Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA

Splunk
23 de Jun de 2016
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA
1 de 30

Mais conteúdo relacionado

Mais procurados

Splunk @ AdobeSplunk @ Adobe
Splunk @ AdobeSplunk
Splunk Discovery Day Düsseldorf 2016Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk
Splunk for DevelopersSplunk for Developers
Splunk for DevelopersSplunk
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk
Taking Splunk to the Next Level - ManagerTaking Splunk to the Next Level - Manager
Taking Splunk to the Next Level - ManagerSplunk

Mais procurados(20)

Destaque

CDINFORMA NÚMERO 2631, 25 DE SHVAT DE 5774, 26 DE ENERO DE 2014CDINFORMA NÚMERO 2631, 25 DE SHVAT DE 5774, 26 DE ENERO DE 2014
CDINFORMA NÚMERO 2631, 25 DE SHVAT DE 5774, 26 DE ENERO DE 2014Centro Deportivo Israelita
BarrocoesculturaBarrocoescultura
BarrocoesculturaI.E.S. Llanes, Sevilla
Forschungsdaten & OpenAIREPlusForschungsdaten & OpenAIREPlus
Forschungsdaten & OpenAIREPlusChristian Gutknecht
eng TELE-audiovision-1305eng TELE-audiovision-1305
eng TELE-audiovision-1305TELE-audiovision eng
Carta do turismo sustentávelCarta do turismo sustentável
Carta do turismo sustentávelFernando Zornitta
Cookies and European Union LawCookies and European Union Law
Cookies and European Union LawReactive, part of Accenture Interactive

Destaque(20)

Similar a Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA

Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsSplunk

Similar a Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA(20)

Mais de Splunk

Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk

Último

Accelerating Data Science through Feature Platform, Transformers, and GenAIAccelerating Data Science through Feature Platform, Transformers, and GenAI
Accelerating Data Science through Feature Platform, Transformers, and GenAIFeatureByte
Roottoo Innovation V24_CP.pdfRoottoo Innovation V24_CP.pdf
Roottoo Innovation V24_CP.pdfroottooinnovation
Navigating the FutureNavigating the Future
Navigating the FutureOnBoard
Metadata & Discovery Group Conference 2023 - Day 1 ProgrammeMetadata & Discovery Group Conference 2023 - Day 1 Programme
Metadata & Discovery Group Conference 2023 - Day 1 ProgrammeCILIP MDG
How to use the Cataloguing Code Ethics at your day job : a hands-on workshop ...How to use the Cataloguing Code Ethics at your day job : a hands-on workshop ...
How to use the Cataloguing Code Ethics at your day job : a hands-on workshop ...CILIP MDG
info_session_gdsc_tmsl .pptxinfo_session_gdsc_tmsl .pptx
info_session_gdsc_tmsl .pptxNikitaSingh741518

Último(20)

Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktionalitäten in Splunk Enterprise Security und UBA

Notas do Editor

  1. Let’s start with today’s ever changing threat landscape: With all the news on cyber attacks and security breaches, you know we are constantly up against 3 very sophisticated adversaries: the cyber criminals, the nation states and also the malicious Insiders; All going after major stakes of our life, our company and our nation.
  2. There are three numbers in the cyber security statistics are very telling, and we should pay close attention to: 100% of breaches are done using valid credentials; And it still takes average 229 days to detect a breach; With all security technologies deployed in the enterprises, there are still 53% of breaches are first reported to the enterprise by a 3rd parties (FBI, SS)
  3. People are the most important part of your business. Splunk empowers your security teams with data. Your security teams perform a number of tasks <next slide>
  4. Splunk products are being used for data volumes ranging from gigabytes to hundreds of terabytes per day. Splunk software and cloud services reliably collects and indexes machine data, from a single source to tens of thousands of sources. All in real time. Once data is in Splunk Enterprise, you can search, analyze, report on and share insights form your data. The Splunk Enterprise platform is optimized for real-time, low-latency and interactivity, making it easy to explore, analyze and visualize your data. This is described as Operational Intelligence. The insights gained from machine data support a number of use cases and can drive value across your organization. [In North America] Splunk Cloud is available in North America and offers Splunk Enterprise as a cloud-based service – essentially empowering you with Operational Intelligence without any operational effort.
  5. What are the challenges we see and what can we do about them? In most of the attacks we are seeing compromised or misued credentials. (Top right) On top of that we have all of the security devices, IDS, Firewall, Endpoint monitoring systems and they all create alerts and its very hard to prioritize because there are not alert that says ”you are breached”. Its all about prioritization and by removing false positives. You might not have people to review the alerts. There are just not enough security people in your company and also not in the industry as a whole. In 2019 there are 1.5million people missing. Its good for us but for you company this is not good. Conclusion – We need to work smarter and we need to automate things.
  6. The foundation is a real time big data architecture. All of the data you send to it will be analyzed and behaviors of the data will be analyzed using models. This is all done with unsupervised machine learning. If you familiar with ML you know there are supervised and unsupervised. With supervised the system flags up things and you need to typically says yes or no if this is bad or not. With unsupervised the system learns on its own. We need about two weeks for a user and about 10k-20k data points, and from this we automatically learn the bevaiour to see if it is wrong or right. Based on this bevahiour we find any outlier to see if anything is wrong. There are hundreds of types of Anomalies – somebody signs on at a strange time. Somebody signs into a system they usually don’t sign into. Somebody sends data to a system they don’t usually send data to.
  7. We are doing behaviour modeling on all the data that is being sent in. The product is called User Behaviour Analytics however we don’t just focus on the user. There are other products that just focus on the user. We could call the product User and Entity Behaviour Analytics as we analyze all behaviour from all entities. This means from Host, from Network, (Segments, Ips…), Applications, Data. All of this is then joined together. One user, on a specific host, within the office network is doing an SSH connection or Win file transfer. SFDC, SNOW etc is accessing a specific data on a specific host. For each such entity we create such a relationship model. A behaviour model.
  8. If we look at the previous chain of events for the malicious insider, this is how UBA would aid in preventing that from happening. We can see Join connected with VPN and elevates his privileges. This means there is an unusual sequence of events for that user. We also see that he is connecting to an unusual zone (Corp->PCI). Everyone one of these are all anomalies are joined together to one threat which the SOC analyst can review.
  9. What kind of data of we need?   As we are profiling user behavior we will need data to do that profiling. The classic and most important sources are from your Domain Controllers. Where are they logging in from and when.   The second on the list is DNS,DHCP where they are being used what. Which hosts are which, laptops in your organization whether they are connected and the traffic.   We also need network information to know which systems are communicating with which.   Particularly when we are going out to the Internet we want information from things like your proxy server to see which sites are being accessed to potentially see beaconing hosts for instance.
  10. a. Continuation of integration….enabled in depth investigation bring UBA anomaly as sourcetype. Significant because all field in ES is available b. Describe the solution. Value of ES, Notable Events…IR. Add context C. Increasing Threat Intel... Mention leadership and WP. Coverage.
  11. Now you can track your investigations into security incidents on an investigation timeline. This tool allows you to visualize and document the progression of an incident and the steps you take during your investigation. Add notable events, Splunk events, and add information from your investigator journal, which logs items in your action history.
  12. UBA has been integrated into Enterprise Security and you will see Key Security Indicators, risk scoring and notable events from UBA in Enterprise Security.
  13. a. Continuation of integration….enabled in depth investigation bring UBA anomaly as sourcetype. Significant because all field in ES is available b. Describe the solution. Value of ES, Notable Events…IR. Add context C. Increasing Threat Intel... Mention leadership and WP. Coverage.
  14. Over 4000 security/compliance customers worldwide. Customers cover all sizes and verticals, and are all over the world. While not listed here, hundreds of SMBs and individuals also use for security/compliance.
  15. Industry • Retail and eCommerce Splunk Use Cases • Security (Phishing, Centralized Visiblity, automated actions) SplunkLive Session: http://de.slideshare.net/Splunk/splunklive-london-john-lewis
  16. Industry • Manufacturing Splunk Use Cases Security Incident Investigation Threat Intelligence Correlation of CERT Tickets Challenges Lack of visibility across entire infrastructure Undetected security threats in the network Splunk Products • Splunk Enterprise • Splunk Enterprise Security Data Sources Network logs Endpoint logs Server logs Data from switches Data from gateways Authentication logs Case Study http://www.splunk.com/en_us/customers/success-stories/mbda.html