Copyright 2013 EMC Corporation. All rights reserved. BIG DATA AND SECURITY JOINING FORCES

Similar documents
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

EVOLVING FROM BREACH PREVENTION TO BREACH ACCEPTANCE TO SECURING THE BREACH

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Transforming IT: From Silos To Services

FOR FINANCIAL SERVICES ORGANIZATIONS

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

MITIGATE CYBER ATTACK RISK

Security. Risk Management. Compliance.

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Business Context: Key for Successful Risk Management

Microsoft Security Management

Next Generation Authentication

Detect Fraud & Financial Crime

RSA NetWitness Suite Respond in Minutes, Not Months

Cisco Firepower NGFW. Anticipate, block, and respond to threats

RSA pro VMware. David Matějů. RSA, The Security Division of EMC

CLOUD WORKLOAD SECURITY

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

THE ACCENTURE CYBER DEFENSE SOLUTION

RSA. The security division of EMC. Visibilidad total en el entorno de seguridad. Javier Galvan Systems Engineer Mexico & NOLA

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Traditional Security Solutions Have Reached Their Limit

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

A Risk Management Platform

Securing Your Cloud Introduction Presentation

Cybersecurity Auditing in an Unsecure World

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

EMC & VMWARE STRATEGIC FORUM NEW YORK MARCH Tom Heiser President, RSA. Tom Corn SVP & Chief Strategy Officer, RSA

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Copyright 2012 EMC Corporation. All rights reserved.

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Built-in functionality of CYBERQUEST

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

Security Operations & Analytics Services

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Data Privacy and Protection GDPR Compliance for Databases

Trust in the Cloud. Mike Foley RSA Virtualization Evangelist 2009/2010/ VMware Inc. All rights reserved

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Unlocking the Power of the Cloud

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

ForeScout Extended Module for Splunk

IBM C Foundations of IBM Big Data & Analytics Architecture V1.

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Bring Context To Your Machine Data With Hadoop, RDBMS & Splunk

SIEM: Five Requirements that Solve the Bigger Business Issues

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

EMC FORUM Vic Bhagat. Executive Vice President & Chief Information Officer EMC Corporation

Everything visible. Everything secure.

GDPR: An Opportunity to Transform Your Security Operations

From Managed Security Services to the next evolution of CyberSoc Services

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Stop Threats Before They Stop You

SOLUTION BRIEF RSA NETWITNESS PLATFORM ACCELERATED THREAT DETECTION & AUTOMATED RESPONSE FROM THE ENDPOINT TO THE CLOUD

RSA IT Security Risk Management

Cisco Cyber Range. Paul Qiu Senior Solutions Architect

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

SHARE Session Protecting Critical Data on a z/os Mainframe: A New Attitude

Agile Security Solutions

locuz.com SOC Services

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

The Transformation in Security How RSA is responding to the Changing Threat Landscape

MODERN DESKTOP SECURITY

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Copyright 2012 EMC Corporation. All rights reserved.

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Secure & Unified Identity

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

align security instill confidence

EMC Solutions are Powered by Intel Xeon Processor Technology

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Noam Ikar R&DVP. Complex Event Processing and Situational Awareness in the Digital Age

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Managing Microsoft 365 Identity and Access

Operationalizing the Three Principles of Advanced Threat Detection

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

How to Prepare a Response to Cyber Attack for a Multinational Company.

The New Era of Cognitive Security

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Private Clouds: Opportunity to Improve Data Security and Lower Costs. InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy

TRIPWIRE VIA PLATFORM PROTECTING YOUR DATA WITH INTEGRATED SECURITY CONTROLS

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Gurucul Risk Analytics. <Partner Product>

Cloud Customer Architecture for Securing Workloads on Cloud Services

Think Like an Attacker

Monitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In

Tripwire State of Cyber Hygiene Report

The Future of Threat Prevention

NEXT GENERATION SECURITY OPERATIONS CENTER

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Transcription:

1 BIG DATA AND SECURITY JOINING FORCES

2 Agenda Security for Big Data Big Data for Security Conclusions

Structured + Unstructured Data = Big Telemetry, Location-Based, etc. Structured in Relational Databases Managed, Unmanaged & Unstructured Internet of Things Non-Enterprise

IN 2000 THE WORLD GENERATED TWO EXABYTES OF NEW INFORMATION EVERY DAY Sources: How Much Information? Peter Lyman and Hal Varian, UC Berkeley,. 2011 IDC Digital Universe Study.

FBI THE LEADING EDGE OF BIG DATA: THEN AND NOW Copyright 2013 EMC Corporation. All rights reserved.

THE LEADING EDGE OF BIG DATA: THEN AND NOW Copyright 2013 EMC Corporation. All rights reserved. Wikipedia

7 VLC DDoS Analysis 30 Gbps 200 Downloads/sec 400 Requests/sec http://www.geek.com/apps/this-is-what-a-ddos-attack-looks-like-1552975/

8 Global Flight Analysis 60,000 Aircraft Routes Sensors On Each Gas Turbine Engine = 1Tb/day http://www.spatialanalysis.ca/2011/global-connectivity-mapping-out-flight-routes/ http://www.computerweekly.com/news/2240176248/ge-uses-big-data-to-power-machine-services-business

Big Data Analytics: Not a New Idea Used Already in Many Industries Risk Assessment Price Optimization Monte Carlo Regression Product Recommendation Finance Retail Online Casino Travel Insurance

10 Expanding Use Cases and New Norms

11 IS WHERE SECURITY MEETS BIG DATA

12 Security Must Keep Up With IT Evolution Cloud Virtual Big Data Mobile

13 New Wave of Big Data Technologies Hadoop Vertica MapReduce Esper kdb Greenplum Hive SciPy Mahout MATLAB Revolution R AMPL Machine Learning Behavior Analysis Sentiment Analysis Predictive Models Network Analysis Business ETL ECL Netezza Teradata SPSS SAS Visualization Simulation Objectives Data Analytics Insights

14 Your Big Data Architecture? Nodes Distributed Data Shared Access Controls Open Networks Open Clients Unauthenticated Web Services Open

15 Your Organization s Security Professional?

16 Protection Requires A New Approach

17 Central Control, Distributed Management Admin Console Access Manager Agent Access Manager Server Access Manager Agent User Service n Access Manager Agent

18 Central Control, Distributed Enforcement PAP/PDP/PEP (XACML standard) Policy Admin Policy Enforcement Policy Decision Policy Enforcement User Node n Policy Enforcement

19 Agenda Security for Big Data Big Data for Security Conclusions

Evolution of Threats Copyright 2013 EMC Corporation. All rights reserved. 20 Unsophisticated Sophisticated Financial Amateur Organized Social Regional Global Fundamental Opposed Destabilizing

Can You Respond Fast Enough? 85% 60% breaches take weeks or more to discover risk reduced when breach response under 2 hours Source: Verizon 2012 Data Breach Investigations Report, NYT Copyright 2013 EMC Corporation. All rights reserved.

Threats Require A New Approach Copyright 2013 EMC Corporation. All rights reserved. Proprietary and Conf idential To Silv er Tail Sy stems

Improved Response Time Required Copyright 2013 EMC Corporation. All rights reserved. 23 1 STEALTHY LOW AND SLOW 2 TARGETED SPECIFIC OBJECTIVE 3 INTERACTIVE HUMAN INVOLVEMENT Attack Pivot and Hide Cover Intrusion Dwell Time Response Time Prevention Identification Response A Reduce Dwell B Speed Response

24 Fighting Advanced Threats With Big Data Analysis Visibility Speed Intelligence Find target height (H), width (W), position (P), from level (L), at time (T) with changed P to P, P, P over T1, T2, T3

Data Scope Copyright 2013 EMC Corporation. All rights reserved. 25 Security Product Evolution Response Speed After Near Real Single Well- Defined Events Platform Normalized SIEM IDS Closely Related Events Raw Security Analytics Isolated Events Correlated

26 Security Analytics Platform Big Data Analytics Governance Data Apps Systems Network Alert & Report Investigate & Analyze SECURITY ANALYTICS + Store Visualize Respond Compliance ARCHER GRC Incident Management Remediation Public & Private Threat Intelligence

27 A Fresh Look At Perimeters Virtual Data Centers, Cloud Compute and BYOD Traditional Data Center Modern Data Center Dedicated, Vertical Gaps and Stacks Dynamic Pools Of Compute & Storage

28 A Fresh Look At Perimeters Focus Now on People, Data Flow and Transactions Traditional People Data Center Data Flow Transactions Dedicated, Vertical Gaps and Stacks Challenges ID and Authenticity Modern Data Center Complex Relationships New and Different Layers Opportunities with Data Velocity Variety Volume Vulnerability Big Dynamic Pools Of Compute & Storage

29 A Fresh Look At Perimeters Focus Now on People, Data Flow and Transactions People Analysis Engine Data Flow Transactions Device Profile User Behavior Profile Fraud Network

30 Adaptive & Risk-Based Authentication User Action Analysis Engine High Risk Step Up Authentication Two-Factor Out Of Band Challenge Q s Proceed As Normal Device Profile User Behavior Profile Fraud Network

31 Adaptive & Risk-Based Authentication User Action Analysis Engine Private Cloud AUTHENTICATION MANAGER + SECURID Read Email Username & Password Download Sales Pipeline Additional Authentication Two-Factor Device Profile User Behavior Profile Fraud Network Public Cloud Access Bank Account Username & Password Out Of Band IDENTITY PROTECTION & VERIFICATION + SILVERTAIL Transfer Funds Challenge Q Additional Authentication

32 Agenda Security for Big Data Big Data for Security Conclusions

33

34 Three Steps to Big Data Security 1. Data Analysis to Monitor ID and Relationships 2. Adaptive Perimeters to Protect Data 3. Increased Response Speed