Sei sulla pagina 1di 32

QRadar SIEM

Product Overview

Presented by: Shoaib Abbasi


Lead – Security Solutions
QRadar Family

Intelligent, Integrated, Automated

QRadar QRadar
QRadar QRadar QRadar
Log Risk
SIEM QFlow VFlow
Manager Manager

Security Intelligence Operating System

Providing complete network and security


intelligence, delivered simply, for any customer

2
QRadar SIEM
Overview

QRadar SIEM provides full visibility and actionable insight


to protect networks and IT assets from a wide range of
advanced threats, while meeting critical compliance
mandates.

Key Capabilities:
• Sophisticated correlation of events, flows, assets, topologies,
vulnerabilities and external data to identify & prioritize threats
• Network flow capture and analysis for deep application insight
• Workflow management to fully track threats and ensure resolution
• Scalable architecture to support the largest deployments

3
QRadar SIEM
Benefits

Reduce the risk and severity of security


breaches

Remediate security incidents faster and


more thoroughly

Ensure regulatory and internal policy


compliance

Reduce manual effort of security


intelligence operations

4
QRadar SIEM
Key Advantages

• Real-time activity correlation based on advanced in-


memory technology and widest set of contextual data
• Flow capture and analysis that delivers Layer 7 content
visibility and supports deep forensic examination
• Intelligent incident analysis that reduces false positives
and manual effort
• Unique combination of fast free-text search and
analysis of normalized data
• Scalability for world’s largest deployments, using an
embedded database and unified data architecture

5
QRadar SIEM
Market Success

• “Leader” in Gartner SIEM Magic Quadrant


• Ranked #1 product for Compliance needs by Gartner
• Only SIEM product that incorporates network behavior
anomaly detection (NBAD)
• Industry awards include:
• Global Excellence in Surveillance Award from InfoSecurity
Products Guide
• “Hot Pick” by Information Security magazine
• GovernmentVAR 5-Star Award

6
QRadar SIEM
Product Tour: Integrated Console

• Single browser-based UI
• Role-based access to
information & functions
• Customizable dashboards
(work spaces) per user
• Real-time & historical
visibility and reporting
• Advanced data mining and drill down
• Easy to use rules engine with out-of-the-box security intelligence

7
QRadar SIEM
Product Tour: Data Reduction & Prioritization

Previous 24hr period of


network and security
activity (2.7M logs)

QRadar correlation &


analysis of data creates
offenses (129)

Offenses are a complete


history of a threat or
violation with full context
about accompanying
network, asset and user
identity information

Offenses are further


prioritized by business
impact

8
QRadar SIEM
Product Tour: Intelligent Offense Scoring

QRadar judges “magnitude” of offenses:


• Credibility:
A false positive or true positive?
• Severity:
Alarm level contrasted
with target vulnerability
• Relevance:
Priority according to asset or
network value
Priorities can change over
time based on situational
awareness

9
QRadar SIEM
Product Tour: Offense Management
Clear, concise and comprehensive delivery of relevant information:

What was
the attack?

Was it
Who was successful?
responsible?

Where do I
find them? How valuable
How many are the targets to
targets the business?
involved?

Are any of them


vulnerable?

Where is all
the evidence?

10
QRadar SIEM
Product Tour: Out-of-the-Box Rules & Searches
Default log queries/views
1000’s of real-time correlation
rules and analysis tests

100’s of out-of-the-box searches


and views of network activity and
log data
 Provides quick access to critical
information

Custom log fields


 Provides flexibility to extract log
data for searching, reporting and
dashboards. Product ships with
dozens of pre-defined fields for
common devices.

11
QRadar SIEM
Product Tour: Flows for Network Intelligence

• Detection of day-zero attacks that have no signature


• Policy monitoring and rogue server detection
• Visibility into all attacker communication
• Passive flow monitoring builds asset profiles & auto-classifies hosts
• Network visibility and problem solving (not just security related)

12
QRadar SIEM
Product Tour: Flows for Application Visibility

• Flow collection from native infrastructure


• Layer 7 data collection and analysis
• Full pivoting, drill down and data mining on flow sources for
advanced detection and forensic examination
• Visibility and alerting according to rule/policy, threshold, behavior or
anomaly conditions across network and log activity

13
QRadar SIEM
Product Tour: Compliance Rules and Reports

• Out-of-the-box templates for


specific regulations and best
practices:
• COBIT, SOX, GLBA, NERC,
FISMA, PCI, HIPAA, UK GCSx

• Easily modified to include new


definitions
• Extensible to include new
regulations and best practices

• Can leverage existing


correlation rules

14
QRadar SIEM
Use Cases

QRadar SIEM excels at the most challenging use cases:

Complex threat detection

Malicious activity identification

User activity monitoring

Compliance monitoring

Fraud detection and data loss prevention

Network and asset discovery

15
QRadar SIEM
Use Case: Complex Threat Detection

Problem Statement Required Visibility


• Finding the single needle in • Normalized event data
the ‘needle stack’ • Asset knowledge
• Connecting patterns across
• Vulnerability context
many data silos and huge
volumes of information • Network telemetry
• Prioritizing attack severity
against target value and
relevance
• Understanding the impact of
the threat

16
QRadar SIEM
Use Case: Complex Threat Detection

Sounds Nasty…
But how do we know this?
The evidence is a single click
away.

Network Scan Buffer Overflow


Detected by QFlow Exploit attempt seen by Snort

Total Security Intelligence


Targeted Host Vulnerable
Convergence of Network, Event and Vulnerability data
Detected by Nessus

17
QRadar SIEM
Use Case: Malicious Activity Identification

Problem Statement Required Visibility


• Distributed infrastructure • Distributed detection sensors
• Security blind spots in the • Pervasive visibility across
network enterprise
• Malicious activity that • Application layer knowledge
promiscuously seeks ‘targets • Content capture for impact
of opportunity’ analysis
• Application layer threats and
vulnerabilities
• Siloed security telemetry
• Incomplete forensics

18
QRadar SIEM
Use Case: Malicious Activity Identification

Potential Botnet Detected?


This is as far as traditional SIEM can go.

IRC on port 80?


QFlow enables detection of a covert
channel.

Irrefutable Botnet Communication


Layer 7 data contains botnet command and control
instructions.

19
QRadar SIEM
Use Case: User Activity Monitoring

Problem Statement Required Visibility


• Monitoring of privileged and • Centralized logging and
non-privileged users intelligent normalization
• Isolating ‘Stupid user tricks’ • Correlation of IAM information
from malicious account activity with machine and IP
addresses
• Associating users with
machines and IP addresses • Automated rules and alerts
• Normalizing account and user focused on user activity
information across diverse monitoring
platforms

20
QRadar SIEM
Use Case: User Activity Monitoring

Authentication Failures
Perhaps a user who forgot his/her
password?

Brute Force Password


Attack
Numerous failed login attempts against
different user accounts

Host Compromised
All this followed by a successful login.
Automatically detected, no custom
tuning required.

21
QRadar SIEM
Use Case: Compliance Monitoring

Problem Statement Required Visibility


• Validating your monitoring • Application layer visibility
efforts against compliance • Visibility into network
requirements segments where logging is
• Ensuring that compliance problematic
goals align with security goals
• Logs alone don’t meet
compliance standards

22
QRadar SIEM
Use Case: Compliance Monitoring

PCI Compliance
at Risk?

Unencrypted Traffic
Compliance Simplified QFlow saw a cleartext service running on the
Out of the box support for all major Accounting server.
compliance and regulatory standards.
PCI Requirement 4 states: Encrypt transmission
of cardholder data across open, public networks

23
QRadar SIEM
Use Case: Fraud & Data Loss Prevention

Problem Statement Required Visibility


• Validating your monitoring • Application layer visibility
efforts against compliance • Visibility into network
requirements segments where logging is
• Ensuring that compliance problematic
goals align with security goals
• Logs alone don’t meet
compliance standards

24
QRadar SIEM
Use Case: Fraud & Data Loss Prevention
Potential Data Loss?
Who? What? Where?

Who?
An internal user

What?
Oracle data

Where?
Gmail

25
QRadar SIEM
Use Case: Network and Asset Discovery

Problem Statement Required Capability


• Integration of asset information • Real-time knowledge of all
into security monitoring assets on a network
products is labor intensive • Visibility into asset
• Assets you don’t know about communication patterns
pose the greatest risk
• Classification of asset types
• Asset discovery and • Tight integration into pre-
classification is a key tenet of defined rules
many compliance regulations
• False positive noise
jeopardizes effectiveness of a
SIEM solution

26
QRadar SIEM
Use Case: Network and Asset Discovery

Automatic Asset Discovery


Creates host profiles as network activity is
seen to/from

Passive Asset Profiling


Identifies services and ports on hosts by
watching network activity

Server Discovery
Identifies & classifies server infrastructure
based on these asset profiles

Correlation on new assets & services


Rules can fire when new assets and
services come online

Enabled by QRadar QFlow and


QRadar VFlow
27
QRadar SIEM
Case Study: Fortune 500 Defense Company

Customer • Fortune 500 defense and aerospace systems company


• 70,000 employees worldwide

Business • Protect a complex, geographically dispersed network from


Challenge advanced threats
• Provide scalability for massive event volumes

Q1 Labs • 40 QRadar appliances, architected to support 70,000 EPS (6


Solution billion events per day), with bursts over 100,000 EPS.
• 4,000 devices being logged
• Aggregation of all NetFlow data combined with application
layer analysis from QFlow in critical data centers
• 24x7 SOC support for 20 security operations specialists
• Data analysis focused on detection of advanced persistent
threats, malware and out-of-policy behavior

28
QRadar SIEM
Case Study: $100B US Manufacturer

Customer • $100B private US manufacturer (Fortune 10 equivalent)


• 125,000+ employees in 65 countries
• One of the world’s largest SAP deployments

Business • Enhance security and risk posture across thousands of


Challenge devices and resources, spanning hundreds of locations
• Support extremely high event volumes

Q1 Labs • More than 40 QRadar appliances deployed


Solution • Forming a single federated solution covering IDS/IPS,
wireless, IAM, databases, servers, core switches and more
• Monitors SAP and SCADA systems across 1,000 plant
locations
• Deployment seamlessly spans security, network, applications
and operations teams

29
QRadar SIEM
Case Study: Fortune 5 Energy Company

Customer • Fortune 5 energy company


• 50,000+ employees worldwide

Business • Ensure compliance with PCI-DSS, NERC and numerous


Challenge regulations in other countries
• Monitor and make sense of 2 billion log events daily

Q1 Labs
• 30 QRadar systems deployed globally as a federated solution
Solution
• Identify 25-50 high priority offenses out of 2 billion daily events
• Protect 10,000 network devices, 10,000 servers and 80,000
user endpoints
• Monitor 6 million card swipes per day for PCI compliance
• Ensure security of SCADA systems for NERC compliance

30
QRadar SIEM
Intelligent, Integrated and Automated

• Intelligent offense management


• Layer 7 application visibility
• Identifies most critical anomalies

• Distributed architecture
• Easy deployment
• Highly scalable
• Rapid time to value
• Analyze logs, flows,
• Operational efficiency
assets and more

31
QRadar SIEM
Summary

QRadar SIEM delivers full visibility


and actionable insight for
Total Security Intelligence.

Deepest Content Broadest Greatest


Insight Correlation Scalability

Providing complete network and security


intelligence, delivered simply, for any customer

32

Potrebbero piacerti anche