fluency - closing the security gap - next generation incident response

2
Copyright ©2003 - 2015 lumenate.com Closing the security gap Networks have evolved at an astonishing rate, becoming more complex and porous. In most cases there are multiple ways in and out of networks providing business continuity but sometimes making breadth of security more challenging. Equally important, while less publicized, internal actions taken by employees and contractors that have access to the network can cause some of the most catastrophic damage. Enabling users to connect remotely from anywhere and share information quickly has become critical to operational efficiency; security solutions defending these networks have not evolved at the same speed. A new approach is required - one that has adapted to the connected world where security cannot be GUARANTEED and threats require action in real time. Fluency DELIVERS. Threats succeed today as security teams are overwhelmed with the exponentially increasing number of alerts generated by existing security solutions. Coupled with the massive number of alerts, investigation must include examination into patterns and intelligence to identify if an adversary has penetrated the environment and where/when the breach occurred. Organizations need a platform that decreases the amount of alerts - Fluency DELIVERS through an interface that sees all the context of the flow and alert data allowing action to be taken in near real time. Fluency is Next Generation Incident Response utilizing patent pending Big Data Analytics. Fluency improves the security posture of any organization leveraging the investments made in current security technologies providing analysis of the entire network through a single solution with a centralized management console, regardless of location. Fluency takes in all network flow data, as well as, multiple log feeds from disparate security solutions. Fluency analyzes, fuses, then cross correlates flow and log data to detect indicators of compromise. Fluency additionally validates the alerts against reputation & validation engines. The result - Fluency finds events that did not create an alert providing the insight and visibility into the data immediately identifying gaps that require action before they become large and public. Furthermore, Fluency maintains vigilance continuing to monitor for further signs of threats and indicators of compromise. ® Fluency Today’s Solutions Focus on Detection, Which Hinders Response. Fluency Provides the Means to Execute a Response Consistently, Comprehensively & Continuously in Near Real Time. Fluency can be deployed in three different ways: - All-in-one passive appliance - Customer premise sensor and appliances - As a cloud service where sensors reside at ingress/egress points and server is hosted in the cloud

Upload: collin-miles

Post on 15-Apr-2017

361 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Fluency - Closing the Security Gap - Next Generation Incident Response

Copyright ©2003 - 2015 lumenate.com

Real world value Fluency has provided customers:

• Reduced number of alerts needing analysis from 450,000,000 to 16 per day.

• Discovered 12 actionable incidents that a�ected 14 devices in 14 days that existing security systems (IPS, Anti-Virus, Etc.) did not detect.

• Detected an internal host communicating with 696 IP’s located in 46 di�erent countries that triggered 6 alerts that other security solutions deployed in the environment trusted.

• Found 3 internal hosts attempting to communicate with a malware site that had 2 domain names, this site was detected to host malware Nuclear EK.

• Discovered over 620 infected machines and 130 C&C systems with more than 10GB of data leaving a day. All deployed solutions showed the attack was prevented. Fluency showed that there was a breach and provided a means to stop it.

Today, Executive Teams must realize the importance of properly and proactively improving the security posture of their organization, not as a state of perfection, but a required ongoing process of self-evaluation and informed actions adapting to the ever changing threat landscape. As it is becoming increasing common for the Board of Directors to place the blame of breaches on CEOs and C-level executives first. Real world examples are becoming common; the Target CEO stepped down soon after the Target breach after multiple conversations with the Board (Source: Fortune, Here’s who boardrooms are blaming for data breaches, May 29, 2015). (Source: Chart, Veracode)

AccountabilityWho do you hold accountable when a major breach occurs at your company?

Fluency PROVIDES RESULTS that are critical in quickly identifying the threats that have the potential to inflict existential financial, brand and organizational destruction. The requirement TODAY is implementing a solution and processes that achieve the required/responsible Cybersecurity posture that the Board, Investors and Customers mandate.

Fluency CLOSES THE GAP.

Closing the security gapNetworks have evolved at an astonishing rate, becoming more complex and porous. In most cases there are multiple ways in and out of networks providing business continuity but sometimes making breadth of security more challenging. Equally important, while less publicized, internal actions taken by employees and contractors that have access to the network can cause some of the most catastrophic damage. Enabling users to connect remotely from anywhere and share information quickly has become critical to operational e�ciency; security solutions defending these networks have not evolved at the same speed. A new approach is required - one that has adapted to the connected world where security cannot be GUARANTEED and threats require action in real time. Fluency DELIVERS.

Threats succeed today as security teams are overwhelmed with the exponentially increasing number of alerts generated by existing security solutions. Coupled with the massive number of alerts, investigation must include examination into patterns and intelligence to identify if an adversary has penetrated the environment and where/when the breach occurred. Organizations need a platform that decreases the amount of alerts - Fluency DELIVERS through an interface that sees all the context of the flow and alert data allowing action to be taken in near real time.

Fluency is Next Generation Incident Response utilizing patent pending Big Data Analytics. Fluency improves the security posture of any organization leveraging the investments made in current security technologies providing analysis of the entire network through a single solution with a centralized management console, regardless of location. Fluency takes in all network flow data, as well as, multiple log feeds from disparate security solutions. Fluency analyzes, fuses, then cross correlates flow and log data to detect indicators of compromise. Fluency additionally validates the alerts against reputation & validation engines.

The result - Fluency finds events that did not create an alert providing the insight and visibility into the data immediately identifying gaps that require action before they become large and public. Furthermore, Fluency maintains vigilance continuing to monitor for further signs of threats and indicators of compromise.

®Fluency

Today’s Solutions Focus on Detection, Which Hinders Response.

Fluency Provides the Means to Execute a Response Consistently, Comprehensively & Continuously in Near Real Time.

Fluency can be deployed in three di�erent ways:- All-in-one passive appliance

- Customer premise sensor and appliances

- As a cloud service where sensors reside at ingress/egress points and server is hosted in the cloud

Page 2: Fluency - Closing the Security Gap - Next Generation Incident Response

866.358.8999 | lumenate.com | fluencysecurity.com

Fluency solution is available through Lumenate. For more information visit www.lumenate.com or contact:

Collin Miles [email protected] call 214.334.2670

Why LumenateAt Lumenate, we are award-winning architects of flexible infrastructures, protectors of our customers' digital assets, and connectors to information everywhere. We deliver business outcomes through our proven nCubed approach which extracts our customers’ vision of ‘Nirvana’, assesses their 'Now' state, and then thoughtfully creates a roadmap for the ’Next’. With a national presence and services capabilities to design, implement, manage, monitor and maintain, we unlock the value of market-leading technology solutions from our strategic technology partners for customers who demand more than products - - they demand solutions that drive business impact. Welcome to the LumeNation.

Real world value Fluency has provided customers:

• Reduced number of alerts needing analysis from 450,000,000 to 16 per day.

• Discovered 12 actionable incidents that a�ected 14 devices in 14 days that existing security systems (IPS, Anti-Virus, Etc.) did not detect.

• Detected an internal host communicating with 696 IP’s located in 46 di�erent countries that triggered 6 alerts that other security solutions deployed in the environment trusted.

• Found 3 internal hosts attempting to communicate with a malware site that had 2 domain names, this site was detected to host malware Nuclear EK.

• Discovered over 620 infected machines and 130 C&C systems with more than 10GB of data leaving a day. All deployed solutions showed the attack was prevented. Fluency showed that there was a breach and provided a means to stop it.

Today, Executive Teams must realize the importance of properly and proactively improving the security posture of their organization, not as a state of perfection, but a required ongoing process of self-evaluation and informed actions adapting to the ever changing threat landscape. As it is becoming increasing common for the Board of Directors to place the blame of breaches on CEOs and C-level executives first. Real world examples are becoming common; the Target CEO stepped down soon after the Target breach after multiple conversations with the Board (Source: Fortune, Here’s who boardrooms are blaming for data breaches, May 29, 2015). (Source: Chart, Veracode)

AccountabilityWho do you hold accountable when a major breach occurs at your company?

Fluency PROVIDES RESULTS that are critical in quickly identifying the threats that have the potential to inflict existential financial, brand and organizational destruction. The requirement TODAY is implementing a solution and processes that achieve the required/responsible Cybersecurity posture that the Board, Investors and Customers mandate.

Fluency CLOSES THE GAP.

Closing the security gapNetworks have evolved at an astonishing rate, becoming more complex and porous. In most cases there are multiple ways in and out of networks providing business continuity but sometimes making breadth of security more challenging. Equally important, while less publicized, internal actions taken by employees and contractors that have access to the network can cause some of the most catastrophic damage. Enabling users to connect remotely from anywhere and share information quickly has become critical to operational e�ciency; security solutions defending these networks have not evolved at the same speed. A new approach is required - one that has adapted to the connected world where security cannot be GUARANTEED and threats require action in real time. Fluency DELIVERS.

Threats succeed today as security teams are overwhelmed with the exponentially increasing number of alerts generated by existing security solutions. Coupled with the massive number of alerts, investigation must include examination into patterns and intelligence to identify if an adversary has penetrated the environment and where/when the breach occurred. Organizations need a platform that decreases the amount of alerts - Fluency DELIVERS through an interface that sees all the context of the flow and alert data allowing action to be taken in near real time.

Fluency is Next Generation Incident Response utilizing patent pending Big Data Analytics. Fluency improves the security posture of any organization leveraging the investments made in current security technologies providing analysis of the entire network through a single solution with a centralized management console, regardless of location. Fluency takes in all network flow data, as well as, multiple log feeds from disparate security solutions. Fluency analyzes, fuses, then cross correlates flow and log data to detect indicators of compromise. Fluency additionally validates the alerts against reputation & validation engines.

The result - Fluency finds events that did not create an alert providing the insight and visibility into the data immediately identifying gaps that require action before they become large and public. Furthermore, Fluency maintains vigilance continuing to monitor for further signs of threats and indicators of compromise.

CEO

CIO

Entire Executive Team

CISO

Board Members

Other

1

2

3

4

5

6