Confidential McAfee Internal Use Only
May 8, 2013
McAfee ESM: Situational Awareness Boubker Elmouttahid, CISSP, CISM, - - PowerPoint PPT Presentation
McAfee ESM: Situational Awareness Boubker Elmouttahid, CISSP, CISM, CRISC Solution Architect, Management Platform May 8, 2013 Confidential McAfee Internal Use Only Security Connected Platform NETWORK SECURITY ENDPOINT SECURITY Application
Confidential McAfee Internal Use Only
May 8, 2013
Confidential McAfee Internal Use Only
INFORMATION SECURITY Data Loss Prevention Email Security Encryption Web Security SECURITY MANAGEMENT Compliance Policy Auditing & Management Risk Management Security Operations Console SIEM Vulnerability Management PARTNER COMMUNITY McAfee Connected Security Innovation Alliance (SIA) Global Strategic Alliance Partners Access Control Identity & Authentication Intrusion Prevention Network User Behavior Analysis NETWORK SECURITY Next Generation Firewall Network Access Control Server & Database Protection Smartphone & Tablet Protection On Chip (Silicon-Based) Security Virtual Machine & VDI Protection ENDPOINT SECURITY Application Whitelisting Desktop Firewall Device Control Device Encryption Email Protection Embedded Device Protection Endpoint Web Protection Host Intrusion Protection Malware Protection
Confidential McAfee Internal Use Only
May 8, 2013
Confidential McAfee Internal Use Only
Correlate Events Consolidate Logs
Perimeter Thousands of Events APTs Cloud Data Insider Compliance
Historical Reporting
Anomalies
Large Volume Analysis Multi-dimensional Active Trending; L Analysis
Confidential McAfee Internal Use Only
I want assurance we can detect and respond to attacks, are compliant with regulations and the reports to prove it— and I can’t spend a fortune on it CIOS Compliance Security Analyst I need real time, relevant information so I can rapidly investigate and stop attacks I need to ensure that we maintain compliance with regulations and the reports to make the auditors understand it
Confidential McAfee Internal Use Only
Confidential McAfee Internal Use Only
eDB
Highly indexed purpose-built db, enables…
scale, at high-performance
drive intelligence
historic data …in parallel !
SMART FAST
Extended Schema in 9.2, enabling…
increases accuracy as IP’s change
correlated and reported about an event
packets, URL’s, etc…) …without compromising performance!
Confidential McAfee Internal Use Only 8
Confidential McAfee Internal Use Only 9
Confidential McAfee Internal Use Only
1 1 100 010011 10 1 0011 100 011 100 1 1 1 100 010011 100 10010001 1 1 100 010011 011 100 10010001 1 1 100 010011 1 0011 100 011 100 1 1 1 100 010011 100 10010001 1 1 100 010011 011 100 10010001 1 1 100 010011 100 10010001 1 1 100 010011 100 11 1 0011 100 011 100 110101 1 100 011 100 10010001
Flow
Event
Correlate Event and Flow
Advanced Correlation
11 001 100 010011 100 10010001 100110 11 1 110 10 110 00 1001 100110 100 010011 11 100 1 110 10 010011 001 100 110 001 100 010011 100 10010001 100110 11 1 110 10 110
Enhanced with GTI
Confidential McAfee Internal Use Only
Event Collection Compliance Reporting Streamlined Investigations Policy Management Advanced Correlation Log Management
ePolicy Orchestrator Network Security Platform Integrated Security Platform Global Threat Intelligence Vulnerability Manager
Industry Leading Security Information and Event Management
1001 100110 01011
My Pal RT@aguyweknow Very Inspiring article Bit.ly/p0wn3d
11 001 100 010011 100 10010001 100110 11 1 110 10 110 100 1001 100110 100 010011 11 100 1 110 10 010011 001 100 110 11 001 100 010011 100 10010001 100110 11 1 110 10 110
ESM
10010001
10010001 Trigger Alarm Quarantine IP Correlation
!
10010001
! !
Quarantine Endpoint Launch AV Scan Increase Security Detect Connection Attempt
ePO NSM
Confidential McAfee Internal Use Only
Confidential McAfee Internal Use Only
Eliminates performance overhead associated with DB logging
Reconstruct and Examine activity from Login to Logoff
Correlate sensitive information access to users
SSL Connection
ACE uses Rule-Less correlation to determine threat activity
Match new rules against historic events in near Real-Time
Operates independently of event collection.
Patented, high-performance, embedded data access engine
Easy to use. Highly customizable Views / Dashboards.
Customizable Data Source and Correlation rules
Customizable Reporting and Flexible Alarm Management
Primary and Secondary ESMs can be configured
Designed to support 100,000’s events per second
Passive and Active collection technologies
Can be enterprise wide or specific to local receiver.
High Availability Receivers can be configured
Designed to support up to 20,000’s eps per appliance
Receiver forwards unaltered logs to ELM
Ability to manage parsed and raw logs simultaneously
Ensures Forensic Integrity.
Delivers Maximum Storage Efficiency
Local, SAN (Fibre), CIFS, NFS, iSCSI, NAS and Combinations
Receiver
CIFSNFS SAN iSCSI
Application Data Monitor
Content Visibility
ADM
Receiver
ELM Receiver
AES Encrypted Channel AES Encrypted Channel
Enterprise Security Manager
content aware SIEM
Advanced Correlation Engine
Dedicate Correlation Logic Appliance
ACE
Database Event Monitor
Database Transaction Monitoring
DEM
Receiver
AES Encrypted
ELM
Enterprise Log Manager
Fully integrated Compliant Log Management
Event Receiver
3rd Party Log/Event/Flow Collection
Receiver ELM
http:// eMail P2P chat VoIP Shell / FTP LDP, PS
Span or Tap Span or Tap
Full inspection of application content
Identify monitoring blind-spots
Confidential McAfee Internal Use Only