Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

SIEM in the Age of Digital Transformation

May 26, 2016 No Comments

Featured article by Dr. Partha Bhattacharya, Chief Technology Officer at AccelOps

As digital transformation and the Internet of Things (IoT) gain momentum, enterprises will be exposed to new forms of incoming data and external connections that can potentially create pinholes in existing network security environments. Meanwhile, network and security operations teams are struggling to gain visibility into the landscape while attempting to manage and secure any number of moving endpoints and analyze trends and anomalies in real time – a monumental challenge, to say the least.

In the first of a two-part series, we examine the current SIEM market and factors to consider before selecting a SIEM solution for your network.

SIEM Solution Capabilities

Network and security operation teams are using multiple monitoring programs to handle these technology shifts. Each program has its own unique user interface, programmed to monitor one appliance or another. This trend has also introduced a variety of Security Information and Event Management (SIEM) vendors in the past several years.

There are many factors to consider when comparing SIEM solutions, particularly when faced with the proliferation of virtual networks into today’s enterprise environments. There are many claims made by these SIEM vendors today. However, when you take a closer look, or worse, install the solution and train your staff, you may find that your SIEM solution is not providing you with the capabilities you need in your current or future environment.

Look closely at key capabilities before deciding on and installing any SIEM solution. Explore all the variables and limitations of each product to help you determine the best solution for your environment. Finally, be sure to include both network and security ops teams in the decision to insure key stakeholders’ needs are considered. Doing so will result in a consolidated, comprehensive approach that will encourage these key teams to work together in the future.

Scalability and Architecture

SIEM solutions must be flexible, scalable and cloud-ready to meet your current needs and set you up for success in the future, regardless of what your network environment looks like. IT teams must be able to discover and identify any device connecting to the network in real time, a tall order in today’s dynamic environment. Below are a few of the key benefits of a virtual appliance over a hardware-based solution:

– Multi-tenant design to handle overlapping IP addresses and reporting domains

– Flexible form factors that support modular components through a single, seamless platform

– Cloud-ready to support environments such as AWS and Azure

– Ability to scale log collection and parsing without falling behind

– Ability to scale, search and report with real-time correlation of event data points

– Hardened operating system to facilitate upgrades

Deploy, Manage and Administrate Easily

To ensure a rapid time to value, IT personnel need solutions that are easy to deploy, manage and administrate. It is imperative the solution provides a cross-correlation of network and security operation analytics to insure a holistic view of the organization. When comparing solutions, consider these key points:

– Easy software upgrade with no downtime and event loss

– Ability to immediately patch critical OS vulnerabilities

– Tiered access controls to support multiple admin levels and the data each user can see

– Secure user authentication via external credentials or two-factor authentication

– Web-based GUI that provides all analytics from a single user interface. Some leading solutions require users to switch between three, or more, separate GUIs to see the entire landscape.

– Full audit trail of user activity

Event Data Collection in Real Time

Solutions that offer high-volume log ingestion with minimal delay or loss meet current best practices. Identify solutions that can consume and analyze high volumes of log data, from both current devices and future sources of log data. Be aware that some leading solutions max out at 5K events per second (EPS) per log manager and only allocate 2K EPS to the event manager. Key elements include:

– A real-time audit trail for IP addresses, user identity, physical and geo-location to develop a time-based network identity to user identity mapping by combining information from DHCP, domain controller, VPN, WLAN logs etc.

– The ability to parse a log to any number of attributes. Solutions that use a NoSQL database to parse data, as opposed to the limited requirements of a relational database schema, will allow users to more easily create a new attribute on demand.

– A distributed collector architecture that is load-balanced for data collection to insure peaks in log data aren’t being lost due to the a single collector’s limitations

– The ability to identify asset and device context through a discovery engine that collects configuration, hardware, installed software, running processes, patches and network topology in real time

– A collection system that captures application-contextual information for triaging security issues

– Agentless log collection whenever possible and the ability to identify performance issues associated with IoT endpoints such a CPU and memory utilization changes

Monitoring in Real Time

To increase remediation speeds, it’s critical to have the ability to rapidly detect issues. Some solutions claim to offer real-time monitoring, but they make the process complex and, ultimately, incomplete. Some current providers, for instance, have Web GUIs that only work with the Event Manager database. Other noteworthy capabilities to consider are:

– Scalable alerts on complex event patterns in real time, including all events from any log source

– Ability to search events in real time in a streaming mode from one GUI

– Ability to search historical events through SQL-like queries and Boolean filter conditions

– Discovery of CMDB objects and user/identity and location in searches and rules that do not have to be manually defined

– Searching of events across organizations, seamlessly. Especially important for Ops teams that manage multiple networks or MSPs

– Dynamic watch lists that track critical violators and then use them in rules

– Scalable analytics and incident prioritization via Business Service

– A Business Service Dashboard that shows the impact of security, availability and performance issues

In the second of this two-part series, we’ll take a look at what it means to have cybersecurity through visibility, as well as how advanced threat detection, threat intelligence integration and other elements can spell success or disaster for your SIEM strategy.

About the author:

Dr. Partha Bhattacharya is co-founder, chief technology officer and vice president of engineering at AccelOps. He has more than 20 years of experience in networking, security, database, system architecture and software development. Before AccelOps, he founded Protego Networks, where as CTO he created the award-winning MARS security appliance product line. After Protego’s acquisition by Cisco Systems, he led the Cisco team that extended the product’s capabilities to satisfy a global market. Before Protego, Partha was architect and technical lead at Cisco in charge of implementing the company’s security management infrastructure in the PIX, IOS, firewall, VPN, router and IDS products. Partha holds 15 patents and is the recipient of two IBM Outstanding Innovation Awards and a fellowship from the University of Maryland Systems Research Center. He holds a Ph.D. in electrical engineering from the University of Maryland.

 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner

WomeninTech