#MicroFocusCyberSummit Global Protection and Awareness through Data - - PowerPoint PPT Presentation

microfocuscybersummit
SMART_READER_LITE
LIVE PREVIEW

#MicroFocusCyberSummit Global Protection and Awareness through Data - - PowerPoint PPT Presentation

#MicroFocusCyberSummit Global Protection and Awareness through Data Analytics, Threat Detection and Pattern Recognition Charles Clawson, ArcSight Marketing Manager Steven Riley, ArcSight Technical Marketing Manager #MicroFocusCyberSummit


slide-1
SLIDE 1

#MicroFocusCyberSummit

slide-2
SLIDE 2

#MicroFocusCyberSummit

Global Protection and Awareness through Data Analytics, Threat Detection and Pattern Recognition

Charles Clawson, ArcSight Marketing Manager Steven Riley, ArcSight Technical Marketing Manager

slide-3
SLIDE 3

Log Management Data Analysis Real time alerting & monitoring Security Analytics Intelligent Security Operations

Visual Agenda

Discover Micro Focus Security strategy Intelligent SecOps use case & Maturity roadmap

ArcSight Marketplace ArcSight ESM ArcSight Data Platform

ArcSight Investigate

3rd party Security Analytics

Activate Use case

Threat Intel

slide-4
SLIDE 4

Company

Discover the New

slide-5
SLIDE 5

Network Management/ Data Protector

COBOL

The New Combined Company: Micro Focus

Built on stability, acquisition and innovation

Years Years

slide-6
SLIDE 6

$7.1 $5.1 $4.9 $4.4 $4.0 $3.4 $3.3 $3.2 $3.1 $2.5 $2.5 $2.4 $2.3 $2.1 $2.1 $2.0 $2.0 $1.9 $1.9 $1.8 $1.7 $1.7 $1.4 $1.3 $1.2 $1.1

Microsoft Oracle SAP Salesforce Adobe Symantec HPE SW / MF CA Gemalto Citrix Dassault SAS HPE SW Infor Veritas Autodesk Synopsys CDK Global Red Hat Asseco BMC Nuance Constellation Open Text Cadence Check Point Microfocus Workday ServiceNow Informatica

Combined Micro Focus: An Industry Shaper

#12

HPE SW HPE SW / MF

#7

Micro Focus

#26

slide-7
SLIDE 7

4 Focus Areas

Four Focus Areas

DevOps

Hybrid IT Management Security & Data Management Predictive Analytics

slide-8
SLIDE 8

Users Apps Data

Security Analytics

Protecting

What Matters Most

slide-9
SLIDE 9

One of the Worlds Most

Powerful Security Portfolios

slide-10
SLIDE 10

ArcSight Empowers Intelligent Security Operations

slide-11
SLIDE 11

Click icon to add picture Decrease impacts of security events Detect and stop security threats Reduce business downtime and non-compliance

What Are the Top CISO Priorities

slide-12
SLIDE 12

Challenges to the Security Operations Center

Increasing rate

  • f data

Limited detection and response tools Complex and slow investigation capabilities

slide-13
SLIDE 13

Intelligent Security Operations

Increase Speed, Simplicity and Effectiveness Across Entire Workflow Visibility Without Boundaries Comprehensive Detection Intuitive Investigation

slide-14
SLIDE 14

ArcSight Drives Business Profits

Open architecture Reduce data and licensing costs Comprehensive detection Minimize risk and data loss Intuitive investigation Reduce time and human struggle

slide-15
SLIDE 15

Security & Risk management IT operations Compliance & Legal Line of Business

All Departments Benefit

slide-16
SLIDE 16

Proven, Accurate and Fast

ArcSight Investigate ArcSight ESM ArcSight ADP

slide-17
SLIDE 17

Open, Relevant and Intuitive

ArcSight Investigate

Investigation | Security Analytics

ArcSight ESM

Real-time correlation | Alerting | Workflow

ArcSight Data Platform

Connectors | Event Broker | Management | Logger

slide-18
SLIDE 18

Security Operations Use Cases & Maturity Roadmap

slide-19
SLIDE 19

Intelligent Security Operations – Use case Roadmap

Log Management

  • Centralize Logs
  • Retain data
  • Compliance

Data Analysis

  • Forensics
  • Rapid Search
  • Reporting

Real time alerting & monitoring

  • Detect & identify
  • Respond in time
  • Build workflow

Security Analytics

  • Behavior Profiling
  • Threat detection
  • Know the unknown

Intelligent Security Operations

  • Integrated monitoring
  • People & Process &

Technology

  • Efficiency & Resilience
slide-20
SLIDE 20

Intelligent Security Operations – Capability Roadmap

Log Management

  • Centralize Logs
  • Retain data
  • Compliance

Data Analysis

  • Forensics
  • Rapid Search
  • Reporting

Real time alerting & monitoring

  • Detect & identify
  • Respond in time
  • Build workflow

Security Analytics

  • Behavior Profiling
  • Threat detection
  • Know the unknown

Intelligent Security Operations

  • Integrated monitoring
  • People & Process &

Technology

  • Efficiency & Resilience

ArcSight Data Platform ArcSight ESM ArcSight Investigate Analytics & SIOC

slide-21
SLIDE 21
slide-22
SLIDE 22

ArcSight Data Platform

Expand the visibility of your data

slide-23
SLIDE 23

Visibility Without Boundaries

Faster detection with business optics Real-time security context

Keep up with growing environments Scalability through variety and velocity

Integrate data lakes with security apps Open architecture to maximize usage

slide-24
SLIDE 24

ArcSight Security Technology Partners

Partners

DDoS

GRC SIEM Application Security Threat Intelligence

Technology

slide-25
SLIDE 25

ArcSight Data Platform in Nutshell

Collect Enrich Distribute Retain Search Report Connector Event Broker Logger Arcsight Management Console

slide-26
SLIDE 26
  • Cost-effective universal log management
  • Unifies searching, reporting and analysis
  • Scale
  • 1M EPS in a 100 peers architecture
  • 100 Concurrent search
  • Performance
  • Search speed improvements by 50-200%
  • 10:1 compression ration to store up to 1200 TB
  • Security
  • Data at rest encryption on ADP appliances

Data Retention (Logger)

slide-27
SLIDE 27

Management Console – End to End Monitoring

Topology view for consolidated overview Display device information

  • n hover

Sort devices by region / groups

slide-28
SLIDE 28

Instant Connector Deployment

ArcMC 2.70, Connectors 7.70

Capability:

  • Connector deployment on remote hosts through

ArcSight UI

  • In-context deployment View UI
  • Re-usable deployment templates with

configuration values for source and destination

  • Many Connectors to a single host
  • Centralized management of long running

deployment jobs

45

Benefit: Improve security administrator productivity by providing a quick and easy deployment option so that they onboard new data sources or readjust connectors deployment layout quickly with ease.

slide-29
SLIDE 29

Enhanced Topology View

ArcMC 2.70, Event Broker 2.10

Capability:

  • View Event Broker topics in Topology view on

ArcMC

  • Get visibility into consumer connectivity through

ArcMC

47

Benefit: Improve analyst productivity by giving them a centralized monitoring tool so that they can optimize their time and do more with ease.

slide-30
SLIDE 30

Logger 6.5 Updates

Capability:

  • Create Reports from Logger Queries
  • Archives will include Indexes
  • ADP Logger standalone mode: both for

appliances and software

  • Complete support for SHA-2: receivers and

forwarders, archiving, SSL signatures

  • Complete support for TLS 1.2: peer

communications, on-board connector

  • Dark Theme for Logger

48

Benefit: Easy to use Logger reporting tools with an enhanced UI help optimize analyst time and generate comprehensive reports and dashboards for compliance and other use cases

slide-31
SLIDE 31

Data De-identification for Privacy (GDPR, health..)

Format Preserving Encryption by Voltage embedded

Source Event data Logger ESM 3rd party ArcSight Connector

john.doe@arcsight.com uwol.clu@qnmpdsaa.kle

De-identify sensitive data

slide-32
SLIDE 32

ArcSight ESM

Comprehensive Detection

slide-33
SLIDE 33

54

ArcSight ESM in Nutshell

Enrichment

  • Asset Model
  • Network Model
  • Vulnerability

Rules Engine

  • Real-time rules
  • Data Monitors
  • Prioritization

Active Channel

  • Rich news feeds
  • Drill down
  • Visuals

Context

  • Enrichment
  • Baselines/ trends
  • Lists
  • Search

3rd party action

  • Integration

Commands

  • Action

Connectors

  • Partners

Case Management

  • Annotations
  • Stages and

impact

  • Integration

Detection Investigation

slide-34
SLIDE 34

250 Ready Made, Tested and Documented Use Cases

Activate use case configurator

slide-35
SLIDE 35

Value for Everyone

  • Actionable Output
  • Structured event

handling

  • Community
  • Components &

Solutions

  • Methodology
  • Increase TTV via

Marketplace content

  • SOC Workflow

Efficiency

  • Content Maintainability
  • Reduced Training Cost
  • Detailed data

source configuration information

  • Categorization +

Product Packages

Engineer SOC Manager Analyst Content Author

Openness

slide-36
SLIDE 36

4x more with same headcount

ESM & Activate adoption increased SOC efficiency 4x

slide-37
SLIDE 37

Activate Content Layers

slide-38
SLIDE 38

ArcSight ESM with Fresh & Relevant Content

Activate example: Wanna Cry Dashboard released in few hours

Market-leading Real-time Correlation Threat Lifecycle Tailored use cases Central integration point for the SOC process Integrated SOC platform

slide-39
SLIDE 39

70

Secure the New

ArcSight

Security Operations

Voltage

Data Security

NetIQ

Identity

Fortify

App Security

slide-40
SLIDE 40

Enriched Data Powerful Correlation Quick Detection Multi-tenancy

ArcSight Enterprise Security Manager (ESM) Summary

slide-41
SLIDE 41

Threat Intelligence

slide-42
SLIDE 42

Threat Intel context is the king!

Who

is behind this?

Where

is it comming from?

How

bad is it?

Do

we know them?

Is

it related to ..?

slide-43
SLIDE 43

75

But what Threat Intel?

slide-44
SLIDE 44

ArcSight Threat Intelligence Program

Reputation Security Monitor Activate Threat Intelligence

Currated list of malicious IPs and domains Open TI program for Activate use case

slide-45
SLIDE 45

Ingest 1 Populate 2 Context 3 Track

Activate TI Data Fusion Model

slide-46
SLIDE 46

78

Threat Intel Activity Dashboard

slide-47
SLIDE 47

ArcSight Investigate

slide-48
SLIDE 48

What Do We Need to Address These Challenges?

Intelligent Threat Investigation Solution Act faster Work smarter Reach further

slide-49
SLIDE 49

ArcSight Investigate

Analytics optimized and robust engine Guided natural language search box Modern and intuitive data manipulations Powerful built-in analytics modules

slide-50
SLIDE 50

Reach Further

Confidently hunt across all of your data Seamless view Accross Investigate and Hadoop Optimize storage Short term in Investigate Long term in Hadoop

Vertica

Event Broker

Store data Search & Analyze

Hadoop /HDFS Investigate application

Data flow Data lake Connectors

HPE CONFIDENTIAL

slide-51
SLIDE 51

Act Faster to Identify and Respond to Threats

  • Decrease the impact of security incidents
  • Minimize downtime by uncovering hidden threats

Work Smarter with an Intuitive Solution

  • Be productive from “Day 1”
  • Reduce response time to advanced attacks

Reach Further by Leveraging Data Lakes

  • Reduce risk by expanding the scope of investigation
  • Lower TCO by optimizing data management cost

92

ArcSight Investigate Benefits

HPE CONFIDENTIAL

slide-52
SLIDE 52

Capability:

  • Ready made security-centric visuals out of

the box

  • Graphs include field assignments without

input from analyst

  • Retool visualizations to your needs
  • Categories available- Authentication Activity,

Source Activity, Destination Activity & others

94

Built-in Security Analytics

Benefit: Increase analyst efficiency and provide ease of use with pre-defined visuals defined for specific use cases and removes guess work from the security investigation process

slide-53
SLIDE 53

Capability:

  • Perform database table join
  • Query the Investigate database

to determine if anyone in the environment established a connection with a host on the malicious IP address list

95

Lookup List (Joins) Feature

Benefit: Security practitioners can now run searches and add additional context information while importing a list for data enrichment purposes.

slide-54
SLIDE 54

Capability:

  • Instantly identify the users impacted by a

security event

96

Find the User

Benefit: Ability to search for and find the authenticated user for a particular event or incident helps analysts save time finding who was impacted and speed up incidence response.

slide-55
SLIDE 55

Capability:

  • Ready made security-centric visuals out of

the box

  • Graphs include field assignments without

input from analyst

  • Retool visualizations to your needs
  • Categories available- Authentication

Activity, Source Activity, Destination Activity & others

98

Built-in Security Analytics

Benefit: Increase analyst efficiency and provide ease of use with pre-defined visuals defined for specific use cases and removes guess work from the security investigation process

slide-56
SLIDE 56

Investigate: Quick Security Insights (pre-defined viz)

Login by username Login by User

slide-57
SLIDE 57

Unresolved Malware – Infected Host Investigation

Pivoting from search results to enable intuitive investigations.

100

slide-58
SLIDE 58

101

Time-chart Based Hunting – Detect the Outliers

DNS Domain Analysis over Time

slide-59
SLIDE 59

102

Outlier Detection to Assist SOC Analyst

slide-60
SLIDE 60

103

User Behavior Analytics – Peer Comparison

slide-61
SLIDE 61

104

Search to Detection in Seconds – Complete Visibiliy

slide-62
SLIDE 62
  • Detected the C2 server (fansfootball.com)
  • Detected a compromised account (Luke)
  • Detected lateral movement
  • Detected an additional compromised host (10.100.1.8)
  • Found indication of data exfiltration (bytes out through SSH)
  • Established the attack timeline

105

Value Proposition & Key Benefits

slide-63
SLIDE 63

Thank You.

#MicroFocusCyberSummit

slide-64
SLIDE 64

#MicroFocusCyberSummit