Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst,...

Post on 14-Dec-2015

214 views 1 download

Tags:

Transcript of Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst,...

Security intelligence: solving the puzzle for actionable insight

Fran HowarthSenior analyst, security

Bloor Research

telling the right storyConfidential © Bloor Research 2014

http://www.logrhythm.com/resources/resource-library/analyst-reports.aspx

telling the right storyConfidential © Bloor Research 2014

The situation today

“It is not if, but when and how often”

$

$ $ $

$

Targeted Sophisticated Well-resourced

telling the right storyConfidential © Bloor Research 2014

Today’s security imperative

Prevention

Detection

Response

telling the right storyConfidential © Bloor Research 2014

Prevention alone is not enough

Prevention

Detection

Response

telling the right storyConfidential © Bloor Research 2014

Impact of malicious breaches

telling the right storyConfidential © Bloor Research 2014

Detection is the new imperative

Prevention

Detection

Response

telling the right storyConfidential © Bloor Research 2014

Malicious breaches take time to discover

telling the right storyConfidential © Bloor Research 2014

From detection to containment

telling the right storyConfidential © Bloor Research 2014

Where remediation falls short

Prevention

Detection

Response

telling the right storyConfidential © Bloor Research 2014

Time taken to resolve a breach

telling the right storyConfidential © Bloor Research 2014

The role of security intelligence platforms

telling the right storyConfidential © Bloor Research 2014

Most cost-effective security tools

telling the right storyConfidential © Bloor Research 2014

Core capabilities

Log management and analysis

Advanced analytics

Continuous monitoring

Automated remediation

Forensics

Actionableintelligence

telling the right storyConfidential © Bloor Research 2014

Sample use cases

Advanced threat management

Compliance management

Continuous monitoring

Forensic investigation

Fraud detection

Insider threat detection

Monitoring of remote facilities

Network behaviour anomaly detection

Support for multiple locations

Web application defence