rsa envision: transform your security operations - · pdf filersa envision: transform your...

63
RSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Upload: truongminh

Post on 31-Jan-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

RSA enVision: Transform your Security OperationsA Technical overview & demo of RSA enVisionThe Information Log Management Platform for Security and Compliance Success 

Eoin ThorntonSenior Security ArchitectZinopy Security Ltd.

Page 2: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

FinancialFinancialExecutiveExecutive

R&DR&D

DMZDMZ

Data CenterData Center

Changing Threats and More Demanding Regulations

Careless users leaking IP

New Web 2.0 and P2P  technologies

Costly audit requirements

External attacks

Ever‐changing business requirements

Malicious insiders taking financial info

Page 3: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

IT Staff Feels the Pressure

Real‐time security posture is difficult to understand.

Overwhelming to process raw log and event volume.

Security team lacks visibility into the IT environment.

Compliance is costly and resource‐intensive.

Page 4: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Issues and Needs

Overwhelming to process raw log and event volume.

Real‐time security posture is difficult to understand.

Non‐intrusive log collection to access all event sources.Non‐intrusive log collection to access all event sources.

Complete information lifecycle management process.Complete information lifecycle management process.

Real‐time risk‐based prioritization of events. Real‐time risk‐based prioritization of events. 

Compliance reports in minutes not weeks.Compliance reports in minutes not weeks.

Security team cannot see into the IT environment.

Compliance is time‐consuming.

Page 5: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

RSA enVision 3‐in‐1 SIEM Platform

servers storageapplications / databases

security devices

network devices

SimplifyingCompliance

Compliance reports for regulations and internal policy

AuditingReporting

EnhancingSecurity

Real‐time security alerting and analysis

Forensics Alert / correlation

Optimizing IT & Network Operations

IT monitoring across the infrastructure

VisibilityNetwork baseline

Purpose‐built database(IPDB)

RSA enVision Log Management platform

Page 6: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Simplifying ComplianceRobust Alerting & Reporting

1400 reports+ included out of the box

Easily customizable

Grouped according to standards, e.g. National Laws (SOX, Basel II, JSOX), Industry Regulations (PCI), Best Practices & Standards (ISO 27002, ITIL)

Page 7: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Enhancing SecuritySupport the 3 key aspects of Security Operations

Turn real time events, e.g. threats, into actionable data

Turn real time events, e.g. threats, into actionable data

Create a closed‐loop incident handling process

Create a closed‐loop incident handling process

SIEM technology provides real‐time event management and historical analysis of security data from a wide set of heterogeneous sources. This technology is used to filter incident information into data that can be acted on for the purposes of incident response and forensic analysis.

Mark Nicolette, Gartner

Report on the effectiveness of security management

Report on the effectiveness of security management

Page 8: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Benefits

Turns raw log data into actionable informationIncreases visibility into security, compliance and operational issuesSaves time through compliance reportingStreamlines the security incident handling processLowers operational costs

Page 9: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Why enVision?Any Data ‐ Any Scale

• Collection of any type of log data, real‐time correlation, and best‐in‐breed scalability

Lowest TCO SIEM solution• Appliance form factor, agentless architecture• Flexible but simple customization

Most Complete Security Knowledge• Comprehensive combination of event sources, correlation rules and 

reports• Frequent updates to security knowledgebase• Broad partner eco‐system of strategic technology partners plus front‐

line security and compliance expertiseProven Solution with a large and active install base

• Unparalleled installed base of more than 1600 production customers• Active online customer “Intelligence Community” for shared best 

practices and knowledge All from EMC/RSA

• Simplified IT operations, single point of contact, and global customer support

• Integration with RSA and EMC solutions (e.g. Access Manager, Authentication Manager, Voyence, Celerra, Symmetrix)

Page 10: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

RSA enVisionStand‐alone Appliances to Distributed Solutions

EPS

500

1000

2500

5000

10000

30000

# DEVICES

7500

300,000

100         200 400 750        1250                  1500                2048   30,000

ES Series

LS Series

Page 11: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Collect Collect Collect

RSA enVision DeploymentScales from a single appliance….

Baseline Report Forensics

Manage

DeviceDeviceTrend MicroAntivirus

MicrosoftISS

JuniperIDP

CiscoIPS

NetscreenFirewall

WindowsServer

CorrelatedAlerts

RealtimeAnalysis

LegacyRSA enVision Supported Devices

Integrated Incident Mgmt.

Analyze

EventExplorer

UDS

Interactive Query

Page 12: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

RSA enVision Deployment…to a distributed, enterprise‐wide architecture

A‐SRV: Analysis ServerD‐SRV:  Data ServerLC:  Local CollectorRC:  Remote Collector

MumbaiRemote Office

NAS

ChicagoWW SecurityOperations

LC

D‐SRV

A‐SRV

NAS

LondonEuropeanHeadquarters

D‐SRV

LC

NAS

New YorkWW ComplianceOperations

A‐SRV

D‐SRV D‐SRV

LC LC

Page 13: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Technical demo…

Page 14: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 15: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 16: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 17: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 18: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 19: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 20: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 21: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 22: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 23: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 24: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 25: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 26: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 27: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 28: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 29: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 30: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 31: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 32: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 33: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 34: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 35: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 36: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 37: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 38: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 39: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 40: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 41: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 42: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 43: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 44: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 45: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 46: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 47: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 48: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 49: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 50: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 51: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 52: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 53: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 54: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 55: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 56: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 57: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 58: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 59: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 60: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 61: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 62: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management
Page 63: RSA enVision: Transform your Security Operations - · PDF fileRSA enVision: Transform your Security Operations A Technical overview & demo of RSA enVision The Information Log Management

Thank You!

Any questions?

[email protected]