Bricata NDR Platform Ebook
Bricata NDR Platform Ebook
Introduction
For many of us, 2020 was a year we would like to forget.
But from a technology perspective, particularly cyber
security, many of the themes that developed will have a
permanent place in the way we manage and deploy network
infrastructure. Moving forward from the mass migration
to remote work, to the dramatic increase in ransomware,
or pressures to adopt new cloud based strategies, all
organizations will continue to stretch an already resource-
constrained security organization into 2021 and beyond.
During all of this global uncertainty, technology sectors like
Network Detection & Response (NDR) not only weathered the storm
but demonstrated unprecedented growth.
Why is that?
It’s all linked to context and visibility. While the landscape may have
changed, the requirements on networks and their connectivity remains
critically important. Now more than ever, Security Operations need
context to understand alerts or investigations quickly and efficiently –
and that is the role of an NDR Solution.
Recently, Vito Rallo from PWC said “When you don’t have network
visibility, you are missing a large amount of important security and
operational information” when asked about the importance of NDR
for his Cyber Threat and Incident Response practice.
The Solution
So, what is NDR? A simple way to describe the capability is the
perfect balance between threat detection and network context.
When combined these capabilities allow human analysts, machines
or processes (e.g., SOAR platform) to quickly and effectively identify
or respond to threats discovered on the wire. NDR is the natural
replacement to NIDS (Network Intrusion Detection Systems) that relied
heavily on known indicators (or signatures) to be effective, and provided
little to no context. NIDS were often referred to as “barking dogs” or
“alert cannons” with each system generating thousands of alerts that
overwhelmed even the largest, most proficient security operation.
What to
Look For 1
NDR has a lot to offer but it will Network Visibility: Empower
also ask a lot of your organization, your security organization
infrastructure, skills, applications or replace them?
and systems. So what are the best
Not all NDR solutions capture raw network packets, some only
things to consider when reviewing look at summary data, an example of this would be NetFlow, a set
NDR platforms for potential use of defined statistics generated by the switch or router providing a
high level summary of traffic profiles/activity. Other systems will
within your environment? In this
briefly inspect and classify traffic flows to assist with the training
section, we will cover the key of unsupervised machine learning models but discard information
aspects to consider, starting, as that is not important to the data science process, the end result is
behavioral based detections being generated.
you might expect, with access
to information or “network A growing portion of the NDR market is focused on supporting
the analyst and not replacing them. An NDR solution will
visibility.”
generate meaningful metadata (and even record the raw packets
themselves) on every connection or flow regardless of any initial
detection or behavior being flagged for analysis. By providing
this level of visibility and not restricting access to the data for an
1. Network Visibility: Empower
algorithm or detection process, many security organizations can
your security organization or
quickly empower every element of the operation with access to
replace them?
live and historical visibility from the network… remembering that
2. Detection: Is it all about behavior the network often holds the ground truth.
or should I look for more?
4. Simplicity of Deployment:
Eliminating Blind Spots
What to
Look For 2
1. Network Visibility: Empower your
Detection: Is it all about
security organization or replace
them? behavior or should I look for
2. Detection: Is it all about behavior more?
or should I look for more?
Networks can be used to generate a wide variety of alerts
3. Storage and Retention: from the most commonly ‘known’ indicators (such as
here today gone tomorrow? network signatures) to behavioral analytics capabilities that
look for outliers crossing thresholds (or baselines) resulting
4. Simplicity of Deployment:
in alarm bells ringing. Regardless of the technique, you
Eliminating Blind Spots
should ask yourself, “what am I looking to achieve?”
5. Costs: Understanding TCO
For some, having any form of “eyes-on” may be the right solution
6. Dipping your toe in the water: since today you have limited resources, skills or capital to work
Early stage testing with. But something is better than nothing. In this case, solutions
that are specifically designed to replace the analyst, limit
interaction and visibility into the underlying data itself are most
likely the right approach.
What to
Look For 3
1. Network Visibility: Empower
Storage and Retention: here
your security organization or
replace them? today gone tomorrow?
2. Detection: Is it all about behavior A key aspect of detection and response, regardless if it’s at
or should I look for more? the endpoint or the network, is access to live and historical
information to provide insight into an investigation, often
3. Storage and Retention:
resulting in questions of “who else did this host connect
here today gone tomorrow?
with?” or “did I see this type of traffic or file content hours,
4. Simplicity of Deployment: days, weeks ago before I knew of the threat?” Today, a
Eliminating Blind Spots fraction of NDR providers deliver storage or retention of
PCAP (raw packets), alerts or network metadata. This forces
5. Costs: Understanding TCO
the end-user to invest in their own data-lake or develop an
6. Dipping your toe in the water: integration into other solutions such as a SIEM.
Early stage testing
Retaining information on network transactions has always been
one of the hardest challenges to solve given the voluminous
amounts of data you can quickly generate from even the most
modest networks speeds. As an example, 1Gbps of network
traffic can easily generate ½ a Terabyte (500GB) of metadata in
a 24-hour period. When you consider many security teams are
looking for weeks or even months of historical data, this results
in data repositories growing out of control. So, when considering
this aspect of your NDR solution ask yourself:
What to
Look For 4
1. Network Visibility: Empower
Simplicity of Deployment:
your security organization or
replace them? Eliminating Blind Spots
2. Detection: Is it all about behavior When you consider the deployment aspect, always verify if
or should I look for more? your NDR solution is suitable for your environment (either
SMB or Enterprise). Does your NDR solution support on-prem
3. Storage and Retention:
(air-gapped) environments where no data leaves the client’s
here today gone tomorrow?
environment, or can it be deployed in the cloud? Although it
4. Simplicity of Deployment: might sound strange, not all NDR providers have developed
Eliminating Blind Spots solutions that work with the native capabilities of the public
cloud providers. This forces you to invest in additional tools
5. Costs: Understanding TCO
to gain access to traffic flows.
6. Dipping your toe in the water:
Early stage testing Is the NDR solution software based or a black box? Black-box
solutions increase the cost of the overall deployment and force
YAD (Yet Another Device) into your already complex data center
environments. Look for solutions that can operate at scale within
your environment, using virtualization, or with your trusted
server OEM (e.g., Dell, CISCO or HPE) to remove the burden of
YAD or the complexity involved in replacing failed components.
What to
Look For 5
1. Network Visibility: Empower
Costs: Understanding TCO
your security organization or
replace them? Today, most NDR systems are sold under a subscription. In
general, this is a positive change in the overall marketplace,
2. Detection: Is it all about behavior
as subscription plans typically include upgrades for software,
or should I look for more?
support and maintenance and in some cases hardware as
3. Storage and Retention: well. You should inquire on these individual aspects as these
here today gone tomorrow? can potentially add to the overall cost.
4. Simplicity of Deployment: Subscription plans can vary based on the charging metric being
Eliminating Blind Spots used. The variance in approach to pricing is a major focus area
5. Costs: Understanding TCO for many organizations, particularly those with defined selection
teams (or committees). One of the most common approaches is
6. Dipping your toe in the water: Appliance-based pricing, which can often penalize the end-user
Early stage testing by generating unnecessary expense and limiting the scale/size –
and ultimately effectiveness – of the deployment itself. As an
example; A vendor is likely to sell you a hardware appliance rated
for a particular interface type (e.g., 10Gb/E) where the price is
based upon consumption of the entire line speed (e.g., 10Gbps)
however, you may only use a third (⅓) of the links capacity. More
than 6Gbps is then paid for but never used.
What to
Look For 6
1. Network Visibility: Empower
Dipping your toe in the
your security organization or
replace them? water: Early stage testing
2. Detection: Is it all about behavior or So, you’re making progress, the decision to instrument
should I look for more? your network has been made and the process to identify
and select a technology begins. There is much to be excited
3. Storage and Retention: here today
about, but one thing hasn’t changed: time and resources are
gone tomorrow?
critical factors, particularly as you try to prove out solutions.
4. Simplicity of Deployment:
Eliminating Blind Spots Should you expect the same age-old demonstration and
evaluation process when you engage with the vendor(s) you
5. Costs: Understanding TCO select? Engaging in lengthy demonstrations, arduous legal
6. Dipping your toe in the water: exchanges, shipping terms and that’s before we look at virtual
Early stage testing or physical resources to host the technology…
Competitive Comparison
Another great way to gain insight is to ask your down-selected vendors for their
product comparisons: every vendor should have one... You will be surprised to find
that most, if not all, follow a very similar format, making it easy to correlate.
There are two key benefits from doing this:
1 2
It will highlight the key feature/ As the NDR market is increasingly crowded (18+ vendors) it
functions that each vendor believes is not possible to create an easy visual comparison against
uniquely differentiate themselves all participants. Asking for the comparison, without
against the competition stating who you are looking at, will let you see who that
vendor views as their major competition. You’ll also be
able to identify their “hands-on” or “hands-off” approach
to the problem.
What “Bricata makes our life easier. It’s a truly reliable solution that
brings the best of available network forensic, inspection and data
Customers
visualization technology in one well-orchestrated solution.”
Appreciate
– Fortune 500 CISO
Bricata.labs demonstrates our cloud-enabled capability (with all lab → Team events: Capture the Flag
components running in a public cloud) and the simplicity of deployment → Training & Education
with the entire process automated, allowing our team to launch an
environment(s) at the click of a button in less than three-minutes.
ABOUT
Bricata is leading the next generation of advanced network detection and response for the enterprise.
By fusing real-time visibility, advanced detection, analysis, forensics, incident response and threat
hunting into a single platform, Bricata provides organizations with end-to-end visibility and context
for direct answers and powerful insight to take immediate action.
B R ICATA .COM | INF O@B R ICATA .COM | 888.468.0610 | FACEBOOK Twitter-square LINKEDIN
Copyright 2021 Bricata, Inc.