Sustainable Security Operations

Similar documents
GDPR: An Opportunity to Transform Your Security Operations

SIEM Solutions from McAfee

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

McAfee Endpoint Threat Defense and Response Family

McAfee epolicy Orchestrator

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Defend Against the Unknown

SIEM: Five Requirements that Solve the Bigger Business Issues

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

MITIGATE CYBER ATTACK RISK

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

McAfee Advanced Threat Defense

The McAfee MOVE Platform and Virtual Desktop Infrastructure

McAfee Skyhigh Security Cloud for Amazon Web Services

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

RSA NetWitness Suite Respond in Minutes, Not Months

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

CA Security Management

McAfee Database Security Insights

ForeScout ControlFabric TM Architecture

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

The Resilient Incident Response Platform

McAfee Skyhigh Security Cloud for Citrix ShareFile

Building Resilience in a Digital Enterprise

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Petroleum Refiner Overhauls Security Infrastructure

INTELLIGENCE DRIVEN GRC FOR SECURITY

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

McAfee Embedded Control

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center

Sandboxing and the SOC

SIEMLESS THREAT DETECTION FOR AWS

WHITEPAPER. Enterprise Cyber Risk Management Protecting IT Assets that Matter

McAfee Endpoint Security

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Total Protection for Compliance: Unified IT Policy Auditing

TRUE SECURITY-AS-A-SERVICE

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

locuz.com SOC Services

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Continuous protection to reduce risk and maintain production availability

Symantec Security Monitoring Services

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

PALANTIR CYBERMESH INTRODUCTION

empow s Security Platform The SIEM that Gives SIEM a Good Name

McAfee Total Protection for Data Loss Prevention

Seven Steps to Ease the Pain of Managing a SOC

Symantec Data Center Transformation

RSA INCIDENT RESPONSE SERVICES

Privileged Account Security: A Balanced Approach to Securing Unix Environments

RSA INCIDENT RESPONSE SERVICES

Securing Your Digital Transformation

FOR FINANCIAL SERVICES ORGANIZATIONS

McAfee MVISION Cloud. Data Security for the Cloud Era

Novetta Cyber Analytics

McAfee Public Cloud Server Security Suite

Best Practices in Securing a Multicloud World

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

Integrated, Intelligence driven Cyber Threat Hunting

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

RSA ADVANCED SOC SERVICES

Power of the Threat Detection Trinity

Un SOC avanzato per una efficace risposta al cybercrime

with Advanced Protection

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Imperva Incapsula Website Security

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

Security. Made Smarter.

Demystifying Governance, Risk, and Compliance (GRC) with 4 Simple Use Cases. Gen Fields Senior Solution Consultant, Federal Government ServiceNow

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

McAfee Product Security Practices

McAfee Network Security Platform

Enhanced Threat Detection, Investigation, and Response

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

INTEGRATION BRIEF DFLabs and Jira: Streamline Incident Management and Issue Tracking.

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

SOLUTION BRIEF Virtual CISO

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

CONTENTS. Technology Overview. Workflow Integration. Sample Customers. How It Works

Security by Default: Enabling Transformation Through Cyber Resilience

Combatting advanced threats with endpoint security intelligence

Securing the Software-Defined Data Center

SOLUTION BRIEF RSA NETWITNESS PLATFORM ACCELERATED THREAT DETECTION & AUTOMATED RESPONSE FROM THE ENDPOINT TO THE CLOUD

Securing Your Microsoft Azure Virtual Networks

Securing Your Amazon Web Services Virtual Networks

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Industrial Defender ASM. for Automation Systems Management

esendpoint Next-gen endpoint threat detection and response

SIEMLESS THREAT MANAGEMENT

McAfee Virtual Network Security Platform

SOLUTION BRIEF RSA ARCHER BUSINESS RESILIENCY

Transcription:

Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing, as is the cost of complying with regulations and managing policies. An unintegrated, distributed, and complex security and IT infrastructure makes it difficult to detect and act on important events. It also impairs a security administrator s ability to identify, understand, and respond to risk factors in a proactive and timely manner. In fact, a recent McAfee survey of 565 security decision makers found that it takes eight working days, or 64 hours, for a security investigation, from detection to a return to health. And, on average, security decision makers use four tools to get the job done. 1 Further compounding this challenge is an ever-growing volume of data. Threat intelligence and contextual data comes in from multiple separate sources and solutions. This makes it almost impossible to get a complete and coherent view of the security state across the environment. While dealing with incidents monopolizes much of a security operations center s resources, they are also responsible for the larger picture of risk management and compliance. To do this, they need an effective strategy with an adaptive security architecture that optimizes security operations. This approach increases efficiency through integration, automation, and orchestration. It reduces the amount of labor required, while improving your security posture. The goal is to compress decision making and action cycles to more quickly detect, contain, and remediate attacks, insider threats, and compliance infractions. 1 Sustainable Security Operations

Optimized Security Operations The most pressing activity for security operations is threat management. This urgency comes from the fact that cyberattacks are becoming more advanced, stealthy, and frequent. According to threat managers at enterprises worldwide: Almost 6 out of 10 attacks in 2015 involved complex techniques wielded by motivated external and internal attackers. 2 These techniques enabled an increase in targeted attacks from 26% to 32% between January 2015 and January 2016. 3 Many organizations lack adequate, let alone optimized, systems for threat management. Siloed detection, analysis, and investigation systems prevent the effective delivery of actionable intelligence to incident responders, who need these insights to create a precise diagnosis and accelerate containment and remediation efforts. Better collaboration between analysts, incident responders, and endpoint administrators is expected to improve incident response effectiveness by 38%, on average, and as much as 76 100% for the largest entities. 4 Threat management may be the most visible challenge, but security operations are also responsible for managing overall business risk. McAfee encourages an optimized security operations model that enables best practices for threat management as part of efficient security operations. This requires: The adoption of a security framework that makes it easy to integrate security solutions and threat intelligence into day-to-day processes. Tools like centralized and actionable dashboards to help integrate threat data to keep operations and management apprised of evolving events and activities. Threat management linked with other systems to better manage your overall risk posture, gain continuous visibility across systems and domains, and have actionable intelligence to drive better accuracy and consistency into your security operations. Centralized functions reduce the burden of manual data sharing, auditing, and reporting throughout. These actions optimize and operationalize threat management. When a high priority incident occurs, you are better prepared to leverage existing resources, from talented teams and surge staffing to dashboards, case management workflows, and procedures. Beyond more efficient analysts and responders, optimized systems improve your ability to measure and report progress to interested parties, such as the board and executive leadership. The most pressing activity for security operations is threat management. This urgency comes from the fact that cyberattacks are becoming more advanced, stealthy, and frequent. 2 Sustainable Security Operations

The McAfee Optimized Security Operations Platform Optimized for threat management, the open security operations platform from McAfee transforms real-time data and threat intelligence into accurate and prioritized insight. As the connective tissue between protection, detection, and correction, it provides visibility, workflows, and reports that nurture continuous, adaptive, and automated response. This allows your security staff to: Collect organizational data: The modular McAfee platform quickly ingests event and flow information from hundreds of sources and third-party devices, so you can collect relevant data and then pick out the signals from the noise. Automate first response using threat intelligence: An adaptive security architecture lets your team make the most of any available threat intelligence. The platform provides ingestion of global threat intelligence feeds, creation of local intelligence, aggregation of low-prevalence attack data, as well as real-time sharing of threat information across your IT infrastructure. This integrated and collaborative approach minimizes the opportunity and impact of emerging attack tactics. One of the strengths of the McAfee approach is the ability to clear away newly identified bad files without requiring human involvement. This process is a very low risk first response action that reduces the impact of known and emerging malware, including files masquerading as applications. Triage using behaviors, proven rules, and risk scores: While threat intelligence helps identify known bad indicators and events, organizations also need to hunt for indicators of attacks. These events may not appear malicious when evaluated separately, but viewed together they represent a likely or known attack pattern. This is where enrichment, correlation, and behavior and anomaly analysis improve threat operations. Increase accuracy using behavioral analysis: Moving beyond simple rules enables higher precision in identifying meaningful events and patterns. The combination of rule- and anomaly-based correlation can be used to detect (and potentially remediate) unwanted data exfiltration caused by a malware infection. Investigate freely: Once data is normalized and prioritized into actionable intelligence, organizations can move into action with greater confidence that their containment and remediation efforts are focused in the right areas. Establishing formalized incident response processes for containment and remediation and automating routine processes with your adaptive security framework greatly improves your ability to streamline security operations. Remediate effectively: With your dashboards providing actionable intelligence on the most important threats requiring action, your time to containment is critical. The McAfee optimized security operations platform enables immediate response by integrating centralized operational systems and security countermeasures with other security and IT systems. 3 Sustainable Security Operations

Reap the Benefits of Optimized Security Operations Since organizations are under constant attack, incident response processes can no longer end with remediation and clean up they need to feed lessons learned back into preventative controls. Responders need to integrate threat-driven changes into compliance auditing and reporting practices as they upgrade technical and procedural controls to prevent recurrence. Integrate underlying threat, compliance, and risk management systems to support an ongoing model of continuous monitoring and analysis. This iterative loop (i.e., the threat defense lifecycle) will help you proactively identify malicious changes, adjust your protection strategies, and improve your security posture. Overlaying broad visibility and continuous monitoring onto the threat defense lifecycle elevates organizational risk management from compliant to optimized. It also provides transparency to engender appropriate confidence in the organization s efforts to meet due care standards and mitigate risk. Advantages of the McAfee Approach The McAfee optimized and extensible security operations model transforms real-time data and threat intelligence, both from McAfee and third-party sources, into actionable intelligence that feeds and facilitates effective risk and threat management. McAfee makes this possible through a combination of intelligent analytics, automation, and integration. 4 Sustainable Security Operations Integration of Data Integrating threat intelligence, local and organizational data, plus processes allows your operational teams to achieve visibility; assess threat, risk, and security posture; then prioritize and take action in near real time. At the center of the extensible security operations solution, McAfee Enterprise Security Manager supports over 400 third party security devices with APIs for bidirectional integration with endpoint, network, management, and operational systems, as well as thirdparty or McAfee threat intelligence sources. McAfee Threat Intelligence Exchange APIs, SDKs, STIX/TAXII Data Exchange Layer Correct Protect McAfee Enterprise Security Manager Adapt McAfee Advanced Threat Defense McAfee Active Response Global Threat Intelligence Detect Partners Figure 1. Integrating continuous visibility and analytics with response and remediation enhances speed and efficiency. Learn More To learn more about optimized security operations solutions from McAfee, download further information from www.mcafee.com/secops.

Rapid Time to Value, Sustainable Design The modular security operations platform from McAfee provides solution components that can scale to meet growing needs. The open design gives you the flexibility to use off the shelf, pre-certified integrations from McAfee and its partners, or mix and match solutions using open interfaces to integrate with your existing security and IT products. This lets you take a practical approach to adoption based on your industry s threat profile and compliance regulations. McAfee customers repeatedly confirm they get value in days, as compared to the longer time periods other vendors had cautioned them to expect. Today, no point defense solution offers long-term value any more. Point-to-point integrations get expensive fast and break down quickly. The McAfee platform provides simple integration, long-term protection effectiveness, and operations efficiency. This model delivers value year in and year out, regardless of the elements in your existing environment and the changes you anticipate. McAfee provides an integrated, connected architecture that dramatically increases the speed and capacity to prevent and respond to external attacks and internal incidents. The optimized security operations platform helps reduce complexity and improve operational effectiveness by providing integrated, adaptive, and orchestrated intelligence and response capabilities. This efficiency empowers you to take your security operations from reactive to proactive. Learn More To learn more about optimized security operations solutions from McAfee, download further information from www.mcafee.com/ SecOps. 1. How Collaboration Can Optimize Security Operations, McAfee research, Jan. 2016. 2. Ibid. 3. Ibid. 4. Ibid. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright 2017 McAfee, LLC. 1875_1016 OCTOBER 2016 5 Sustainable Security Operations