SIEM Product Comparison

Similar documents
IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

Compare Security Analytics Solutions

QuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview

SIEM Solutions from McAfee

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

MA0-104.Passguide PASSGUIDE MA0-104 Intel Security Certified Product Specialist Version 1.0

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Top 10 use cases of HP ArcSight Logger

IBM Security QRadar SIEM V7.2.7 Deployment

Netwrix Auditor Competitive Checklist

Not your Father s SIEM

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

Deploying Security Analytics Tips & Tricks to Achieve Ludicrous Speed Guy Bruneau, GSE

Integrated, Intelligence driven Cyber Threat Hunting

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

Who s Attacking Your Database? Monitoring Authentication and Logon Failures in SQL Server

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Application Performance Troubleshooting

Imperva Incapsula Website Security

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

SIEM: Five Requirements that Solve the Bigger Business Issues

RSA NetWitness Suite Respond in Minutes, Not Months

Cisco Tetration Analytics

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

Cisco Solution Support

The Overlooked Costs and Risks of Firewalls

Unlocking the Power of the Cloud

Cisco Solution Support

SOLUTION BRIEF RSA NETWITNESS SUITE & THE CLOUD PROTECTING AGAINST THREATS IN A PERIMETER-LESS WORLD

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Fidelis Overview. 15 August 2016 ISC2 Cyber Defense Forum

RSA. The security division of EMC. Visibilidad total en el entorno de seguridad. Javier Galvan Systems Engineer Mexico & NOLA

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Self-driving Datacenter: Analytics

Zix Support for Standards

Popular SIEM vs aisiem

THE CYBERX PLATFORM: PROTECT YOUR PEOPLE, PRODUCTION, AND PROFITS HIGHLIGHTS SOLUTION BRIEF

What matters in Cyber Security

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security.

IBM Security QRadar Version Architecture and Deployment Guide IBM

Secret Server HP ArcSight Integration Guide

SIEMLESS THREAT MANAGEMENT

Network Operations Analytics

SIEM Integration with SharePoint: Monitoring Access to the Sensitive Unstructured Data in SharePoint

Todays Threat Landscape Cloud / Big data / Mobile Jonathan Martin HP Enterprise Security Products

Cisco SAN Analytics and SAN Telemetry Streaming

VISIBILITY INTO CLOUD COMPUTING

BUILDING AND MAINTAINING SOC

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Monitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In

Title DC Automation: It s a MARVEL!

SOLUTION BRIEF DFLabs IncMan SOAR - The Security Orchestration, Automation and Response Platform for SOCs.

Automated Threat Management - in Real Time. Vectra Networks

Hp Enterprise Secure Key Manager User Guide

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

State of Security Operations

Contents. Introduction

McAfee Skyhigh Security Cloud for Citrix ShareFile

ARIA SDS. Application

Virtuoso Infotech Pvt. Ltd.

Simplifying Security for IBM i and IBM Security QRadar

Securing Your Cloud Introduction Presentation

BIG MON CONTROLLERS BIG MON ANALYTICS NODE. Multi-Terabytes L2-GRE 1/10/25/40/100G ETHERNET SWITCH FABRIC. Optional BIG MON BIG MON SERVICE NODES

Enterprise Situational Intelligence

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Module 2: AlienVault USM Basic Configuration and Verifying Operations

Preventing Data Breaches without Constraining Business Beograd 2016

How Vectra Cognito enables the implementation of an adaptive security architecture

Security. Made Smarter.

IBM services and technology solutions for supporting GDPR program

The Future of Threat Prevention

Demystifying Machine Learning

Enabling Security Controls, Supporting Business Results

Mcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<<

Microsoft Security Management

Empower stakeholders with single-pane visibility and insights Enrich firewall security data

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

The Vectra App for Splunk. Table of Contents. Overview... 2 Getting started Setup... 4 Using the Vectra App for Splunk... 4

VMware vrealize Network Insight Arkin Messaging Document

MAPR DATA GOVERNANCE WITHOUT COMPROMISE

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

UEBA User Entity Behavior Analytics Aristotle Insight Sergeant Laboratories

Cisco Stealthwatch Endpoint License with Cisco AnyConnect NVM

Sichere Applikations- dienste

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Rethinking Security: The Need For A Security Delivery Platform

Who am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

SOLUTION TRACK Finding the Needle in a Big Data Innovator & Problem Solver Cloudera

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

IBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights

Best Practices for Building Visibility Fabrics in the Enterprise

Solution Overview Gigamon Visibility Platform for AWS

#MicroFocusCyberSummit

Transcription:

SIEM Product Comparison

SIEM Technology Space SIEM market analysis of the last 3 years suggest: Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013) Only products with technology maturity and a strong road map have featured in leaders quadrant. HP ArcSight & IBM Q1 Labs have maintained leadership in SIEM industry with continued technology upgrade McAfee Nitro has strong product features & road map to challenge HP & IBM for leadership 2011 2012 2013

HP ArcSight The ArcSight Enterprise Threat and Risk Management (ETRM) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information. ArcSight Enterprise Security Manager (ESM): Correlation and analysis engine used to identify security threat in real-time ArcSight Logger: Log storage and Search solution ArcSight IdentityView: User Identity tracking/user activity monitoring ArcSight Connectors: for data collection from a variety of data sources ArcSight Auditor Applications: automated continuous controls monitoring for both mobile & virtual environments Extensive Log collection support for commercial IT products & applications Advanced support for Threat Management, Fraud Management & Behavior Analysis Mature Event Correlation, Categorization & Reporting Tight integration with Big data Analytics platform like Hadoop Highly customizable based on organization s requirements Highly Available & Scalable Architecture supporting Multi-tier & Multi-tenancy Complex deployment & configuration Mostly suited for Medium to Large Scale deployment Requires skilled resources to manage the solution Steep learning curve for Analysts & Operators

IBM QRadar The QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information. QRadar Log Manager turn key log management solution for Event log collection & storage QRadar SIEM Integrated Log, Threat & Risk Management solution QRadar Risk Manager Predictive threat & risk modelling, impact analysis & simulation QRadar QFlow Network Behaviour Analysis & Anomaly detection using network flow data QRadar vflow Application Layer monitoring for both Physical & Virtual environment Very simple deployment & configuration Integrated view of the threat environment using Netflow data, IDS/IPS data & Event logs from the environment Behavior & Anomaly Detection capabilities for both Netflow & Log data Suited for small, medium & large enterprises Limited customizations capabilities Limited Multi-tenancy support Limited capability to perform Advanced Use Case development & analytics Highly Scalable & Available architecture

McAfee Nitro The McAfee Enterprise Security Management (formerly Nitro Security) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information. McAfee Enterprise Log Manager turn key log management solution for Event log collection & storage McAfee Event Receiver collecting log data & native flow data McAfee Database Event Monitor database transaction & Log monitoring McAfee Application data Monitor application layer event monitoring McAfee Advanced Correlation Engine advanced correlation engine for correlating events both historical & real time Integrated Application Data monitoring & Deep Packet Inspection Integrated Database monitoring without dependence on native audit functions High event collection rate suited for very large scale deployment Efficient query performance in spite of high event collection rate Very basic correlation capabilities when compared with HP & IBM Limitations in user interface when it concerns navigation Requires a lot of agent installs for Application & database monitoring thereby increasing management complexity No Analytics capability both Big Data & Risk based Limited customization capabilities Limited support for multi-tier & multi-tenancy architecture

Splunk Splunk Enterprise is an integrated set of products that provide Log Collection, management & reporting capabilities using Splunk Indexer used to collect and index logs from IT environment Splunk Search Heads used to search & report on IT logs Splunk App for Enterprise Security - used to collect external threat intelligence feeds, parse log sources and provide basic analytics for session monitoring (VPN, Netflow etc.) Extensive Log collection capabilities across the IT environment Log search is highly intuitive like Google search Flexible dash boarding & analytics capability improves Log visualization capabilities Built-in support for external threat intelligence feeds both open source & commercial App Store based architecture allowing development of Splunk Plugins to suit monitoring & analytics requirements Pre-SIEM solution with very limited correlation capabilities Even though easy to deploy, increasingly difficult to configure for SIEM related functions

RSA Security Analytics RSA Security Analytics is an integrated set of products that provide Network Forensics, Log Collection, management & reporting capabilities using Capture Infrastructure RSA Security Analytics Decoder Real time capture of Network Packet and log data with Analysis and filtering capabilities RSA Security Analytics Concentrator Aggregates metadata from the Decoder RSA Security Analytics Broker Server For reporting, management and administration of capture data Analysis & Retention Infrastructure Event Stream Analysis Correlation Engine Archiver Long term retention, storage, security & compliance reporting RSA Security Analytics Warehouse Big Data Infrastructure for Advanced Analytics Great Analytics using Event Log Data & Network Packet Capture Network forensics, Big Data (Parallel Computing) are cornerstones in SIEM world Tightly Integrates with RSA ecosystem for Threat Intelligence, Fraud Detection, Malware Analysis etc. (each requires separate RSA Tools) New Product release from RSA, hence advanced Security correlation support is poor Security Analytics Warehouse is a new capability with very little real world use cases Suited only for large enterprises with need for complex deployment and management resources. Poor deployment options for small and midsize customers

LogRhythm The LogRhythm SIEM 2.0 Security Intelligence Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information. Log Manager high performance, distributed and redundant log collection and management appliance Event Manager provide centralized event management and administration for a LogRhythm deployment Network Monitor provide full visibility into network traffic, identifying applications via deep packet inspection, providing real-time unstructured search access to all metadata and packet captures Well balanced log management, reporting, event management, privileged user monitoring and File integrity monitoring capabilities Fast deployment with minimal configuration because of appliance form factor Quarterly Health Check programs post-deployment offers great After sales-service experience Suitable for Security event data only, as Operational data sets cause slowing performance for searches and reports No Support for Active Directory integration for Role- Based Access Control Suited best for small and mid size companies with basic security, regulatory compliance and reporting needs. Not scalable for very large deployments.

SIEM Vendors Critical Capabilities Score Card A Summary scoring sheet for SIEM Vendors based on their Core capabilities is given below: Capability RSA Security Analytics Log Rhythm Splunk McAfee Nitro IBM QRadar HP ArcSight Real-time Security Monitoring 3.1 3.2 2.5 3.9 4.2 4.4 Threat Intelligence 3.7 2.5 3.0 2.8 3.5 4.5 Behavior Profiling 2.5 2.3 3.0 3.0 5.0 4.0 Data & End User Monitoring 3.6 3.5 1.7 3.6 3.5 4.0 Application Monitoring 3.8 3.5 1.8 3.7 3.3 3.8 Analytics 2.5 2.5 3.8 4.5 3.5 4.0 Log Management & Reporting 3.5 3.8 3.5 3.8 3.9 4.0 Deployment & Support Simplicity 3.0 4.0 2.5 3.5 3.5 3.0 Total (Weighted Score) 25.7 25.3 21.8 28.8 30.4 31.7 1.0 Low level of Capability 5.0 High Level of Capability

SIEM Vendors Use Cases Score Card Use Cases RSA Security Analytics Log Rhythm Splunk McAfee Nitro IBM QRadar HP ArcSight Overall Use Cases 3.2 3.2 2.7 3.6 3.8 4.0 Compliance Use Cases 3.3 3.7 3.0 3.7 3.8 3.8 Threat Monitoring 3.1 3.1 2.9 3.8 3.7 4.0 SIEM 3.2 3.4 2.8 3.6 3.8 3.9 Total (Weighted Score) 12.8 13.4 11.7 14.7 15.1 15.7 1.0 Low level of Capability 5.0 High Level of Capability