Deep Instinct v2.1 Extension for QRadar

Similar documents
Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

AppDefense Cb Defense Configuration Guide. AppDefense Appendix Cb Defense Integration Configuration Guide

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

INFINIT Y TOTAL PROTECTION

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Integrated, Intelligence driven Cyber Threat Hunting

ForeScout App for IBM QRadar

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

INSIGHTS FROM NSA S CYBERSECURITY THREAT OPERATIONS CENTER

ForeScout Extended Module for Carbon Black

RSA NetWitness Suite Respond in Minutes, Not Months

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Novetta Cyber Analytics

BUILDING AND MAINTAINING SOC

BETTER Mobile Threat Defense (BMTD)

Managed Endpoint Defense

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Integrate Palo Alto Traps. EventTracker v8.x and above

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

ForeScout Extended Module for Bromium Secure Platform

INSIGHTS FROM NSA S CYBERSECURITY THREAT OPERATIONS CENTER

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Secdo Platform. <Partner Product>

THE EVOLUTION OF SIEM

Trend Micro and IBM Security QRadar SIEM

Cisco Advanced Malware Protection for Endpoints

the SWIFT Customer Security

Juniper Networks App for Qradar. Juniper Networks App for Qradar User Guide

FFIEC Cybersecurity Assessment Tool

rat ITarian Service Desk End-User Guide Software version 4.16 Guide version ITarian 1255 Broad Street Clifton, NJ 07013

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

The Future of Threat Prevention

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

deep (i) the most advanced solution for managed security services

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

THE ACCENTURE CYBER DEFENSE SOLUTION

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Forescout. eyeextend for Carbon Black. Configuration Guide. Version 1.1

May the (IBM) X-Force Be With You

Advanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe

Integrate TippingPoint EventTracker Enterprise

ForeScout Extended Module for Symantec Endpoint Protection

Securing global enterprise with innovation

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Security Operations in Flux

McAfee Endpoint Threat Defense and Response Family

trend micro smart Protection suites

IBM Future of Work Forum

CloudSOC and Security.cloud for Microsoft Office 365

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Compare Security Analytics Solutions

Comodo One Software Version 3.26

Cyber Defense Operations Center

Symantec Security Analytics: A Cornerstone of Effective Security Incident Response

PALANTIR CYBERMESH INTRODUCTION

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

CCNA Cybersecurity Operations. Program Overview

Cisco Cyber Threat Defense Solution 1.0

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

WHY SIEMS WITH ADVANCED NETWORK- TRAFFIC ANALYTICS IS A POWERFUL COMBINATION. A Novetta Cyber Analytics Brief

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

Gladiator Incident Alert

ForeScout Extended Module for Splunk

Deep instinct For MSSPs

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Configuring Antivirus Devices

IBM Security Network Protection Solutions

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Synchronized Security

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Popular SIEM vs aisiem

THE KERNEL. Our in-house professional team is highly skilled in delivering cutting-edge solutions to our clients.

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

Automating the Top 20 CIS Critical Security Controls

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

NIST Special Publication

Introducing Cyber Observer

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

Reinvent Your 2013 Security Management Strategy

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

McAfee Public Cloud Server Security Suite

Transcription:

Deep Instinct v2.1 Extension for QRadar This scalable joint solution enables the seamless ingestion of Deep Instinct events into IBM QRadar platform, this results in higher visibility of security breaches and incidents and provids real-time response to stop APTs and 0-day attacks. The need to reduce the response time to cyber-attacks and amount of investigated incidents is increasing and becoming more urgent as cyber-attacks are becoming more sophisticated and yet targeted to attack enterprises of all sizes. Deep Instinct s Endpoint Protection provides unmatched real-time detection and prevention of unknown malware. When integrated with the alerting and event management capabilities of IBM QRadar, this achieves a more holistic and context-aware approach when responding to cyber-attacks. This solution stops attacks on a more proactive and accurate manner. Key Benefits Extends security event information by integrating Deep Instinct events with other events acquired by IBM QRadar Enhances IBM QRadar reporting and visualization capabilities with Deep Instinct s context and advanced analysis Integrates Deep Instinct administrative events using IBM QRadar, to monitor system administrative actions, which can then be correlated with all other events. Extension Download The Deep Instinct Extensions v2.1 for QRadar can be downloaded from https://exchange.xforce.ibmcloud.com/hub/extension/preview/2e6368c3ecc891bca5bf93f9a14fe1f2/2. 1.0 This extension is compatible with Deep Instinct v2.1. Extension Installation This section describes how to install the Deep Instinct extension for QRadar. 1. Login to QRadar webui 2. Go to Admin tab 3. Under System Configuration Click the Extensions Management

4. The extensions editor is opened in a new window 5. Click the Add button 6. Browse the extension file downloaded from the IBM X-Force exchange 7. Click the Add button (and make sure that the Install immediately is checked)

8. The extension will go through a short validation and then will be installed

9. Approve the installed content and make sure that the Overwrite is selected

Log source This section describes how to define Deep Instinct D-Appliance as a log source. 1. In the QRadar webui -> admin tab, click the Log Sources

2. The Log Sources is opened in a new window

3. Click the new button in the toolbar 4. Fill the D-Appliance details as follows: a. Log Source Name a name for the log source so it can be easily identified later b. Log Source Description a description for the log source c. Log Source Type set to Deep Instinct Events d. Protocol Configuration make sure it is set to Syslog e. Log Source Identifier set here the D-Appliance IP Address or host name f. Log Source Extension set to DeepInstinctEventsCustom_ext

5. Click the Save button Viewing events This section describes how to define a search so that Deep Instinct D-Appliance events will appear in an optimized way. 1. In the QRadar webui -> Log Activity tab 2. In the toolbar click Search -> New Search

3. Under the Search Parameters section a. Select the Log Source [Indexed] parameter b. Select the Equals operation c. Select the Deep Instinct log source as defined before 4. Select the columns to display as follows a. Event Name b. Log Source c. Event Count d. Start Time e. Category f. Source Host Name (custom) g. Source IP h. Source MAC i. ObjectType (custom) j. File Path (custom)

k. File Hash (custom) l. Username m. Message (custom) 5. Click the filter button 6. A search result for example:

Resources: https://www.ibm.com/support/knowledgecenter/ss42vs_7.2.8/com.ibm.qradar.doc/t_cmt_importing_ extensions.html About Deep Instinct Deep Instinct is the first company to apply deep learning to cybersecurity. Leveraging deep learning s predictive capabilities, Deep Instinct s on-device, proactive solution protects against zero-day threats and APT attacks with unmatched accuracy. Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization s endpoints, servers, and mobile devices. Deep learning s capabilities of identifying malware from any data source results in comprehensive protection on any device and operating system. For more information about Deep Instinct, visit: www.deepinstinct.com. Additional information For additional Deep Instinct information visit: https://www.deepinstinct.com