LogRhythm Cyber Security in Enterprise Presentation
-
Upload
paul-sweeney -
Category
Technology
-
view
463 -
download
1
Transcript of LogRhythm Cyber Security in Enterprise Presentation
![Page 1: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/1.jpg)
Threat Lifecycle Management
![Page 2: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/2.jpg)
Why?
![Page 3: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/3.jpg)
2009 2010 2011 2012 2013 2014
cyber incidents
Source: PwC, The Global State of Information Security Survey 2015
2017?2016?2015?
detected 42.8 million
![Page 4: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/4.jpg)
“84% of breach evidence resided in the log data.”
Verizon Data Breach Investigation Report
“By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches up from less than 10% in 2013.”
- Neil MacDonald, Gartner
![Page 5: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/5.jpg)
Why?Faster Detection & Response Reduces Risk
![Page 6: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/6.jpg)
Mean Time To Detect
™
![Page 7: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/7.jpg)
Mean Time To Respond
™
![Page 8: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/8.jpg)
Months Weeks Days Hours Minutes
High
Low
MTTD & MTTR
Chance ofSignificant Breach
![Page 9: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/9.jpg)
Reconnaissan
ceInitial
CompromiseCommand & Control
Lateral Movement
Target Attainment ExfiltrationCommand
& ControlLateral
MovementTarget
Attainment Exfiltration
By reducing MTTD and MTTR LogRhythm’s Security Intelligence Platform helps break the kill chain.
Early neutralisation equals no damaging cyber incident or data breach.
![Page 10: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/10.jpg)
Anatomy Of An Attack
![Page 11: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/11.jpg)
![Page 12: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/12.jpg)
![Page 13: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/13.jpg)
![Page 14: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/14.jpg)
XM
SmartResponseTM
![Page 15: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/15.jpg)
Spear-phishing
Attack email received
Threat Intelligence
Malware Installed
(malicious PDF)
User & Endpoint Analytics
Network reconnaissanc
e(port scan)
Network Analytics
Threat Intelligence
Brute Force Attack
User Analytics
LogRhythm SmartResponse
™
Incident Management
Holistic Analytics
People & Process
00:09.07 00:09.40 00:09.52 00:10.02 00:10.12
![Page 16: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/16.jpg)
Threat Lifecycle Management™TIME TO
RESPOND
SecurityEvent Data
Log &Machine Data
Forensic Sensor Data
Forensic Data
Analyze the threat
and associated
risk, determine
if an incident has or is occurring
Investigate Mitigate
Implement counter-
measures and
controls that
mitigate the risk
presented by
the threat
Qualify
Assess threat,
determine if it poses risk and
whether a full
investigation
is required
Machine Analytics
DiscoverUser
Analytics
TIME TO DETECT
Recover
Eradicate Cleanup ReportReview Adapt
![Page 17: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/17.jpg)
![Page 18: LogRhythm Cyber Security in Enterprise Presentation](https://reader035.fdocuments.us/reader035/viewer/2022081503/589fc66e1a28ab91398b5dc3/html5/thumbnails/18.jpg)
Thank You