0% found this document useful (0 votes)
30 views14 pages

Bricata NDR Platform Ebook

An NDR solution provides both threat detection capabilities and network context visibility. There are two main approaches - hands-off solutions focused on detection using machine learning, and hands-on solutions prioritizing network visibility to empower security teams. The key things to consider when selecting an NDR platform are the level of network visibility it provides, its detection techniques, and how it supports security operations and incident response work flows.

Uploaded by

atul2651
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views14 pages

Bricata NDR Platform Ebook

An NDR solution provides both threat detection capabilities and network context visibility. There are two main approaches - hands-off solutions focused on detection using machine learning, and hands-on solutions prioritizing network visibility to empower security teams. The key things to consider when selecting an NDR platform are the level of network visibility it provides, its detection techniques, and how it supports security operations and incident response work flows.

Uploaded by

atul2651
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

EBOOK

What to Look For in a


Network Detection and
Response Platform
BR ICATA .COM | INF O@BR ICATA .COM
What to Look For in a Network Detection and Response Platform

Introduction
For many of us, 2020 was a year we would like to forget.
But from a technology perspective, particularly cyber
security, many of the themes that developed will have a
permanent place in the way we manage and deploy network
infrastructure. Moving forward from the mass migration
to remote work, to the dramatic increase in ransomware,
or pressures to adopt new cloud based strategies, all
organizations will continue to stretch an already resource-
constrained security organization into 2021 and beyond.
During all of this global uncertainty, technology sectors like
Network Detection & Response (NDR) not only weathered the storm
but demonstrated unprecedented growth.

Why is that?

It’s all linked to context and visibility. While the landscape may have
changed, the requirements on networks and their connectivity remains
critically important. Now more than ever, Security Operations need
context to understand alerts or investigations quickly and efficiently –
and that is the role of an NDR Solution.

An NDR solution is a must-have, but selecting the right tool can be


a challenge given the number of vendors and the specific goals or
limitations of your environment. This eBook was created to provide some
insight into how to simplify the search and target the right features and
functions for your business.

BR ICATA .COM | INF O@BR ICATA .COM 2


What to Look For in a Network Detection and Response Platform

“Hands-on” vs “Hands-off” Approach


The market is already seeing some large divides around
two areas: Detection and Visibility. While all offerings
The Challenge deliver both capabilities in order to be classified as NDR,
the solution’s approach is defined by which of these principles
While NDR is seeing high demand, it is founded upon.
it has become a saturated market
The Hands-off approach is founded on detection. Tools of this
with many different vendors, and
kind are most often Machine Learning (ML) based where the data’s
approaches, vying for your business.
primary role is to train a model over time, and the machine then
When you compound all of these
prioritizes what is retained and reported against. To date, this
choices with your own internal
approach is by far the most popular as it can often provide critical
struggles (resources, time, return
insight into your environment, and act as a substitute for the
on investment, skills) the biggest
analyst you are struggling to find or support. If your organization
challenge is determining which tool
has a small security operation and the team is wearing multiple
to evaluate well before a purchasing
hats at once, this approach is a strong alternative to the common
decision is made.
route of outsourcing to a Managed Security Services Provider
Adding to the challenge, NDR is still (MSSP).
in its infancy and as a result trends
In stark contrast, the Hands-on approach most often is founded
are still developing, in particular the
on visibility first, as access to information can empower existing
balance between vendors’ solutions
security teams, processes or procedures. Organizations with well
that provide more of a hands-on or
defined security operations (e.g., teams for SOC, Threat, Incident,
hands-off approach.
Hunting) are craving more data, to eliminate network blinds spots
and correlate the network with other critically important data
sets such as , endpoint or device logs, etc. Their goal is not only to
respond to incidents but to proactively hunt for threats. ML can still
be found in the Hands-on approach, however, all data and multiple
detection techniques are often used to empower the security
operation overall.

Recently, Vito Rallo from PWC said “When you don’t have network
visibility, you are missing a large amount of important security and
operational information” when asked about the importance of NDR
for his Cyber Threat and Incident Response practice.

BR ICATA .COM | INF O@BR ICATA .COM 3


What to Look For in a Network Detection and Response Platform

The Solution
So, what is NDR? A simple way to describe the capability is the
perfect balance between threat detection and network context.
When combined these capabilities allow human analysts, machines
or processes (e.g., SOAR platform) to quickly and effectively identify
or respond to threats discovered on the wire. NDR is the natural
replacement to NIDS (Network Intrusion Detection Systems) that relied
heavily on known indicators (or signatures) to be effective, and provided
little to no context. NIDS were often referred to as “barking dogs” or
“alert cannons” with each system generating thousands of alerts that
overwhelmed even the largest, most proficient security operation.

While false positives will never be removed entirely, today’s NDR


platforms help the user prioritize, tune and respond to threats found
traversing the network. Many platforms offer multiple detection
techniques and user workflows to support incident response, event
triage or even proactive threat hunting.

BR ICATA .COM | INF O@BR ICATA .COM 4


What to Look For in a Network Detection and Response Platform

What to
Look For 1
NDR has a lot to offer but it will Network Visibility: Empower
also ask a lot of your organization, your security organization
infrastructure, skills, applications or replace them?
and systems. So what are the best
Not all NDR solutions capture raw network packets, some only
things to consider when reviewing look at summary data, an example of this would be NetFlow, a set
NDR platforms for potential use of defined statistics generated by the switch or router providing a
high level summary of traffic profiles/activity. Other systems will
within your environment? In this
briefly inspect and classify traffic flows to assist with the training
section, we will cover the key of unsupervised machine learning models but discard information
aspects to consider, starting, as that is not important to the data science process, the end result is
behavioral based detections being generated.
you might expect, with access
to information or “network A growing portion of the NDR market is focused on supporting
the analyst and not replacing them. An NDR solution will
visibility.”
generate meaningful metadata (and even record the raw packets
themselves) on every connection or flow regardless of any initial
detection or behavior being flagged for analysis. By providing
this level of visibility and not restricting access to the data for an
1. Network Visibility: Empower
algorithm or detection process, many security organizations can
your security organization or
quickly empower every element of the operation with access to
replace them?
live and historical visibility from the network… remembering that
2. Detection: Is it all about behavior the network often holds the ground truth.
or should I look for more?

3. Storage and Retention:


here today gone tomorrow?

4. Simplicity of Deployment:
Eliminating Blind Spots

5. Costs: Understanding TCO

6. Dipping your toe in the water:


Early stage testing

BR ICATA .COM | INF O@BR ICATA .COM 5


What to Look For in a Network Detection and Response Platform

What to
Look For 2
1. Network Visibility: Empower your
Detection: Is it all about
security organization or replace
them? behavior or should I look for
2. Detection: Is it all about behavior more?
or should I look for more?
Networks can be used to generate a wide variety of alerts
3. Storage and Retention: from the most commonly ‘known’ indicators (such as
here today gone tomorrow? network signatures) to behavioral analytics capabilities that
look for outliers crossing thresholds (or baselines) resulting
4. Simplicity of Deployment:
in alarm bells ringing. Regardless of the technique, you
Eliminating Blind Spots
should ask yourself, “what am I looking to achieve?”
5. Costs: Understanding TCO
For some, having any form of “eyes-on” may be the right solution
6. Dipping your toe in the water: since today you have limited resources, skills or capital to work
Early stage testing with. But something is better than nothing. In this case, solutions
that are specifically designed to replace the analyst, limit
interaction and visibility into the underlying data itself are most
likely the right approach.

For those with more established security operations (most likely


a defined security team) where investments have already been
made in people and processes you are more likely to look beyond
one layer of detection (e.g., automated behavioral analysis) and
focus on empowerment of the analysts and systems in place.
That means leveraging tried and trusted known indicators that
get updated frequently every day, along with other advanced
techniques such as advanced malware detection (which requires
the NDR platform to extract and analyze files) and behavior or
pattern-based detection capabilities all in the same sensing
platform. In addition (as already highlighted), any detection
should be directly linked to the underlying network metadata
– not just pertinent to the alert itself – but allow the operator
to quickly pivot to broader network history that may not link
directly to any specific event.

BR ICATA .COM | INF O@BR ICATA .COM 6


What to Look For in a Network Detection and Response Platform

What to
Look For 3
1. Network Visibility: Empower
Storage and Retention: here
your security organization or
replace them? today gone tomorrow?
2. Detection: Is it all about behavior A key aspect of detection and response, regardless if it’s at
or should I look for more? the endpoint or the network, is access to live and historical
information to provide insight into an investigation, often
3. Storage and Retention:
resulting in questions of “who else did this host connect
here today gone tomorrow?
with?” or “did I see this type of traffic or file content hours,
4. Simplicity of Deployment: days, weeks ago before I knew of the threat?” Today, a
Eliminating Blind Spots fraction of NDR providers deliver storage or retention of
PCAP (raw packets), alerts or network metadata. This forces
5. Costs: Understanding TCO
the end-user to invest in their own data-lake or develop an
6. Dipping your toe in the water: integration into other solutions such as a SIEM.
Early stage testing
Retaining information on network transactions has always been
one of the hardest challenges to solve given the voluminous
amounts of data you can quickly generate from even the most
modest networks speeds. As an example, 1Gbps of network
traffic can easily generate ½ a Terabyte (500GB) of metadata in
a 24-hour period. When you consider many security teams are
looking for weeks or even months of historical data, this results
in data repositories growing out of control. So, when considering
this aspect of your NDR solution ask yourself:

→ How important is network visibility and history


for my security processes?

→ Does the solution I’m looking at offer onboard


metadata, file or even PCAP retention or do I need
to build my own data facility?

→ Is my only option a SIEM, if so how easy is it to


integrate?

→ How flexible is the solution, can it be customized


to limit what is retained/exported?

For many organizations, network metadata (or PCAP) retention


is a must. Without access to the ground truth, it is almost
impossible to quickly and effectively investigate alerts generated
by the NDR platform.

BR ICATA .COM | INF O@BR ICATA .COM 7


What to Look For in a Network Detection and Response Platform

What to
Look For 4
1. Network Visibility: Empower
Simplicity of Deployment:
your security organization or
replace them? Eliminating Blind Spots
2. Detection: Is it all about behavior When you consider the deployment aspect, always verify if
or should I look for more? your NDR solution is suitable for your environment (either
SMB or Enterprise). Does your NDR solution support on-prem
3. Storage and Retention:
(air-gapped) environments where no data leaves the client’s
here today gone tomorrow?
environment, or can it be deployed in the cloud? Although it
4. Simplicity of Deployment: might sound strange, not all NDR providers have developed
Eliminating Blind Spots solutions that work with the native capabilities of the public
cloud providers. This forces you to invest in additional tools
5. Costs: Understanding TCO
to gain access to traffic flows.
6. Dipping your toe in the water:
Early stage testing Is the NDR solution software based or a black box? Black-box
solutions increase the cost of the overall deployment and force
YAD (Yet Another Device) into your already complex data center
environments. Look for solutions that can operate at scale within
your environment, using virtualization, or with your trusted
server OEM (e.g., Dell, CISCO or HPE) to remove the burden of
YAD or the complexity involved in replacing failed components.

If visibility is a key aspect, ask yourself, “does the solution I’m


evaluating truly help me eradicate network blindspots?” Even
the most sophisticated security operations making the largest
investment in cybersecurity often complain about blind-spots
where complexity, cost, or a combination of both force sacrifices
on where you instrument the network. Remember, not all
solutions require black boxes or require complex per device
pricing structures. Gaining total coverage can be a lot easier than
you first thought.

BR ICATA .COM | INF O@BR ICATA .COM 8


What to Look For in a Network Detection and Response Platform

What to
Look For 5
1. Network Visibility: Empower
Costs: Understanding TCO
your security organization or
replace them? Today, most NDR systems are sold under a subscription. In
general, this is a positive change in the overall marketplace,
2. Detection: Is it all about behavior
as subscription plans typically include upgrades for software,
or should I look for more?
support and maintenance and in some cases hardware as
3. Storage and Retention: well. You should inquire on these individual aspects as these
here today gone tomorrow? can potentially add to the overall cost.

4. Simplicity of Deployment: Subscription plans can vary based on the charging metric being
Eliminating Blind Spots used. The variance in approach to pricing is a major focus area
5. Costs: Understanding TCO for many organizations, particularly those with defined selection
teams (or committees). One of the most common approaches is
6. Dipping your toe in the water: Appliance-based pricing, which can often penalize the end-user
Early stage testing by generating unnecessary expense and limiting the scale/size –
and ultimately effectiveness – of the deployment itself. As an
example; A vendor is likely to sell you a hardware appliance rated
for a particular interface type (e.g., 10Gb/E) where the price is
based upon consumption of the entire line speed (e.g., 10Gbps)
however, you may only use a third (⅓) of the links capacity. More
than 6Gbps is then paid for but never used.

A growing number of NDR vendors today use COTs (Commercial


Off The Shelf) solutions, allowing the user to build out their
own hardware at standard system costs while purchasing a
subscription plan that matches their exact network monitoring
throughputs (pay for what you need). This approach provides a
predictable, scalable and future-proof way of investing in a new
detection solution such as NDR. When you discuss pricing with
your chosen vendor, dig into their price book and explore how
many charging vectors are leveraged for a deployment, large or
small. Often the simplest models (pricebook on a page) will be a
major gating factor in any final investment decision.

BR ICATA .COM | INF O@BR ICATA .COM 9


What to Look For in a Network Detection and Response Platform

What to
Look For 6
1. Network Visibility: Empower
Dipping your toe in the
your security organization or
replace them? water: Early stage testing
2. Detection: Is it all about behavior or So, you’re making progress, the decision to instrument
should I look for more? your network has been made and the process to identify
and select a technology begins. There is much to be excited
3. Storage and Retention: here today
about, but one thing hasn’t changed: time and resources are
gone tomorrow?
critical factors, particularly as you try to prove out solutions.
4. Simplicity of Deployment:
Eliminating Blind Spots Should you expect the same age-old demonstration and
evaluation process when you engage with the vendor(s) you
5. Costs: Understanding TCO select? Engaging in lengthy demonstrations, arduous legal
6. Dipping your toe in the water: exchanges, shipping terms and that’s before we look at virtual
Early stage testing or physical resources to host the technology…

Not to mention the complexities of getting access to the


network traffic (e.g., datacenter) or even connecting to the
traffic itself (e.g., tabs, spans) or the time some tools need to
train their AI/ML models?

The proving ground doesn’t have to be hard… a handful of


vendors offer hands on access to an environment that is pain
free of all of these challenges and allows for security operations
to evaluate all the different aspects from visibility, detection,
threat hunting, integration, speed and overall efficiencies
without paperwork or software downloads – just a web browser.

BR ICATA .COM | INF O@BR ICATA .COM 10


What to Look For in a Network Detection and Response Platform

Competitive Comparison
Another great way to gain insight is to ask your down-selected vendors for their
product comparisons: every vendor should have one... You will be surprised to find
that most, if not all, follow a very similar format, making it easy to correlate.
There are two key benefits from doing this:

1 2
It will highlight the key feature/ As the NDR market is increasingly crowded (18+ vendors) it
functions that each vendor believes is not possible to create an easy visual comparison against
uniquely differentiate themselves all participants. Asking for the comparison, without
against the competition stating who you are looking at, will let you see who that
vendor views as their major competition. You’ll also be
able to identify their “hands-on” or “hands-off” approach
to the problem.

Bricata Comparative Matrix

Full Network Recording (First In First Out - FIFO) X X


Smart PCAP recording (alert based retained for long periods) X
Network Data Capture & Retention
Network metadata long term retention (Data Nodes) X X
High speed (low-cost) sensor option 18Gbps+ in single appliance X X
Packet inspection X X X X
Keep Out

Advanced Malware detection (static - ML based) X X


Advanced Malware detection (dynamic - sandbox) X X
Full Spectrum Threat Detection Network signature (e.g. TALOS, ET Pro) X X
X X X X
Find Within

Indicator of Compromise (e.g. IP, URL or Hash)


Pattern based anomaly detection (behavior) X X X X
Threat hunting workflows (non-alert driven) in product not via SIEM X X
Threat Prevention Intrusion prevention (inline) option X
Customizable signatures and scripts (bring, build or modify) X X
Automated tagging & tuning of alerts (assignment, prioritization, severity) X X
Threat Prevention Multi-Tenant Data Federation (single pain of glass) X
Cloud based management & data retention options (not sensor) X X
Customizable export options (Syslog, ECS, NetFlow/IPFIX, JSON) X X
Consumption based pricing (pay for what you use) X X
Deployment Cloud protection option (Google, Amazon, Microsoft) X X X
Software only solution option - bring your own hardware (at any speed) X X

BR ICATA .COM | INF O@BR ICATA .COM 11


What to Look For in a Network Detection and Response Platform

Why Bricata Bricata’s


NDR Advantages
Bricata is a “hands-on” network
detection and response platform.
We’re the only NDR platform that allows End-to-End Visibility &
security teams and the entire enterprise Meaningful Visualization
to collaborate better, reduce security
See high-fidelity metadata to know in real-time
risk and solve network problems faster
how users, devices, systems and applications
than ever before. By fusing real-time
are behaving on the network.
visibility, advanced detection, analysis,
forensics, incident response and threat
hunting into a single platform, Bricata Advanced 360 Detection &
provides organizations with the most Powerful Analytics
effective tools to find, understand and Multiple threat detection engines give you
act on relevant threats. visibility into the known, unknown, and see
the pattern of the unknown unknowns on
Bricata bridges the gap between “alert-
your network, all while virtually eliminating
cannon” and “black-box” network
false positives.
security solutions, offering signature
inspection, stateful anomaly detection,
and machine learning-powered Effective Response
malware conviction, in one intuitive & Simple Network
place. Bricata doesn’t replace human Instrumentation
analysts. It gives people the power to do Respond to and correlate alerts in real-time,
what people do best – think, evaluate, with frictionless integrations to SIEM/SOC
discover and decide. workflows and 3rd party threat intelligence
tools. Deploy Bricata’s smart sensors in just a
few clicks and easily instrument your network.

Advanced Forensics &


Threat Hunting
Bricata’s smart PCAP allows you to investigate
and validate a threat by providing enough data
to accurately follow the kill-chain. Follow a
hypothesis to uncover an unknown threat, or
gain insight into normal operations. It’s all at
your fingertips.

BR ICATA .COM | INF O@BR ICATA .COM 12


What to Look For in a Network Detection and Response Platform

What “Bricata makes our life easier. It’s a truly reliable solution that
brings the best of available network forensic, inspection and data
Customers
visualization technology in one well-orchestrated solution.”
Appreciate
– Fortune 500 CISO

Consumption-based Seamless integration Smart PCAP, for


pricing: only pay for with other security forensics and
what you need tools and processes remediation

Robust threat hunting Easy to implement,


Hardware agnostic
and forensic analytic immediate impact
and software-based
capability and easy to tune

With Bricata, you have the right data,


at the right time, to get the right answer.

BR ICATA .COM | INF O@BR ICATA .COM 13


Put Us to the Test
NO PAPERWORK, NO INSTALLERS.
JUST A BROWSER

Launched in September 2020 Bricata.labs delivers prospects a real-time


experience of our market leading Network Detection & Response (NDR)
platform at the touch of a button. Use cases for
Bricata.labs include:
Individual users of complete teams can request access from 2-hours
up to 72-hours at no cost, with no paperwork / agreements and no → Early stage assessments of
software installers. capability (kick-the-tires)

Bricata.labs demonstrates our cloud-enabled capability (with all lab → Team events: Capture the Flag
components running in a public cloud) and the simplicity of deployment → Training & Education
with the entire process automated, allowing our team to launch an
environment(s) at the click of a button in less than three-minutes.

Request Bricata.Labs Account

Contact your account team for more information


on Bricata.labs as a next step

ABOUT
Bricata is leading the next generation of advanced network detection and response for the enterprise.
By fusing real-time visibility, advanced detection, analysis, forensics, incident response and threat
hunting into a single platform, Bricata provides organizations with end-to-end visibility and context
for direct answers and powerful insight to take immediate action.

B R ICATA .COM | INF O@B R ICATA .COM | 888.468.0610 | FACEBOOK Twitter-square LINKEDIN
Copyright 2021 Bricata, Inc.

You might also like