gépi tanulás az it biztonságban · arcsight ecosystem security open data platform smart/flex...

21
Többet (mesterséges) ésszel, mint erővel Gépi tanulás az IT-biztonságban Hargitai Zsolt Üzletfejlesztési igazgató [email protected]

Upload: others

Post on 29-Sep-2020

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

Többet (mesterséges) ésszel, mint erővel Gépi tanulás az IT-biztonságban

Hargitai Zsolt

Üzletfejlesztési igazgató

[email protected]

Page 2: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

YEARS40

COBOL Content Manager

Network Management

Data Protector

Micro Focus TodayBuilt on stability, innovation and delivering for customers over the long term

Page 3: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

3

Comprehensive security for the enterprise

ENDPOINTSECURITY

▪ Lifecycle management▪ Patching & containerization▪ Application virtualization▪ Mobile & server management

IDENTITY& ACCESS

▪ Adaptive Identity governance▪ Adaptive access management▪ Adaptive privileged management

APPSECURITY

▪ Static, Dynamic, & Runtime application testing

▪ Application security-as-a-service

DATASECURITY

▪ Data de-identification (encryption/tokenization)

▪ Key management▪ Hardware-based trust assurance▪ Messaging security

ANALYTICS & MACHINE LEARNING

SECURITYOPERATIONS

▪ Real-time detection▪ Workflow automation▪ Open source data ingestion▪ Hunt and investigation

Page 4: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

4

SecurityVoltage

Fortify

NetIQ

ZENworks

ArcSight &Sentinel

Vertica

Page 5: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

Machine learning in cybersecurity

Page 6: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

6

Page 7: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

7

Page 8: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

8

Page 9: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

9

Page 10: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

10

Page 11: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

11

Page 12: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

12

Page 13: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

13

Page 14: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

14

Page 15: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

15

Page 16: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

16

ArcSight Ecosystem

SECURITY OPEN DATA PLATFORM

SMART/FLEX CONNECTORSInformation collection, enrichment and normalization

MANAGEMENT CENTERSuite management and administration

TRANSFORMATION HUBInformation delivery

LOGGERCompliance, search & reporting

ESMIncident monitoring & management

INVESTIGATEHunting and investigation

UEBAEntity behaviour analytics

CONTENTUnified, actionable & insightful

WEB CONSOLEAccessible monitoring and platform management

DSAD

CIP

LB

TI

Page 17: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

17

ArcSight UEBA MissionUse Cases and Customer Requirements

We detect Insider Threats and Outsider Threatswith insider characteristics.

Page 18: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

TYPE DESCRIPTION

Account CompromiseUnauthorized account usage by anyone other than the account holder. For example, an outsider who has spearfished an executive in order to obtain and use those credentials to further infiltrate an organization.

Account MisuseUnauthorized account usage by an account holder. For example, a manager in the Finance department who downloads executive salary information for all executives in the company.

Data Staging/ExfiltrationUnauthorized transfer of data from a computer. Such a transfer may be manual and carried out by someone with physical access to a computer or it may be automated and carried out through malicious programming over a network

Infected HostEvidence that a network resource has been compromised and is behaving differently than expected. For example, communicating over unexpected network applications, protocols, etc.

Insider FraudIntentional act of deception involving financial and prescription transactions for purpose of personal gain. This may be performed by professional attackers, organized crime, insiders, or customers. The goal of financial fraud is the illegal acquisition of assets such as money for personal use or profit. Prescription fraud is the illegal acquisition of prescription drugs for personal use or profit.

Internal ReconAttempt to gain information about targeted computers or networks that can be used as a preliminary step toward a further attack seeking to exploit the target system.

Lateral Movement

Unauthorized movement from system to system within an environment. Common lateral movement methods include accessing network shares, using the Windows Task Scheduler to execute programs, using remote access tools such as PsExec, or using remote desktop clients such as Remote Desktop Protocol (RDP), DameWare, or Virtual Network Computing (VNC) to interact with target systems using a graphical user interface.

THREAT COVERAGE

18©2019 Micro Focus

Page 19: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

19

SecurityVoltage

Fortify

NetIQ

ZENworks

ArcSight &Sentinel

Vertica

Page 20: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

Kahoot.it

20

Page 21: Gépi tanulás az IT biztonságban · ArcSight Ecosystem SECURITY OPEN DATA PLATFORM SMART/FLEX CONNECTORS Information collection, enrichment and normalization MANAGEMENT CENTER Suite

Thank you.

www.microfocus.com/solutions/security