Title: Security Information and Event Management (SIEM)...
1 Unified SIEM Product Strategy and Positioning
Copyright CloudAccess, Inc. 2016, Confidential
2CloudAccess Unified SIEM
3- Unification of SIEM
- and Security Context Technologies
- delivered in a single product
4Unification of Technologies
Management
Unified SIEM
5Monitoring Management Intelligent
Correlation Security Dashboard
2. Logger
1. SIEM
1.SIEM
2. Logger
Security Information
Transaction Data
3. Sensor
6Why Unified SIEM?
71. Intelligence
- Security Intelligence comes from Context
information Processing
CONTEXT
81. Intelligence
- SIEM products have achieved great intelligence,
- but they are rarely fed with the information to
use it
False Positive Cleaning
Prioritization
30
50
Effective Impact Analysis
100
20
92. Compliance
- All security technologies required by Compliance
Regulations
SOX, ISO, PCI
PCI 12.9 respond immediately to breach
SOX 304 PCI 10.5 Secure audit trails
PCI 11.2 quarterly vulnerability scans
FISMA, HIPAA, ISO 12.6 periodic security testing
PCI 11.4 requires NIDS/ IPS deployment
PCI 1.1.5, PCI WG, ISO 7.1.1 require asset
inventoty
PCI 11.1 WIDS and Rogue AP detection
PCI 11.4 requires HIDS PCI 11.5 File integrity
PCI 6.2 identify new threats
ISO 10.10 requires monitoring system resources
103. Time
Effective Security Posture and Analysis delivered
in 300 seconds
Threats
Attacks
Inventory
100
300
1
second
second
second
114. Cost
Up to 90 Cost Reduction
12Competitive Positioning
13CloudAccess Unified SIEM vs Pure SIEM
Management
Unified SIEM
14The Sensor Advantage
- Fast - Customer Security Posture from the first
second - Stealthy Will not break the customers network
- Complete Provide all security services in a
single box
Out-of-the-box full Security Visibility
15 Customer Profile
inspire
SIEM in the Cloud Elastic SaaS
Customer Profile
16CloudAccess
Lowest Barrier of Entry with Elastic Scaling in
Performance and Complexity
Cloud
- SaaS Web Services
- Elastic
- Performance Scaling
- Multi-tier hybrid Architectures Scaling
Customer Premises
17Hybrid Architecture
Cloud
Function Deploy Lev
1 Analysis Cloud
2 Storage Cloud CP
3 Vulnerability Mgmt A. External B. Internal Cloud CP
4 Detection Awareness CP
Customer Premise
18CloudAccess Flexible Architecture - Examples
Customer1 has no on-site gear, sends logs to
CloudAccess
Collection
Customer2 is using Managed IDS service,
CloudAccess Sensor on Customer Premise
Detection Awareness
Customer3 is using Local Vulnerability Scanning,
CloudAccess Sensor on Customer Premise
Tiered 2nd Level
Local Vulnerability Scan
Customer4 has complete CloudAccess solution on
premise, Managed by CloudAccess
19Introducing CloudAccess Unified SIEM Version 3
20Unified Situational Awareness Autodiscovery
Function Technology Function Technology
Identity Monitoring Active Directory LDAP Authentication logs
Network Auto-Discovery
Topology Map Recurrent snmp scans
Inventory Passive fingerprinting Active fingerprinting Host agent WMI
Profiling Time-Service-Usage profiling
Resource Monitoring
Network Monitoring Flows
Network Availability Snmp
Host Resources Snmp
Anomaly detection Any resource
21Out-of the-box PCI Wireless Compliance
PCI Requirement Solution PCI Requirement Solution PCI Requirement Solution
11.1 Deploy a WIDS/WIPS CloudAccess Sensor includes a WIDS/WIPS
WG Maintain an up-to-date wireless hardware inventory Automatically done by Situational Awareness
WG Detect Rogue AP and unauthorized wireless connections Correlate information between WIDS and Inventory
4.1.1 Ensure strong cryptography .. WEP is prohibited Monitored by WIDS default
22Other Features and Enhancements
Enhancements in all areas of function
- Vulnerability Assessment
- Asset Management
- Network Monitoring
- User Management
- Network Discovery
- Dashboards
- Usability
- Performance
- Policy Management
- Visualization
- Compliance
- Reporting
- Detection/analytics
- Integration
- Incident Response
- Host Security
23Unified Management
1 unique Login
1 unique Asset Structure
1 unique User Structure
24SIEM
25Log Management
26Unified Vulnerability Scanner
27Unified WIDS
28Unified HIDS
29Unified Situational Awareness
30Unified Reporting
31Summary
- CloudAccess Unified SIEM 3.0 is a unique offering
in the market - Compliance, Time and Cost advantages make
CloudAccess Unified SIEM 3.0 the most competitive
solution - CloudAccess enables broad Enterprise adoption
CloudAccess Unified SIEM 3.0 changes the game for
SIEM customers.
32Thank You