven near-linear scalability to 2000+ nodes •  Clustered support for processing Trillions of events per day Data Source Record Count Ne#low   2,109,409,060   Cisco  ASA  Firewall   2,982,124,483   Websense   924,819,607   MsDns   503,237,033   IsaFw   207,834,546   IIS   38,941,968   Damballa   16,060   Apache  Webserver   5,615,832   ISE   671,006   Radius   1,138,001   Windows  Events   12,220,081   Symantec  EP   1,040,871   FireEye   4,305   Total  Records   6,787,072,853   Node  *  Seconds    271,800     Records/Second/Node    24,971    
  • 11. © 2015 Sqrrl | All Rights Reserved 11 #2 LINKED DATA VISUALIZATION LOGS VS. LINKED DATA
  • 12. © 2015 Sqrrl | All Rights Reserved LINKED DATA •  Organizes data into entities and relationships (links) •  More intuitive visualization •  Surfaces meaning & context •  Enables faster analysis 12
  • 13. © 2015 Sqrrl | All Rights Reserved 13 LINKED DATA VISUALIZATION DEMO
  • 14. © 2015 Sqrrl | All Rights Reserved 14 Pattern Discovery and Matching #3 GRAPH EXPLORATION •  Hunting for known patterns •  Search for the HTTP transaction “triangle” •  Locate specific instance quickly amongst large volume of transactions
  • 15. © 2015 Sqrrl | All Rights Reserved 15 GRAPH EXPLORATION DEMO
  • 16. © 2015 Sqrrl | All Rights Reserved 16 It is easy to get lost in a maze of searches during an investigation #4 INVESTIGATION WORKFLOW
  • 17. © 2015 Sqrrl | All Rights Reserved 17 INVESTIGATION WORKFLOW DEMO
  • 18. © 2015 Sqrrl | All Rights Reserved 18 #5 ADVANCED ANALYTICS Peer Group Outlier Algorithmic approaches to anomaly detection
  • 19. © 2015 Sqrrl | All Rights Reserved 19 ADVANCED ANALYTICS DEMO
  • 20. © 2015 Sqrrl | All Rights Reserved 20 www.sqrrl.com HOW TO LEARN MORE? • Read our white paper or product paper • Schedule a demo or proof of concept • Request a VM or evaluation software