Security Intelligence Extension - Understanding big data ... · Analyze structured data and...

1
THE RESULTS Analyze All Assets in Motion Analyze structured data and emerging unstructured sources to proactively identify and correlate incidents and deliver insight. Send real-time alerts for predefined behaviors and events. Quickly ingest, analyze and correlate information as it arrives from thousands of big data sources or store for historical analysis in a Hadoop platform. Understand Access Through Disparate Sources and the Internet Highlight potential attack vectors by constantly analyzing the various ways applications, networks, databases, mobile devices and more can be accessed from inside and outside the enterprise. Monitor Activities with Enhanced Insights Establish better security by integrating security systems—enabling deeper insights into behaviors throughout the enterprise. Discover New Types of Threats Analyze rapidly growing new sources of unstructured, streaming and raw data to uncover non-obvious and new threats such as advanced persistent threats, cyber attacks, hacktivism and fraud emerging from more sophisticated attackers. Fix and Prevent Internal Breaches Reduce the risk and growing cost of data and intellectual property loss by insiders— whether intentional theft or human error. Respond to Events in Real Time Complete real-time analysis of big data— including unstructured sources such as social, video and sensors—to identify and respond to suspicious deviations from baseline behaviors. Detect Fraud & Criminal Activities Actively hunt attackers and expose criminal activities occurring in rising numbers across disparate physical and cyber sources. Recognize Patterns in Interactions Create a baseline of activity for cyber traffic and physical movements to identify deviations from normal behavior, then determine which deviations are meaningful to help detect attacks in progress. Understand, Predict & Act • Extend security to include all points of data interaction • Integrate technologies to ingest and analyze more data • Utilize new insights for better decision making • Understand risks and threats in seconds instead of hours • Reduce billions of security events to an actionable set WHAT DO YOU NEED TO SUCCEED? Continually Filter and Expose Observe unearthed insights in real time to filter out false positives and expose false negatives or store information for additional analysis. Security Intelligence Extension The traditional approach to security is to build and stand guard on a wall protecting the most valuable enterprise assets . In a big data world, however, threats are rapidly multiplying, originating across enterprise walls and taking new forms—making them harder to identify and defend against. Enforcing a perimeter and reacting to events are no longer sufficient. Organizations need to analyze and correlate all available streaming and historical data to continuously identify threats—and act in real time to protect all physical and cyber assets.

Transcript of Security Intelligence Extension - Understanding big data ... · Analyze structured data and...

Page 1: Security Intelligence Extension - Understanding big data ... · Analyze structured data and emerging unstructured sources to proactively identify and correlate incidents and deliver

THE RESULTS

Analyze All Assets in MotionAnalyze structured data and emerging unstructured sources to proactively identify and correlate incidents and deliver insight. Send real-time alerts for predefined behaviors and events. Quickly ingest, analyze and correlate information as it arrives from thousands of big data sources or store for historical analysis in a Hadoop platform.

Understand Access Through Disparate Sources and the InternetHighlight potential attack vectors by constantly analyzing the various ways applications, networks, databases, mobile devices and more can be accessed from inside and outside the enterprise.

Monitor Activities with Enhanced InsightsEstablish better security by integrating security systems—enabling deeper insights into behaviors throughout the enterprise.

Discover New Types of ThreatsAnalyze rapidly growing new sources of unstructured, streaming and raw data to uncover non-obvious and new threats such as advanced persistent threats, cyber attacks, hacktivism and fraud emerging from more sophisticated attackers.

Fix and Prevent Internal BreachesReduce the risk and growing cost of data and intellectual property loss by insiders— whether intentional theft or human error.

Respond to Events in Real TimeComplete real-time analysis of big data— including unstructured sources such as social, video and sensors—to identify and respond to suspicious deviations from baseline behaviors.

Detect Fraud & Criminal ActivitiesActively hunt attackers and expose criminal activities occurring in rising numbers across disparate physical and cyber sources.

Recognize Patterns in InteractionsCreate a baseline of activity for cyber traffic and physical movements to identify deviations from normal behavior, then determine which deviations are meaningful to help detect attacks in progress.

Understand, Predict & Act• Extend security to include all points of data interaction• Integrate technologies to ingest and analyze more data • Utilize new insights for better decision making• Understand risks and threats in seconds instead of hours• Reduce billions of security events to an actionable set

WHAT DO YOU NEED TO SUCCEED?

Continually Filter and ExposeObserve unearthed insights in real time to filter out false positives and expose false negatives or store information for additional analysis.

Security Intelligence ExtensionThe traditional approach to security is to build and stand guard on a wall protecting the most valuable enterprise assets. In a big data world, however, threats are rapidly multiplying, originating across enterprise walls and taking new forms—making them harder to identify and defend against. Enforcing a perimeter and reacting to events are no longer sufficient. Organizations need to analyze and correlate all available streaming and historical data to continuously identify threats—and act in real time to protect all physical and cyber assets.