microfocuscybersummit
play

#MicroFocusCyberSummit Global Protection and Awareness through Data - PowerPoint PPT Presentation

#MicroFocusCyberSummit Global Protection and Awareness through Data Analytics, Threat Detection and Pattern Recognition Charles Clawson, ArcSight Marketing Manager Steven Riley, ArcSight Technical Marketing Manager #MicroFocusCyberSummit


  1. #MicroFocusCyberSummit

  2. Global Protection and Awareness through Data Analytics, Threat Detection and Pattern Recognition Charles Clawson, ArcSight Marketing Manager Steven Riley, ArcSight Technical Marketing Manager #MicroFocusCyberSummit

  3. Visual Agenda Intelligent Security Security Operations Analytics Real time alerting & Data Analysis monitoring Log Management Discover Micro Focus Security strategy Intelligent SecOps use case & Maturity roadmap ArcSight Marketplace ArcSight ESM Security Analytics ArcSight Investigate 3rd party Activate Use case Threat Intel ArcSight Data Platform

  4. Company Discover the New

  5. The New Combined Company: Micro Focus Built on stability, acquisition and innovation Network Management/ COBOL Data Protector Years Years

  6. Combined Micro Focus: An Industry Shaper Microsoft Oracle SAP $7.1 Salesforce $5.1 $4.9 $4.4 $4.0 $3.4 $3.3 Adobe Symantec #7 HPE SW / MF HPE SW / MF CA Gemalto Citrix Dassault $3.2 $3.1 $2.5 $2.5 $2.4 $2.3 $2.1 $2.1 $2.0 $2.0 $1.9 $1.9 $1.8 $1.7 $1.7 $1.4 $1.3 $1.2 $1.1 SAS #12 HPE SW HPE SW Infor Veritas Autodesk Synopsys CDK Global Red Hat Asseco BMC Nuance Constellation Open Text Cadence Check Point #26 Microfocus Micro Focus Workday ServiceNow Informatica

  7. 4 Focus Areas Four Focus Areas Security & Data Hybrid IT Predictive DevOps Management Analytics Management

  8. Protecting Data Apps What Security Analytics Matters Most Users

  9. One of the Worlds Most Powerful Security Portfolios

  10. ArcSight Empowers Intelligent Security Operations

  11. What Are the Top CISO Priorities Click icon to add picture Reduce business Decrease impacts of Detect and stop downtime and security events security threats non-compliance

  12. Challenges to the Security Operations Center Limited detection Complex and slow Increasing rate and investigation of data response tools capabilities

  13. Intelligent Security Operations Increase Speed, Simplicity and Effectiveness Across Entire Workflow Visibility Without Comprehensive Intuitive Boundaries Detection Investigation

  14. ArcSight Drives Business Profits Open Comprehensive Intuitive architecture detection investigation Reduce data Reduce time Minimize risk and licensing and human and data loss costs struggle

  15. All Departments Benefit Security & Risk IT operations Compliance & Legal Line of Business management

  16. Proven, Accurate and Fast ArcSight Investigate ArcSight ESM ArcSight ADP

  17. Open, Relevant and Intuitive ArcSight Investigate Investigation | Security Analytics ArcSight ESM Real-time correlation | Alerting | Workflow ArcSight Data Platform Connectors | Event Broker | Management | Logger

  18. Security Operations Use Cases & Maturity Roadmap

  19. Intelligent Security Operations – Use case Roadmap Intelligent Security Operations Security Analytics • Integrated monitoring • People & Process & • Behavior Profiling Technology • Threat detection Real time alerting • Efficiency & Resilience • Know the unknown & monitoring Data Analysis • Detect & identify • Respond in time • Forensics • Build workflow • Rapid Search Log Management • Reporting • Centralize Logs • Retain data • Compliance

  20. Intelligent Security Operations – Capability Roadmap Analytics & SIOC ArcSight Investigate Intelligent Security ArcSight ESM Operations Security Analytics • Integrated monitoring • People & Process & • Behavior Profiling ArcSight Data Platform Technology • Threat detection Real time alerting • Efficiency & Resilience • Know the unknown & monitoring Data Analysis • Detect & identify • Respond in time • Forensics • Build workflow • Rapid Search Log Management • Reporting • Centralize Logs • Retain data • Compliance

  21. ArcSight Data Platform Expand the visibility of your data

  22. Visibility Without Boundaries Open architecture Integrate data lakes to maximize usage with security apps Scalability through Keep up with growing variety and velocity environments Faster detection with Real-time security business optics context

  23. ArcSight Security Technology Partners DDoS Technology Partners Threat Application GRC Intelligence Security SIEM

  24. ArcSight Data Platform in Nutshell Arcsight Management Console Event Broker Logger Connector Collect Enrich Distribute Retain Search Report

  25. Data Retention (Logger)  Cost-effective universal log management  Unifies searching, reporting and analysis  Scale  1M EPS in a 100 peers architecture  100 Concurrent search  Performance  Search speed improvements by 50-200%  10:1 compression ration to store up to 1200 TB  Security  Data at rest encryption on ADP appliances

  26. Management Console – End to End Monitoring Topology view for consolidated overview Display device information on hover Sort devices by region / groups

  27. Instant Connector Deployment ArcMC 2.70, Connectors 7.70 Benefit: Improve security administrator productivity by providing a quick and easy deployment option so that they onboard new data sources or readjust connectors deployment layout quickly with ease. Capability: Connector deployment on remote hosts through • ArcSight UI In-context deployment View UI • Re-usable deployment templates with • configuration values for source and destination Many Connectors to a single host • • Centralized management of long running deployment jobs 45

  28. Enhanced Topology View ArcMC 2.70, Event Broker 2.10 Benefit: Improve analyst productivity by giving them a centralized monitoring tool so that they can optimize their time and do more with ease. Capability: View Event Broker topics in Topology view on • ArcMC Get visibility into consumer connectivity through • ArcMC 47

  29. Logger 6.5 Updates Benefit: Easy to use Logger reporting tools with an enhanced UI help optimize analyst time and generate comprehensive reports and dashboards for compliance and other use cases Capability: Create Reports from Logger Queries • • Archives will include Indexes ADP Logger standalone mode: both for • appliances and software Complete support for SHA-2: receivers and • forwarders, archiving, SSL signatures • Complete support for TLS 1.2: peer communications, on-board connector • Dark Theme for Logger 48

  30. Data De-identification for Privacy (GDPR, health..) Format Preserving Encryption by Voltage embedded john.doe@arcsight.com uwol.clu@qnmpdsaa.kle De-identify sensitive data Logger Source ArcSight Event data ESM Connector 3rd party

  31. ArcSight ESM Comprehensive Detection

  32. ArcSight ESM in Nutshell Detection Investigation Active 3rd party Case Enrichment Rules Engine Context Channel action Management • Asset Model • Real-time rules • Rich news feeds • Enrichment • Integration • Annotations Commands • Network Model • Data Monitors • Drill down • Baselines/ trends • Stages and • Action impact • Vulnerability • Prioritization • Visuals • Lists Connectors • Integration • Search • Partners 54

  33. 250 Ready Made, Tested and Documented Use Cases Activate use case configurator

  34. Value for Everyone Openness • Detailed data • Increase TTV via source Marketplace content configuration • SOC Workflow SOC information Efficiency Engineer • Categorization + • Content Maintainability Manager Product Packages • Reduced Training Cost Content Analyst Author • Community • Actionable Output • Components & • Structured event Solutions handling • Methodology

  35. 4x more with same headcount ESM & Activate adoption increased SOC efficiency 4x

  36. Activate Content Layers

  37. ArcSight ESM with Fresh & Relevant Content Market-leading Real-time Activate example: Wanna Cry Dashboard released in few hours Correlation Threat Lifecycle Tailored use cases Central integration point for the SOC process Integrated SOC platform

  38. Secure the New Voltage Fortify ArcSight Data Security App Security Security Operations NetIQ Identity 70

  39. ArcSight Enterprise Security Manager (ESM) Summary Enriched Data Powerful Correlation Quick Detection Multi-tenancy

  40. Threat Intelligence

  41. Threat Intel context is the king! Who is behind this? Where is it comming from? How bad is it? Do we know them? Is it related to ..?

  42. But what Threat Intel? 75

  43. ArcSight Threat Intelligence Program Reputation Security Monitor Activate Threat Intelligence Currated list of malicious IPs and domains Open TI program for Activate use case

  44. Activate TI Data Fusion Model 3 Track 2 Context 1 Populate 0 Ingest

  45. Threat Intel Activity Dashboard 78

  46. ArcSight Investigate

  47. What Do We Need to Address These Challenges? Intelligent Threat Investigation Solution Act faster Work smarter Reach further

  48. ArcSight Investigate Analytics optimized and robust engine Guided natural language search box Modern and intuitive data manipulations Powerful built-in analytics modules

Recommend


More recommend