Howtochoosetherightsecurityinformationandeventmanagementsiemsolution 150811151732 Lva1 App6892

Published on June 2016 | Categories: Documents | Downloads: 33 | Comments: 0 | Views: 87
of 29
Download PDF   Embed   Report

How to choose the right security information and event management siem solution

Comments

Content

How to Choose the Right Security
Information and Event
Management (SIEM) Solution
John Burnham
Director, Strategic Communications and Analyst Relations
IBM Security

Chris Meenan
Director, Security Intelligence Product Management and Strategy
IBM Security

© 2015 IBM Corporation

Agenda

 Introduction
 2015 Gartner Magic Quadrant for SIEM
 IBM Security QRadar SIEM Solutions
– How we got here

© 2015 IBM Corporation

2

Agenda

 Introduction
 2015 Gartner Magic Quadrant for SIEM
 IBM Security QRadar SIEM Solutions
– How we got here

© 2015 IBM Corporation

3

QRadar in Gartner MQ Leaders Quadrant over the last 5 years

2011

2012

2013

2014
leaders

2015
leaders

IBM/Q1 Labs

• Vertical axis is “Ability to Execute
• Horizontal Axis is “Completeness of Vision”

© 2015 IBM Corporation

4

IBM QRadar is in SIEM Leadership Quadrant For Seventh Straight Year
“Magic Quadrant for Security Information and Event Management,” Gartner, July 2015

2015 Gartner MQ for SIEM:

IBM Security QRadar is highest on “Ability to
Execute” (the Y-axis) AND furthest to the right
on “Completeness of vision” (the X-axis)
 Ability to execute is an assessment of
overall viability, product service, customer
experience, market responsiveness,
product track record, sales execution,
operations, and marketing execution.
 Completeness of Vision is a rating of
product strategy, innovation, market
understanding, geographic strategy, and
other factors
 “The need for early detection of targeted
attacks and data breaches is driving the
expansion of new and existing SIEM
deployments. Advanced users are looking
to augment SIEM with advanced profiling
and analytics.”
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's
research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

© 2015 IBM Corporation

5

IBM Security QRadar in Leadership Quadrant for Seventh Straight Year
“Magic Quadrant for Security Information and Event Management,” Gartner, July 2015

#1

What Gartner is Saying about QRadar
 “Midsize and large enterprises with general SIEM requirements, and
those with use cases that require behavior analysis, network flow and
packet analysis, should consider QRadar.”
 “Customer feedback indicates that the technology is relatively
straightforward to deploy and maintain in both modest and large
environments.”
 “QRadar provides behavior analysis capabilities for NetFlow and log
events.”
 “The average of IBM reference customers satisfaction scores for
scalability and performance, effectiveness of predefined correlation rules,
report creation, ad hoc queries, product quality and stability, and technical
support is higher than the average scores for all reference customers in
those areas.”

© 2015 IBM Corporation

6

IBM Security QRadar in Leadership Quadrant for Seventh straight year
“Magic Quadrant for Security Information and Event Management,” Gartner, July 2015

#1

Other Gartner Comments about IBM Security QRadar:
 “IBM Security's QRadar Platform includes QRadar SIEM, Log Manager,
Vulnerability Manager, Risk Manager, QFlow and VFLow Collectors, and
Incident Forensics. QRadar can be deployed as an appliance, a virtual
appliance or as SaaS/infrastructure as a service (IaaS).”
 “Components can be deployed in an all-in-one solution or scaled by using
separate appliances for different functions.”
 “Recent enhancements include incident forensics support, new data storage
appliances, improved query support across logs, flow data, threat intelligence,
and vulnerability and asset data. The capability to replay historical event data
through current correlation rules is also now available.”
 “IBM offers a hybrid delivery option for QRadar, with an on-premises QRadar
deployment, a SaaS solution hosted on IBM Cloud and optional remote
monitoring from IBM's managed security service operations centers.”

© 2015 IBM Corporation

7

And in case you had not heard…..

 According to IDC*, IBM Security Systems:





Maintained the #1 position in Identity and Access Management
Maintained #1 position in Security Vulnerability Management (which includes SIEM)
Improved its share in Endpoint Security and Network Security.
Significantly outpaced overall security software market growth, and remained the #3
security software vendor in 2013." (Approved 4/23/14, IDC Permissions/Michael Shirer)

 Gartner published their 2014 revenue/share estimate and IBM Security
Systems:
– 2015 Gartner rates IBM #1 in SIEM (3rd year) and #2 in Enterprise Security
– IBM moved up to #3 in total share, and is the fastest growing security software vendor in
the global market based on revenue (2014)
– Grew +3X faster than the overall market: 19/5%
*According to IDC's Worldwide Semiannual Software Tracker analysis for calendar 2013
© 2015 IBM Corporation

8

Agenda

 Introduction
 2014 Gartner Magic Quadrant for SIEM
 IBM Security QRadar SIEM Solutions
– How we got here

© 2015 IBM Corporation

9

The Need for Security Intelligence – Drives Everything We Do
Escalating Threats

Increasing Complexity

Resource Constraints

Designer Malware

Spear Phishing

Persistence

Backdoors

• Increasingly sophisticated
attack methods

• Constantly changing
infrastructure

• Disappearing perimeters

• Too many products from
multiple vendors; costly
to configure and manage

• Accelerating security
breaches

• Struggling security teams
• Too much data with limited
manpower and skills to
manage it all

• Inadequate antivirus products

© 2015 IBM Corporation

10

IBM QRadar Security Intelligence Platform
Providing actionable intelligence

INTELLIGENT
Correlation, analysis
and massive data
reduction

AUTOMATED

IBM QRadar

Driving simplicity
and accelerating
time-to-value

Security Intelligence
Platform

INTEGRATED
Unified architecture
delivered in a single
console

© 2015 IBM Corporation

11

The Core of Our Solution: IBM Security QRadar SIEM

Security devices
Servers and mainframes
Network and virtual activity
Data activity

Suspected
Incidents

Automated
Offense
Identification
• Unlimited data collection,
storage and analysis

Prioritized Incidents

• Built in data classification
Application activity

• Automatic asset, service and
user discovery and profiling

Configuration information

• Real-time correlation
and threat intelligence

Vulnerabilities and threats

• Activity baselining
and anomaly detection

Users and identities

• Detects incidents
of the box

Embedded
Intelligence

Global threat intelligence

© 2015 IBM Corporation

12

Answering questions to help prevent and remediate attacks

© 2015 IBM Corporation

13

Extending the Core with In-Depth Forensics Investigation

Security devices

QRadar Incident
Forensics

Application activity

QRadar SIEM
Servers and mainframes
Global threat intelligence

• Automated data
collection and
asset discovery

Network and virtual activity

• Real-time,
and integrated
analytics

Vulnerabilities and threats

• Massive data
reduction

Configuration information

• Anomaly
detection

Users and identities

• Full PCAP
Forensics

Offenses
Identified
by QRadar

• Detailed
Incident MetaData Evidence
• Reconstruction
of content and
incident activity

Data activity

© 2015 IBM Corporation

14

An integrated, unified architecture in a single web-based console

Log
Management

Security
Intelligence

Network Activity
Monitoring

Risk
Management

Vulnerability
Management

Network
Forensics

© 2015 IBM Corporation

15

IBM X-Force Exchange Enhancing Value of QRadar
A new platform to consume,
share, and act on threat
intelligence
IBM X-Force Exchange is:

OPEN
a robust platform with access
to a wealth of threat
intelligence data

ACTIONABLE
Research and collaboration platform and API

Security
Analysts and
Researchers

Security
Operations
Centers (SOCs)

Security
Products and
Technologies

an integrated solution to
help quickly stop threats

SOCIAL
a collaborative platform for
sharing threat intelligence
Backed by the reputation and
scale of IBM X-Force
© 2015 IBM Corporation

16

Extending QRadar Security Intelligence Platform to the Cloud
Extensive data sources

Accelerate your ability to
identify and stop cyber
threats with
Threat Indicators

FLEXIBLE
Security devices
Servers and mainframes
Network and virtual activity
Data activity
Application activity
Configuration information
Vulnerabilities and threats
Users and identities

a full suite of upgradeable
security analytics offerings
and service levels to
choose from

COST EFFECTIVE
acquire and deploy quickly
with no CapEx investment

PEACE OF MIND






Cloud-based offering of the #1 Security Intelligence solution
IBM deploys, maintains and supports infrastructure
Protects against threats and reduces compliance risk
Leverages real-time threat intelligence from X-Force
Collects data from both on-premise and cloud resources

trusted IBM security
service professionals
available to provide
guidance and meet your
security requirements

© 2015 IBM Corporation

17

IBM Security QRadar for MSSPs
New capabilities creating profitable
opportunities for MSSPs
IBM QRadar is:

COST EFFECTIVE
Single and multi-tenanted enabling
low cost, rapid delivery of security
intelligence services
 Multi-tenant and single deployment options
 Master Console for centralized view of multiple
clients
 System configuration template support
 Horizontal scalability
 Extensive APIs for enterprise integration
 Cloud-ready
 Flexible MSSP pricing options

SCALABLE & FLEXIBLE
Scales as needed from the
smallest to the largest customers
with centralized management

AUTOMATED
driving simplicity and
accelerating time-to-value for
service providers

© 2015 IBM Corporation

18

Recent QRadar Investments and Innovations








Advanced Search
Historical Correlation
X-Force Exchange Integration
Real-Time Threat Intelligence
Open API’s for expanded integrations
500+ Devices, Systems and Applications Supported

 Rules/Building Blocks – over 500 enabled out-of-the-box
 Over 1600 unique reports now available

© 2015 IBM Corporation

19

QRadar is the Centerpiece of IBM Security Integration

IBM Security
Access Manager

People

IBM InfoSphere
Guardium

IBM zSecure

Data

IBM Security AppScan

Applications

IBM Security Privileged
Identity Manager

IBM Security Network
Protection XGS

IBM QRadar
IBM Security
Identity Manager

IBM Security Directory
Server and Integrator

Security Intelligence
Platform

Infrastructure
IBM Endpoint Manager

IBM Trusteer Apex

Advanced Fraud
Protection

© 2015 IBM Corporation

20

IBM QRadar Supports Hundreds of Third-Party Products

IBM QRadar

Security Intelligence Platform

© 2015 IBM Corporation

21

QRadar Security Intelligence Solution Delivery Models
Capital and Operating Expense Options:
 Hardware-based appliances

 Software for qualified, client-owned servers

 Virtual appliances for VMware environments

 Cloud

Operational Expense Option:
 SaaS- Security Intelligence on Cloud

© 2015 IBM Corporation

22

IBM Services Managed SIEM
Delivering SIEM optimization with advanced threat protection
SIEM optimization

Managed SIEM

Custom-tailored engagement

Steady-state SIEM management

 SIEM design and build services

 Threat monitoring and response

 Use case design and log acquisition

 SIEM administrative support

 SIEM implementation

 SIEM infrastructure management

 SIEM optimization

 SIEM reporting

More quickly
identify and
remediate

Consolidate
data silos

Better predict
business risks

Detect insider
fraud

Address
regulation
mandates

Optimize staff
resources

Deploy robust
security
intelligence and
incident
forensics

Collect, correlate
and report on
data in one
integrated
solution

Engage entire
risk management
lifecycle for
infrastructures

Adopt nextgeneration
SIEM
with identity
correlation

Automate data
collection and
configuration
audits

Offload security
monitoring and
device
management

© 2015 IBM Corporation

23

IBM X-Force and Security Services – A Winning Combination

IBM Security by the Numbers
+
monitored countries (MSS)
+
service delivery experts

+
devices under contract
+
endpoints protected
+
events managed per day
© 2015 IBM Corporation

24

Client example: An international energy company reduces billions
of events per day to find those that should be investigated

Optimize threat analysis
An international energy firm analyzes

2 billion
events per day to find

20-25
potential offenses to investigate

Business challenge
 Reducing huge number of events to find the ones that need to be investigated
 Automating the process of analyzing security data

Solutions (QRadar SIEM, QFlow, Risk Manager)
Combined analysis of historical data with real-time alerts to gain a ‘big picture’ view and uncover
patterns of unusual activity humans miss and immediately block suspected traffic

© 2015 IBM Corporation

25

Learn more about IBM Security QRadar SIEM

Download the 2015 Gartner Magic
Quadrant for SIEM

Read our blog

Visit our Website:
http://ibm.co/QRadar

© 2015 IBM Corporation

26

Learn more about IBM Security

TOP 3

enterprise security software
vendor in total revenue

20

industry analyst reports rank
IBM Security as a LEADER

133
10K
24

countries where IBM delivers
managed security services

Visit our web page
IBM.com/Security
Watch our videos
IBM Security YouTube Channel

clients protected including…

Read new blog posts
SecurityIntelligence.com

of the top 33 banks in Japan,
North America, and Australia

Follow us on Twitter
@ibmsecurity

© 2015 IBM Corporation

27

Q&A

© 2015 IBM Corporation

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOU
www.ibm.com/security

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.

Sponsor Documents

Recommended

No recommend documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close