it security: eliminating threats with effective network & log analysis

24
IT Security: Eliminating threats with effective network & log analysis

Upload: zoho-corporation

Post on 09-Jun-2015

740 views

Category:

Technology


0 download

DESCRIPTION

IT Security

TRANSCRIPT

Page 1: IT Security: Eliminating threats with effective network & log analysis

IT Security: Eliminating threats with effective network & log analysis

Page 2: IT Security: Eliminating threats with effective network & log analysis

About ManageEngine

IT Security Management

Server Performance Management

Application Performance Management

Network Performance Management

Desktop Management

Active Directory

Management

IT Helpdesk

• Owned by Zoho Corporation• 90,000+ customers

worldwide• 25+ IT management

products

Page 3: IT Security: Eliminating threats with effective network & log analysis

What is IT Security?

• Deploying firewall & IDS• Adhering to compliance• Or more?

Page 4: IT Security: Eliminating threats with effective network & log analysis

Various types of an attack

DDoS

IP Spoofing

Sniffers

DoSPassword cracking

Privilege misuse

Man-in-the-middle

Attacks

Page 5: IT Security: Eliminating threats with effective network & log analysis

Why do security threats happen in-spite of deploying firewall & IDS?

Page 6: IT Security: Eliminating threats with effective network & log analysis

Firewall & IDS provide basic security

What they miss is to find out advanced attacks such as DDoS, zero-day intrusions, etc.

Network Security System

Input data Methodology

Firewall Packet header • Access policy enforcement• Simple interaction patterns

IDS Packet header & payload

• Detailed signature matching• Simple interaction patterns

Page 7: IT Security: Eliminating threats with effective network & log analysis

Large enterprises & data centers need EXTRA SECURITY to prevent advanced attacks

Page 8: IT Security: Eliminating threats with effective network & log analysis

Hackers exploit vulnerable networks

• BYOD & cloud computing

make networks MORE

VULNERABLE

• PC world: 70% of attacks

happen due to internal

vulnerabilities

Page 9: IT Security: Eliminating threats with effective network & log analysis

DDoS – Distributed Denial of Service

• Flooding junk traffic• Coordinated stream of

requests• Slows down network or app

Page 10: IT Security: Eliminating threats with effective network & log analysis

DDoS – Distributed Denial of Service

77% targeted bandwidth & routing infrastructure

23% were application attacks

Page 11: IT Security: Eliminating threats with effective network & log analysis

Misuse of privileges

• Accessing critical resources• Should be identified in real-

time

Page 12: IT Security: Eliminating threats with effective network & log analysis

Highly impossible to identify such attacks with manual process

• Attacks usually follow patterns

• Starts as breach/intrusion • Develops into an attack• Breach/intrusion should be

found in real-time

Page 13: IT Security: Eliminating threats with effective network & log analysis

What is the need of the hour?

Page 14: IT Security: Eliminating threats with effective network & log analysis

Advanced security protection

Basic Level

Advanced Level

Page 15: IT Security: Eliminating threats with effective network & log analysis

Advanced security protection

Network Security System

Input data Methodology

Firewall Packet header • Access policy enforcement• Simple interaction patterns

IDS Packet header & payload

• Detailed signature matching• Simple interaction patterns

Log Monitoring System and application log files

• Actions done on the device, file, and application

Flow Monitoring Flow from network devices

• Advanced interaction patterns & sessionization

• Statistical analysis• Access & traffic policy

monitoring

Page 16: IT Security: Eliminating threats with effective network & log analysis

Automated tools come handy

• Analyses flows from a security perspective

• Monitor logs for suspicious activities

Page 17: IT Security: Eliminating threats with effective network & log analysis

Monitoring flows provides visibility into the network

• Flows provide information on traffic

• Easy to identify unnecessary or suspicious traffic

Page 18: IT Security: Eliminating threats with effective network & log analysis

Monitoring packet flows

• Analyze packets exported• Identify anonymous IP

sending requests• Identify scan/probe, DDoS,

bad source• Change network

configuration to block anonymous traffic

Page 19: IT Security: Eliminating threats with effective network & log analysis

Logs help finding suspicious behavior

• Logs record all activities done on devices (server)

• Patterns can be identified from logs

• Action can be taken

Page 20: IT Security: Eliminating threats with effective network & log analysis

System & Application Log Monitoring

• All applications & systems generate logs

• Monitor such logs for suspicious print, error codes, etc.

Page 21: IT Security: Eliminating threats with effective network & log analysis

Instant alerting

• Advanced tools out-of-the-box check for patterns

• Raise alert instantly• Customizable to every

business needs

Page 22: IT Security: Eliminating threats with effective network & log analysis

Security reports

• Forensic analysis• Trend analysis• Compliance

Page 23: IT Security: Eliminating threats with effective network & log analysis

Summary

• Advanced Security Analysis is needed

• Difficult with manual process• Need tools with automation

Page 24: IT Security: Eliminating threats with effective network & log analysis

Thank [email protected]

m