how to choose the right security information and event management (siem) solution

29
© 2015 IBM Corporation John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence Product Management and Strategy IBM Security How to Choose the Right Security Information and Event Management (SIEM) Solution

Upload: ibm-security

Post on 17-Aug-2015

366 views

Category:

Technology


6 download

TRANSCRIPT

Page 1: How to Choose the Right Security Information and Event Management (SIEM) Solution

© 2015 IBM Corporation

John BurnhamDirector, Strategic Communications and Analyst Relations

IBM Security

Chris MeenanDirector, Security Intelligence Product Management and Strategy

IBM Security

How to Choose the Right Security Information and Event Management (SIEM) Solution

Page 2: How to Choose the Right Security Information and Event Management (SIEM) Solution

2© 2015 IBM Corporation

Agenda

Introduction

2015 Gartner Magic Quadrant for SIEM

IBM Security QRadar SIEM Solutions

– How we got here

Page 3: How to Choose the Right Security Information and Event Management (SIEM) Solution

3© 2015 IBM Corporation

Agenda

Introduction

2015 Gartner Magic Quadrant for SIEM

IBM Security QRadar SIEM Solutions

– How we got here

Page 4: How to Choose the Right Security Information and Event Management (SIEM) Solution

4© 2015 IBM Corporation

QRadar in Gartner MQ Leaders Quadrant over the last 5 years

2011 2012 2013 2014

IBM/Q1 Labs

• Vertical axis is “Ability to Execute

• Horizontal Axis is “Completeness of Vision”

2015

leaders leaders

Page 5: How to Choose the Right Security Information and Event Management (SIEM) Solution

5© 2015 IBM Corporation

IBM QRadar is in SIEM Leadership Quadrant For Seventh Straight Year“Magic Quadrant for Security Information and Event Management,” Gartner, July 2015

2015 Gartner MQ for SIEM:

IBM Security QRadar is highest on “Ability to

Execute” (the Y-axis) AND furthest to the right

on “Completeness of vision” (the X-axis)

Ability to execute is an assessment of

overall viability, product service, customer

experience, market responsiveness,

product track record, sales execution,

operations, and marketing execution.

Completeness of Vision is a rating of

product strategy, innovation, market

understanding, geographic strategy, and

other factors

“The need for early detection of targeted

attacks and data breaches is driving the

expansion of new and existing SIEM

deployments. Advanced users are looking

to augment SIEM with advanced profiling

and analytics.”

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

Page 6: How to Choose the Right Security Information and Event Management (SIEM) Solution

6© 2015 IBM Corporation

IBM Security QRadar in Leadership Quadrant for Seventh Straight Year“Magic Quadrant for Security Information and Event Management,” Gartner, July 2015

What Gartner is Saying about QRadar

“Midsize and large enterprises with general SIEM requirements, and

those with use cases that require behavior analysis, network flow and

packet analysis, should consider QRadar.”

“Customer feedback indicates that the technology is relatively

straightforward to deploy and maintain in both modest and large

environments.”

“QRadar provides behavior analysis capabilities for NetFlow and log

events.”

“The average of IBM reference customers satisfaction scores for

scalability and performance, effectiveness of predefined correlation rules,

report creation, ad hoc queries, product quality and stability, and technical

support is higher than the average scores for all reference customers in

those areas.”

#1

Page 7: How to Choose the Right Security Information and Event Management (SIEM) Solution

7© 2015 IBM Corporation

IBM Security QRadar in Leadership Quadrant for Seventh straight year“Magic Quadrant for Security Information and Event Management,” Gartner, July 2015

Other Gartner Comments about IBM Security QRadar:

“IBM Security's QRadar Platform includes QRadar SIEM, Log Manager,

Vulnerability Manager, Risk Manager, QFlow and VFLow Collectors, and

Incident Forensics. QRadar can be deployed as an appliance, a virtual

appliance or as SaaS/infrastructure as a service (IaaS).”

“Components can be deployed in an all-in-one solution or scaled by using

separate appliances for different functions.”

“Recent enhancements include incident forensics support, new data storage

appliances, improved query support across logs, flow data, threat intelligence,

and vulnerability and asset data. The capability to replay historical event data

through current correlation rules is also now available.”

“IBM offers a hybrid delivery option for QRadar, with an on-premises QRadar

deployment, a SaaS solution hosted on IBM Cloud and optional remote

monitoring from IBM's managed security service operations centers.”

#1

Page 8: How to Choose the Right Security Information and Event Management (SIEM) Solution

8© 2015 IBM Corporation

And in case you had not heard…..

According to IDC*, IBM Security Systems:

– Maintained the #1 position in Identity and Access Management

– Maintained #1 position in Security Vulnerability Management (which includes SIEM)

– Improved its share in Endpoint Security and Network Security.

– Significantly outpaced overall security software market growth, and remained the #3

security software vendor in 2013." (Approved 4/23/14, IDC Permissions/Michael Shirer)

Gartner published their 2014 revenue/share estimate and IBM Security

Systems:

– 2015 Gartner rates IBM #1 in SIEM (3rd year) and #2 in Enterprise Security

– IBM moved up to #3 in total share, and is the fastest growing security software vendor in

the global market based on revenue (2014)

– Grew +3X faster than the overall market: 19/5%

*According to IDC's Worldwide Semiannual Software Tracker analysis for calendar 2013

Page 9: How to Choose the Right Security Information and Event Management (SIEM) Solution

9© 2015 IBM Corporation

Agenda

Introduction

2014 Gartner Magic Quadrant for SIEM

IBM Security QRadar SIEM Solutions

– How we got here

Page 10: How to Choose the Right Security Information and Event Management (SIEM) Solution

10© 2015 IBM Corporation

The Need for Security Intelligence – Drives Everything We Do

Escalating Threats Increasing Complexity Resource Constraints

• Increasingly sophisticated attack methods

• Disappearing perimeters

• Accelerating security breaches

• Constantly changing infrastructure

• Too many products from multiple vendors; costly to configure and manage

• Inadequate antivirus products

• Struggling security teams

• Too much data with limited manpower and skills to manage it all

Spear Phishing

Persistence

Backdoors

Designer Malware

Page 11: How to Choose the Right Security Information and Event Management (SIEM) Solution

11© 2015 IBM Corporation

IBM QRadar Security Intelligence Platform

Providing actionable intelligence

IBM QRadarSecurity Intelligence

Platform

AUTOMATEDDriving simplicity and accelerating

time-to-value

INTEGRATEDUnified architecture delivered in a single console

INTELLIGENTCorrelation, analysis and massive data reduction

Page 12: How to Choose the Right Security Information and Event Management (SIEM) Solution

12© 2015 IBM Corporation

The Core of Our Solution: IBM Security QRadar SIEM

SuspectedIncidentsAutomated

OffenseIdentification

• Unlimited data collection, storage and analysis

• Built in data classification

• Automatic asset, service and user discovery and profiling

• Real-time correlation and threat intelligence

• Activity baselining and anomaly detection

• Detects incidentsof the box

Embedded

Intelligence

Servers and mainframes

Data activity

Network and virtual activity

Application activity

Configuration information

Security devices

Users and identities

Vulnerabilities and threats

Global threat intelligence

Prioritized Incidents

Page 13: How to Choose the Right Security Information and Event Management (SIEM) Solution

13© 2015 IBM Corporation

Answering questions to help prevent and remediate attacks

Page 14: How to Choose the Right Security Information and Event Management (SIEM) Solution

14© 2015 IBM Corporation

Extending the Core with In-Depth Forensics Investigation

Servers and mainframes

Network and virtual activity

Application activity

Data activity

Configuration information

Vulnerabilities and threats

Users and identities

Global threat intelligence

Security devices

• Automated data collection andasset discovery

• Real-time, and integrated analytics

• Massive data reduction

• Anomaly detection

QRadar Incident

Forensics

• Full PCAP

Forensics

• Detailed

Incident Meta-

Data Evidence

• Reconstruction

of content and

incident activity

QRadar SIEM

Offenses Identified

by QRadar

Page 15: How to Choose the Right Security Information and Event Management (SIEM) Solution

15© 2015 IBM Corporation

An integrated, unified architecture in a single web-based console

LogManagement

Security Intelligence

Network Activity Monitoring

RiskManagement

Vulnerability Management

Network Forensics

Page 16: How to Choose the Right Security Information and Event Management (SIEM) Solution

16© 2015 IBM Corporation

Backed by the reputation and

scale of IBM X-Force

IBM X-Force Exchange Enhancing Value of QRadar

Research and collaboration platform and API

Security Analysts and Researchers

Security Operations

Centers (SOCs)

Security Products and Technologies

OPENa robust platform with access to a wealth of threat intelligence data

SOCIALa collaborative platform for sharing threat intelligence

ACTIONABLEan integrated solution to help quickly stop threats

A new platform to consume, share, and act on threat intelligence

IBM X-Force Exchange is:

Page 17: How to Choose the Right Security Information and Event Management (SIEM) Solution

17© 2015 IBM Corporation

Extending QRadar Security Intelligence Platform to the Cloud

FLEXIBLE a full suite of upgradeable security analytics offerings and service levels to choose from

COST EFFECTIVEacquire and deploy quickly with no CapEx investment

PEACE OF MINDtrusted IBM security service professionals available to provide guidance and meet your security requirements

Threat Indicators

Cloud-based offering of the #1 Security Intelligence solution

IBM deploys, maintains and supports infrastructure

Protects against threats and reduces compliance risk

Leverages real-time threat intelligence from X-Force

Collects data from both on-premise and cloud resources

Accelerate your ability to identify and stop cyber threats with

Extensive data sources

Security devices

Servers and mainframes

Network and virtual activity

Data activity

Application activity

Configuration information

Vulnerabilities and threats

Users and identities

Page 18: How to Choose the Right Security Information and Event Management (SIEM) Solution

18© 2015 IBM Corporation

IBM Security QRadar for MSSPs

COST EFFECTIVESingle and multi-tenanted enabling low cost, rapid delivery of security intelligence services

AUTOMATEDdriving simplicity and accelerating time-to-value for service providers

SCALABLE & FLEXIBLEScales as needed from the smallest to the largest customers with centralized management

New capabilities creating profitable opportunities for MSSPs

IBM QRadar is:

Multi-tenant and single deployment options

Master Console for centralized view of multiple clients

System configuration template support

Horizontal scalability

Extensive APIs for enterprise integration

Cloud-ready

Flexible MSSP pricing options

Page 19: How to Choose the Right Security Information and Event Management (SIEM) Solution

19© 2015 IBM Corporation

Recent QRadar Investments and Innovations

Advanced Search

Historical Correlation

X-Force Exchange Integration

Real-Time Threat Intelligence

Open API’s for expanded integrations

500+ Devices, Systems and Applications Supported

Rules/Building Blocks – over 500 enabled out-of-the-box

Over 1600 unique reports now available

Page 20: How to Choose the Right Security Information and Event Management (SIEM) Solution

20© 2015 IBM Corporation

IBM zSecure IBM Security AppScan

IBM Security Network

Protection XGS

IBM Security

Access Manager

IBM Security Privileged

Identity Manager

IBM InfoSphere

Guardium

IBM Security

Identity Manager

IBM Security Directory

Server and Integrator

IBM Endpoint Manager

IBM Trusteer Apex

QRadar is the Centerpiece of IBM Security Integration

People Data

Applications

Infrastructure

Advanced Fraud

Protection

IBM QRadarSecurity Intelligence

Platform

Page 21: How to Choose the Right Security Information and Event Management (SIEM) Solution

21© 2015 IBM Corporation

IBM QRadar Supports Hundreds of Third-Party Products

IBM QRadar

Security Intelligence Platform

Page 22: How to Choose the Right Security Information and Event Management (SIEM) Solution

22© 2015 IBM Corporation

QRadar Security Intelligence Solution Delivery Models

Hardware-based appliances

Software for qualified, client-owned servers

Virtual appliances for VMware environments

Cloud

SaaS- Security Intelligence on Cloud

Capital and Operating Expense Options:

Operational Expense Option:

Page 23: How to Choose the Right Security Information and Event Management (SIEM) Solution

23© 2015 IBM Corporation

IBM Services Managed SIEMDelivering SIEM optimization with advanced threat protection

SIEM design and build services

Use case design and log acquisition

SIEM implementation

SIEM optimization

Custom-tailored engagement

Threat monitoring and response

SIEM administrative support

SIEM infrastructure management

SIEM reporting

Steady-state SIEM management

Managed SIEMSIEM optimization

More quickly

identify and

remediate

Deploy robust

security

intelligence and

incident

forensics

Consolidate

data silos

Collect, correlate

and report on

data in one

integrated

solution

Better predict

business risks

Engage entire

risk management

lifecycle for

infrastructures

Detect insider

fraud

Adopt next-

generation

SIEM

with identity

correlation

Address

regulation

mandates

Automate data

collection and

configuration

audits

Optimize staff

resources

Offload security

monitoring and

device

management

Page 24: How to Choose the Right Security Information and Event Management (SIEM) Solution

24© 2015 IBM Corporation

IBM X-Force and Security Services – A Winning Combination

monitored countries (MSS)

service delivery experts

devices under contract+

endpoints protected+

events managed per day+

IBM Security by the Numbers

+

+

Page 25: How to Choose the Right Security Information and Event Management (SIEM) Solution

25© 2015 IBM Corporation

Client example: An international energy company reduces billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find

20-25potential offenses to investigate

Business challenge

Reducing huge number of events to find the ones that need to be investigated

Automating the process of analyzing security data

Solutions (QRadar SIEM, QFlow, Risk Manager)

Combined analysis of historical data with real-time alerts to gain a ‘big picture’ view and uncover

patterns of unusual activity humans miss and immediately block suspected traffic

Optimize threat analysis

Page 26: How to Choose the Right Security Information and Event Management (SIEM) Solution

26© 2015 IBM Corporation

Visit our Website: http://ibm.co/QRadar

Read our blog

Learn more about IBM Security QRadar SIEM

Download the 2015 Gartner Magic Quadrant for SIEM

Page 27: How to Choose the Right Security Information and Event Management (SIEM) Solution

27© 2015 IBM Corporation

133 countries where IBM delivers

managed security services

20 industry analyst reports rank

IBM Security as a LEADER

TOP 3 enterprise security software vendor in total revenue

10K clients protected including…

24 of the top 33 banks in Japan,

North America, and Australia

Learn more about IBM Security

Visit our web page

IBM.com/Security

Watch our videos

IBM Security YouTube Channel

Read new blog posts

SecurityIntelligence.com

Follow us on Twitter

@ibmsecurity

Page 28: How to Choose the Right Security Information and Event Management (SIEM) Solution

© 2015 IBM Corporation

Q&A

Page 29: How to Choose the Right Security Information and Event Management (SIEM) Solution

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any

kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor

shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use

of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or

capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product

or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries

or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside

your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks

on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.

IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other

systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOUwww.ibm.com/security