ACTIONABLE SECURITY INTELLIGENCE

Similar documents
PANORAMA. Figure 1: Panorama deployment

PANORAMA. Key Security Features

Enhanced Threat Detection, Investigation, and Response

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

THE ACCENTURE CYBER DEFENSE SOLUTION

SIEM: Five Requirements that Solve the Bigger Business Issues

APP-ID. A foundation for visibility and control in the Palo Alto Networks Security Platform

Office 365 Buyers Guide: Best Practices for Securing Office 365

securing your network perimeter with SIEM

Feature Focus: Context Analysis Engine. Powering CylanceOPTICS Dynamic Threat Detection and Automated Response

Best Practices in Securing a Multicloud World

CABLE MSO AND TELCO USE CASE HANDBOOK

QLIKVIEW ARCHITECTURAL OVERVIEW

SIEM Solutions from McAfee

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

ForeScout Extended Module for Splunk

TRAPS ADVANCED ENDPOINT PROTECTION

ARTIFICIAL INTELLIGENCE POWERED AUTOMATED THREAT HUNTING AND NETWORK SELF-DEFENSE

Configure Unsanctioned Device Access Control

RSA INCIDENT RESPONSE SERVICES

RSA INCIDENT RESPONSE SERVICES

PROTECT WORKLOADS IN THE HYBRID CLOUD

The Cognito automated threat detection and response platform

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

DATA SHEET AlienVault USM Anywhere Powerful Threat Detection and Incident Response for All Your Critical Infrastructure

Fast Incident Investigation and Response with CylanceOPTICS

Popular SIEM vs aisiem

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch

Database Discovery: Identifying Hidden Risks and Sensitive Data

Introducing CloudGenix Clarity

VMware AirWatch Integration with Palo Alto Networks WildFire Integrate your application reputation service with AirWatch

Empower stakeholders with single-pane visibility and insights Enrich firewall security data

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

McAfee Database Security Insights

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

Vectra Cognito. Brochure HIGHLIGHTS. Security analyst in software

McAfee Endpoint Threat Defense and Response Family

CyberArk Privileged Threat Analytics

Incident Response Agility: Leverage the Past and Present into the Future

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

DECRYPT SSL AND SSH TRAFFIC TO DISRUPT ATTACKER COMMUNICATIONS AND THEFT

A Practical Guide to Efficient Security Response

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Tenable for McAfee epolicy Orchestrator

Defend Against the Unknown

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Securing Your SWIFT Environment Using Micro-Segmentation

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

CASE STUDY INSIGHTS: MICRO-SEGMENTATION TRANSFORMS SECURITY. How Organizations Around the World Are Protecting Critical Data

RSA IT Security Risk Management

Compare Security Analytics Solutions

Five Essential Capabilities for Airtight Cloud Security

Spotlight Report. Information Security. Presented by. Group Partner

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

REDUCE TCO AND IMPROVE BUSINESS AND OPERATIONAL EFFICIENCY

Monitoring Hybrid Cloud Applications in VMware vcloud Air

DATA SHEET RSA NETWITNESS PLATFORM PERVASIVE VISIBILITY. ACTIONABLE INSIGHTS.

Automated, Real-Time Risk Analysis & Remediation

Trend Micro Deep Discovery Training for Certified Professionals

Tenable for McAfee epolicy Orchestrator

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

PROTECT AND AUDIT SENSITIVE DATA

Network Behavior Analysis

The threat landscape is constantly

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

FIREWALL OVERVIEW. Palo Alto Networks Next-Generation Firewall

McAfee epolicy Orchestrator

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

VMware Workspace ONE Intelligence. VMware Workspace ONE

Securing Your Microsoft Azure Virtual Networks

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Integrate Palo Alto Traps. EventTracker v8.x and above

8 Must Have. Features for Risk-Based Vulnerability Management and More

ONBOARDING GUIDE GLOBALPROTECT CLOUD SERVICE FOR REMOTE NETWORKS

Verint Enterprise Feedback Management TM. EFM 15.1 FP3 Release Overview October 2016

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Integrating Riverbed SD-WAN with Palo Alto Networks GlobalProtect Cloud Service

VM-SERIES FOR VMWARE VM VM

McAfee Security Management Center

Securing Your Amazon Web Services Virtual Networks

Seceon s Open Threat Management software

Cisco Start. IT solutions designed to propel your business

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

BUILD A NEXT-GENERATION SECURITY OPERATIONS CENTER

AppDefense Getting Started. VMware AppDefense

vrealize Operations Management Pack for NSX for vsphere 3.5.0

Building a Smart Segmentation Strategy

McAfee Advanced Threat Defense

USM Anywhere AlienApps Guide

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

TRIPWIRE VIA PLATFORM PROTECTING YOUR DATA WITH INTEGRATED SECURITY CONTROLS

ForeScout App for IBM QRadar

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation

Device Discovery for Vulnerability Assessment: Automating the Handoff

GUIDE. LiveNX Semantic Tagging: Best-Practices Guide

As Enterprise Mobility Usage Escalates, So Does Security Risk

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Transcription:

ACTIONABLE SECURITY INTELLIGENCE Palo Alto Networks ACC, Logging and Reporting Data is widely available. What is scarce is the ability to extract actionable intelligence from it. Palo Alto Networks next-generation firewalls have multiple features, such as the Application Command Center, Log Monitor and reporting, that provide actionable intelligence. The ACC is an analytical tool that provides information on activity within your network, eliminating clutter and providing a visual, interactive display of network insights and threats. Using the ACC, you can understand traffic trends and various risks, such as the number of threats detected for the most active and high-risk applications, and the number of threats identified in applications at each risk level. The log monitoring and reporting capabilities provide a detailed view into your network traffic that you can customize to fit the task at hand. Palo Alto Networks Actionable Security Intelligence White Paper 1

Having actionable, well-organized information about network traffic and threats at your fingertips is crucial. IT and security teams are inundated with unmanageable amounts of uncorrelated data from multiple independent security deployments, making it impossible to find critical threats buried in mountains of intelligence. Frequently, it is not a lack of data that leads to a breach, but a lack of appropriately prioritized and actionable data. IT teams have too many data sources to manage. Security teams don t have the time or resources to correlate threats in the flood of data. Both teams are too overwhelmed to find the needle in the haystack and, as a result, can t prioritize their responses appropriately. This white paper highlights the capabilities of Palo Alto Networks firewalls to make critical information visible and actionable. It showcases the power of a highly visual, interactive and customizable user interface that reduces the need for manual data mining and offers actionable insights. We will also discuss how Panorama network security management provides ACC and Log Management capabilities to bring security teams a single pane of glass for actionable visibility across multiple devices, no matter where they are deployed. Figure 1: ACC visual, interactive and customizable The ACC: Answers to Your Security Questions Visibility into your network and security posture is crucial in any network security environment. The Application Command Center presents a comprehensive view of all network activity, application usage, users and threats so you can get quick answers to important questions. Any valuable, actionable information must be visual, customizable, interactive and automated. The next four sections explore how the ACC provides these key attributes in an easy-to-use format (see Figure 1). You can use the four out-of-the-box tabs for Network Activity, Threat Activity, Blocked Activity and Tunnel Activity, or create custom tabs for your specific needs. The use of widgets makes the user interface visual and user-friendly. Visual A Picture Is Worth a Thousand Data Points ACC widgets provide a visual representation of data at the desired levels. You can choose different display options, such as tree, line or bar graphs, and the unit of measure, such as bytes, sessions, threats, content or URLs, by clicking the radio buttons on a widget. Figure 2 shows the application usage widget, which displays application traffic in bytes. Applications, represented as colored boxes, are grouped by application categories, indicated by gray bars. The size of a given box indicates the traffic volume for that application in the selected time frame. Palo Alto Networks Actionable Security Intelligence White Paper 2

The color of the box indicates the risk level of the application: red is critical, orange is moderate and blue is low-risk. The table below the graph shows additional information, such as the number of sessions, threats detected, and content or files included, as well as the URLs accessed by these applications. Users can obtain a complete view of what s happening in all applications on their network in one simple chart. The widget in Figure 3 shows source and destination by region with a visual display of where traffic is originating and going, through interactive world maps. Figure 2: Application usage widget application traffic by type, amount, risk and category Figure 3: Geolocation source and destination information for all application traffic Palo Alto Networks Actionable Security Intelligence White Paper 3

The widget in Figure 4 shows applications using nonstandard ports, most likely by hopping ports, which in turn demonstrates the power of Palo Alto Networks next-generation firewalls versus traditional port-based firewalls. Figure 4: Applications Using Non Standard Ports widget Customizable One Size Just Doesn t Fit All Every network administrator has different needs. The ACC lets every user customize the view by selecting available widgets from a drop-down list (see Figure 5). You can customize existing tabs and create custom tabs to monitor specific employees or multiple applications. Interactive Because You Need Answers, Fast You can quickly find whatever answers you need by drilling down into the details from any part of the ACC. You can learn about applications, their risk levels (see Figure 6), or even a specific application or application group, just by clicking around. Interactive graphs offer valuable information in a single click, along with the ability to apply any item as a global filter across the entire UI. Figure 5: Widget customization Palo Alto Networks Actionable Security Intelligence White Paper 4

Automated Do More With Less In today s security environment, automation is essential to eliminate duplication, cut back on manual work, and reduce human error and oversight. The ACC has many powerful automation capabilities, but one of the most prominent is the Automated Correlation Engine (see Figure 7). The Automated Correlation Engine is an analytics tool that reduces your data mining effort by identifying compromised hosts in your network. It automatically correlates isolated events across various logs, queries data for the specific patterns, and correlates network events to identify compromised hosts. The Automated Correlation Engine uses the correlation objects defined by the Palo Alto Networks Unit 42 threat research team to identify suspicious traffic patterns or sequences of events. Some correlation objects can even identify dynamic patterns observed in malware samples by Palo Alto Networks WildFire cloudbased threat analysis service. These correlation objects trigger correlation events when a traffic pattern and network artifact matches that of a compromised host. To help you quickly identify and respond to threats, correlation triggers are highlighted using different colors in the ACC. Customizable, Flexible Logging and Reporting Logging and Monitoring Log management is essential for any network security team. Logging all network activities in a logical, organized and easily accessible way ensures you can find the right information when you need it. Panorama can manage logs of individual Palo Alto Networks firewalls or subsets of multiple firewalls in your network. Panorama provides a consolidated view of logs in various categories, such as traffic, Figure 6: Detailed, interactive graphs threat, URL Filtering, WildFire submissions, data filtering and others. If you have a large network, you should consider distributing dedicated log collectors to increase your log storage capacity. WildFire Integration Figure 7: Automated correlation of indicators of compromise Palo Alto Networks Actionable Security Intelligence White Paper 5

Figure 8: Detailed views into traffic, threats, URL filtering, WildFire, data filtering logs and more In the Monitor tab, you can find WildFire submission logs, which contain malware analysis details of files submitted from firewalls. An administrator can go from a high-level view to a summary to details with a few clicks (see Figure 9). From here, an administrator can download the WildFire analysis details as a PDF or easily share it with other users. Figure 9: WildFire submissions log view Maps, Trends and Integration With the ACC Visual display of data, even logs, goes a long way toward making information more actionable. Therefore, our UI offers many map and trend charts to help you visualize the data. Each chart is interactive and can link the data directly to the ACC for a more detailed view. Figures 10 12 show some examples of log data visualization available in our user interface. Palo Alto Networks Actionable Security Intelligence White Paper 6

Figure 10: Application traffic over time Figure 11: Insight into threat development over time Figure 9: WildFire submissions log view Figure 12: Interactive threat and traffic geolocation map Palo Alto Networks Actionable Security Intelligence White Paper 7

Figures 13 and 14 show how easy it is to develop a custom report or a user activity report. Reports can be saved in a report catalog run at a moment s notice. Figure 13: Easy-to-create custom reports Figure 14: Customer user activity report SaaS Usage Report The appeal of SaaS applications, such as Microsoft Office 365, Box and Salesforce, is growing, as is the volume of hidden threats in SaaS offerings, including accidental data exposure, malicious outsiders, promiscuous sharing and so on. Even sanctioned SaaS adoption can increase your risk of breaches and noncompliance. A detailed, customizable SaaS application usage report (see Figure 15) provides insight into all SaaS traffic sanctioned and unsanctioned on your network. You can learn which users access which SaaS applications, how much data is being transferred to the cloud and where potential threats may reside. You can easily develop custom reports or user activity reports from the Monitor tab, as well as schedule and share them, or save them in a report catalog to be executed later. Figure 15: SaaS application usage report Palo Alto Networks Actionable Security Intelligence White Paper 8

Central Visibility for Multiple Next-Generation Firewalls Comprehensive Insight In today s distributed environments, it s increasingly important to have central visibility into all network and threat activities. Being able to see traffic across all firewalls from one central location keeps you efficient and provides additional security through a comprehensive view of correlated data from several firewalls. Figure 16 shows how you can view traffic for your entire network, select firewalls or device groups. Multi-Tenancy and Localized Control Figure 16: Management for your entire network of NGFWs and any device group Managed security service providers and large enterprises need multi-tenancy. Using Panorama, you can set up your security network so that local administrators can only see and control traffic for their specific device groups without affecting others. In other words, you can configure groups and administrator rights such that each group can function as its own company while the Panorama administrator maintains central management and control. Conclusion Visibility, customization, ease of interaction and automation are the key requirements to make data manageable and actionable. Palo Alto Networks next-generation firewalls and management products go above and beyond these requirements. The Application Command Center analyzes firewall data and displays it in a visual, interactive format. Individual administrators can have custom dashboards to fit their individual needs while extensive drill-down, filter and search capabilities help security professionals answer crucial questions and respond quickly. Automated threat correlation across firewall events creates an additional layer of security and saves time. Logging with Palo Alto Networks goes beyond processing and listing events in a traditional manner. You can view logs in a way that makes sense as graphs, maps, trend charts and more to help you interpret the network data. You can use standard reports or create custom ones to render the data the way you need it. The Automated Correlation Engine eliminates manual correlation tasks and surfaces threats that would otherwise go unnoticed because of the noise. Whether managing a single next-generation firewall or an entire network, Palo Alto Networks makes it easy to visualize and interact with the data. 3000 Tannery Way Santa Clara, CA 95054 Main: +1.408.753.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com 2018 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. actionable-security-intelligence-wp-072318