Empower Your Security Practitioners with Elastic SIEMElasticsearch
Learn how Elastic SIEM’s latest capabilities enable interactive exploration and automated analysis — all at the speed and scale your security practitioners need to defend your organization.
See the video: https://www.elastic.co/elasticon/tour/2019/washington-dc/empower-your-security-practitioners-with-elastic-siem
Video: https://www.youtube.com/watch?v=v69kyU5XMFI
A talk I gave at the Philly Security Shell meetup 2019-02-21 on how the Elastic Stack works and how you can use it for indexing and searching security logs. Tools I mentioned: Github repo with script and demo data - https://github.com/SecHubb/SecShell_Demo Cerebro - https://github.com/lmenezes/cerebro Elastalert - https://github.com/Yelp/elastalert For info on my SANS teaching schedule visit: https://www.sans.org/instructors/john... Twitter: https://twitter.com/SecHubb
Security Incident Event Management
Real time monitoring of Servers, Network Devices.
Correlation of Events
Analysis and reporting of Security Incidents.
Threat Intelligence
Long term storage
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
Developing an attractive website for your business operations to generate more leads and profit for the company is no longer the only concern. There are various other factors in play. It is important to ensure that the website and software of your company are safe from any kind of malware. The main priority of any organization should be to build a defence system for its servers and data. Render your expert service to the clients and meet their requirements with this Cyber Security for Organization Proposal PowerPoint Presentation Slides. Utilize this PPT template to highlight your key deliverables such as uninterrupted server protection, secure organization information, network security, penetration testing, monitoring system vulnerabilities, and personnel training to avoid cyber attacks. Use this internet security PPT layout to talk about the whole process of project kick-off, planning, development, implementation, maintaining, and training for the cyber security services that your company adopts. Showcase the overall project cost that a client has to invest in availing your services as well as mention in detail the financial outlay according to each service and package. Grab the opportunity to educate your audience about the additional services that you provide like software development, cloud services, security, and networking by employing our electronic safeguard services PPT deck. Implement this visually-appealing security services PowerPoint theme to present an attractive business overview of your company and convey your mission, vision, objectives, and goals in an organized manner. Gain the trust of your clients by displaying your past achievements, awards, and client testimonials with this PPT design. You can take the assistance of this PowerPoint slide to inform the customer about your expertise in mobile app development, onsite developer, and business intelligence analytics. Download our ready-to-use computer security PPT graphic and promise the best security to your clients and make an everlasting impression on them. https://bit.ly/3fxyjMt
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
Together, Cortex XSOAR and Elastic SIEM deliver a flexible and effective solution for today's security operations teams. Combining Cortex XSOAR's robust orchestration, automation, and case management capabilities with Elastic's open collection, search, and analytics abilities provides the comprehensive end-to-end strategy SOC teams need to gain visibility to stop threats.
SOC and SIEM systems can help organizations detect and respond to security incidents and threats in a timely manner. A SOC acts as a security operations center to monitor, analyze, and respond to cybersecurity incidents. SIEM provides real-time analysis of security alerts and events to help identify potential threats. Implementing SOC and SIEM solutions can improve an organization's security posture through early threat detection, compliance with regulations, and reduced breach impact.
The document provides an overview of the Splunk data platform. It discusses how Splunk helps organizations overcome challenges in turning real-time data into action. Splunk provides a single platform to investigate, monitor, and take action on any type of machine data from any source. It enables multiple use cases across IT, security, and business domains. The document highlights some of Splunk's products, capabilities, and customer benefits.
This document discusses Splunk Enterprise Security and its frameworks for analyzing security data. It provides an overview of Splunk's security portfolio and how it addresses challenges with legacy SIEM solutions. Key frameworks covered include Notable Events for streamlining incident management, Asset and Identity for enriching incidents with contextual data, Risk Analysis for prioritizing incidents based on quantitative risk scores, and Threat Intelligence for detecting indicators of compromise in machine data. Interactive dashboards and incident review interfaces are highlighted as ways to investigate threats and monitor the security posture.
Security Information and Event Management (SIEM)k33a
This document provides an overview of security information and event management (SIEM). It defines SIEM as software and services that combine security information management (SIM) and security event management (SEM). The key objectives of SIEM are to identify threats and breaches, collect audit logs for security and compliance, and conduct investigations. SIEM solutions centralize log collection, correlate events in real-time, generate reports, and provide log retention, forensics and compliance reporting capabilities. The document discusses typical SIEM features, architecture, deployment options, and reasons for SIEM implementation failures.
The document discusses advanced security operations centers (A-SOCs) and their capabilities. It describes how A-SOCs go beyond traditional SOCs by focusing on threat mitigation, proactive monitoring and intelligence. It outlines key A-SOC capabilities like threat assessment and hunting, threat intelligence, situational awareness, and security analytics. The document also provides examples of A-SOC architecture, frameworks, technologies, queries, organization structure, and processes. It proposes a maturity model for advanced SOC services and provides an example use case for the Carbanak attack.
ELK is a log analysis stack that consists of Elasticsearch for storage, Logstash for transport and processing, and Kibana for visualization. Beats are lightweight shippers that move logs to Logstash or Elasticsearch. The document discusses using ELK for security analytics by ingesting large volumes of logs from various sources for threat hunting, user behavior analytics, and forensic analysis to address limitations of SIEM tools.
This document provides an overview of security information and event management (SIEM) systems. It discusses the types of SIEM systems, how they differ from security event management and security information management systems, and their high-level architecture and life cycle. Key topics covered include log analysis, monitoring, and National Institute of Standards and Technology guidelines for effective log management. The document aims to explain the importance of centralized log management and analysis.
This document summarizes a presentation given by Ranjit Sawant of FireEye. The presentation covered the following key points:
1) Attackers are increasingly leveraging COVID-19 themes in cyber attacks, with malicious emails related to COVID-19 increasing fourfold in March 2020. However, these emails still represent a small percentage of overall malicious emails detected.
2) FireEye Endpoint Security provides capabilities to detect and respond to advanced threats, going beyond just malware to track indicators of compromise, behavior, and attacker techniques across the attack lifecycle.
3) The presentation included a war story example of how FireEye Endpoint Security was used to investigate and respond to a sophisticated nation-state attacker targeting an Asian bank.
SIEM stands for Security Information and Event Management. It involves collecting, aggregating, normalizing and retaining logs and other security-related data from across an organization. SIEM performs analysis on this data through correlation, prioritization and notification/alerting. It also provides reporting and workflow capabilities for security teams. While SIEM promises improved security through these functions, it requires careful planning, scoping, requirements development and ongoing focus to avoid failures and ensure value.
User and entity behavior analytics: building an effective solutionYolanta Beresna
This presentation provides an overview of UEBA space and gives insights into the core components of an effective solution, such as relevant Threat and Attack Scenarios, Data Sources, and various Analytic techniques. This was presented during ISSA-UK chapter meeting.
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
SIEM is a technological solution that collects and aggregates logs from various data sources, discovers trends, and alerts when it spots anomalous activity, like a possible security threat.
The document provides a review and comparison of the QRadar, ArcSight, and Splunk SIEM platforms. It summarizes their key capabilities and components. For each solution, it outlines strengths such as integrated monitoring, analytics features, and scalability. It also notes weaknesses such as complexity, customization limitations, and high data volume licensing costs. The comparison finds QRadar well-suited for smaller deployments, ArcSight for medium-large organizations, and notes Splunk's log collection strengths but limited out-of-the-box correlations compared to competitors. Gartner assessments for each platform cover visibility trends, deployment challenges, and roadmap monitoring advice.
This document discusses IBM's acquisition of Resilient Systems and how it will advance IBM's security strategy. It notes that the acquisition will unite security operations and incident response, deliver a single hub for response management, and allow seamless integration with IBM and third-party solutions. This will help organizations of all sizes successfully prevent, detect, and respond to cyberattacks.
Azure Sentinel is a cloud-native security information and event management (SIEM) and security orchestration, automation and response (SOAR) solution that uses built-in machine learning to detect threats and allows security teams to automate responses. It collects security data from across an organization, including Microsoft 365 data for free. Azure Sentinel is scalable and has no infrastructure costs, with customers only paying for resources used. It integrates with existing security tools and data sources.
Get comprehensive protection across all your platforms and clouds
Protect your organization from threats across devices, identities, apps, data and clouds. Get unmatched visibility into your multiplatform environment that unifies Security Information and Event Management (SIEM) and Extended Detection and Response (XDR). Simplify your security stack with Azure Sentinel and Microsoft Defender.
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
This document discusses log management and security information and event management (SIEM). It defines log management and outlines the log management challenges organizations face. It then introduces SIEM, describing what it is, why it is necessary, its typical features and process flow. The document outlines eight critical features of an effective SIEM solution including log collection, user activity monitoring, event correlation, log retention, compliance reports, file integrity monitoring, log forensics and dashboards. It also discusses typical SIEM products, uses cases for PCI DSS compliance and reasons why SIEM implementations may fail.
Effective Security Operation Center - present by Reza AdinehReZa AdineH
The document discusses how to effectively manage a cyber security operations center (SOC). It addresses questions about how to assess the effectiveness and maturity of a SOC, ensure sufficient threat detection capabilities through proper sensors and data collection, and utilize threat intelligence and data enrichment. The document also provides steps to implement threat management, incident response processes, and leverage machine learning and user entity behavior analytics to detect anomalous user behavior and insider threats.
An introduction to SOC (Security Operation Center)Ahmad Haghighi
The document discusses building a security operations center (SOC). It defines a SOC as a centralized unit that deals with security issues on an organizational and technical level. It monitors, assesses, and defends enterprise information systems. The document discusses whether to build an internal SOC or outsource it. It also covers SOC technologies, personnel requirements, and the five generations of SOCs. It provides resources for learning more about designing and maturing a SOC.
Cyber Security Trends
Business Concerns
Cyber Threats
The Solutions
Security Operation Center
requirement
SOC Architecture model
SOC Implementation
SOC & NOC
SOC & CSIRT
SIEM & Correlation
-----------------------------------------------------------
Definition
Gartner defines a SOC as both a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance. The term "cybersecurity operation center "is often used synonymously for SOC.
A network operations center (NOC) is not a SOC, which focuses on network device management rather than detecting and responding to cybersecurity incidents. Coordination between the two is common, however.
A managed security service is not the same as having a SOC — although a service provider may offer services from a SOC. A managed service is a shared resource and not solely dedicated to a single organization or entity. Similarly, there is no such thing as a managed SOC.
Most of the technologies, processes and best practices that are used in a SOC are not specific to a SOC. Incident response or vulnerability management remain the same, whether delivered from a SOC or not. It is a meta-topic, involving many security domains and disciplines, and depending on the services and functions that are delivered by the SOC.
Services that often reside in a SOC are:
• Cyber security incident response
• Malware analysis
• Forensic analysis
• Threat intelligence analysis
• Risk analytics and attack path modeling
• Countermeasure implementation
• Vulnerability assessment
• Vulnerability analysis
• Penetration testing
• Remediation prioritization and coordination
• Security intelligence collection and fusion
• Security architecture design
• Security consulting
• Security awareness training
• Security audit data collection and distribution
Alternative names for SOC :
Security defense center (SDC)
Security intelligence center
Cyber security center
Threat defense center
security intelligence and operations center (SIOC)
Infrastructure Protection Centre (IPC)
مرکز عملیات امنیت
LTS Secure Security Information and Event Management (SIEM), is a technology that provides real-time analysis of security alerts generated by network hardware and applications.
This document discusses how IBM's QRadar security intelligence platform can enable service providers to extend security capabilities to customers through multi-tenancy and software-as-a-service (SaaS) delivery models. It describes QRadar's multi-tenant capabilities that allow a single deployment to securely support multiple customer domains. It also introduces the QRadar Master Console, which provides centralized monitoring and management across multiple QRadar systems. Finally, it discusses how service providers can deploy QRadar in the cloud through IBM Security Intelligence on Cloud to minimize costs and offer an operating expense model.
Many organizations and managed security providers are starting to move from SIEM, Security Information and Event Management, to EDR, Endpoint Detection and Response. The problem is this may not be the best decision for your organization. These technologies are similar but fundamentally different. This presentation also shares innovating ways to use your SIEM to catch the bad guys as well as learn some simple tricks for easing the burden of SIEM management.
Elastic Security : Protéger son entreprise avec la Suite ElasticElasticsearch
Elastic Security provides unified protection built on the Elastic Stack. It aims to stop threats at scale, eliminate blind spots, and arm every analyst. Features include new modules for collecting data from Office 365 and Okta, CEF module support for Check Point, streaming logs to Logstash, and direct ML integration. Elastic Security is intended to be an out-of-the-box solution that provides prevention, detection, and response capabilities for security analysts everywhere using free and open source tools.
Security Information and Event Management (SIEM)k33a
This document provides an overview of security information and event management (SIEM). It defines SIEM as software and services that combine security information management (SIM) and security event management (SEM). The key objectives of SIEM are to identify threats and breaches, collect audit logs for security and compliance, and conduct investigations. SIEM solutions centralize log collection, correlate events in real-time, generate reports, and provide log retention, forensics and compliance reporting capabilities. The document discusses typical SIEM features, architecture, deployment options, and reasons for SIEM implementation failures.
The document discusses advanced security operations centers (A-SOCs) and their capabilities. It describes how A-SOCs go beyond traditional SOCs by focusing on threat mitigation, proactive monitoring and intelligence. It outlines key A-SOC capabilities like threat assessment and hunting, threat intelligence, situational awareness, and security analytics. The document also provides examples of A-SOC architecture, frameworks, technologies, queries, organization structure, and processes. It proposes a maturity model for advanced SOC services and provides an example use case for the Carbanak attack.
ELK is a log analysis stack that consists of Elasticsearch for storage, Logstash for transport and processing, and Kibana for visualization. Beats are lightweight shippers that move logs to Logstash or Elasticsearch. The document discusses using ELK for security analytics by ingesting large volumes of logs from various sources for threat hunting, user behavior analytics, and forensic analysis to address limitations of SIEM tools.
This document provides an overview of security information and event management (SIEM) systems. It discusses the types of SIEM systems, how they differ from security event management and security information management systems, and their high-level architecture and life cycle. Key topics covered include log analysis, monitoring, and National Institute of Standards and Technology guidelines for effective log management. The document aims to explain the importance of centralized log management and analysis.
This document summarizes a presentation given by Ranjit Sawant of FireEye. The presentation covered the following key points:
1) Attackers are increasingly leveraging COVID-19 themes in cyber attacks, with malicious emails related to COVID-19 increasing fourfold in March 2020. However, these emails still represent a small percentage of overall malicious emails detected.
2) FireEye Endpoint Security provides capabilities to detect and respond to advanced threats, going beyond just malware to track indicators of compromise, behavior, and attacker techniques across the attack lifecycle.
3) The presentation included a war story example of how FireEye Endpoint Security was used to investigate and respond to a sophisticated nation-state attacker targeting an Asian bank.
SIEM stands for Security Information and Event Management. It involves collecting, aggregating, normalizing and retaining logs and other security-related data from across an organization. SIEM performs analysis on this data through correlation, prioritization and notification/alerting. It also provides reporting and workflow capabilities for security teams. While SIEM promises improved security through these functions, it requires careful planning, scoping, requirements development and ongoing focus to avoid failures and ensure value.
User and entity behavior analytics: building an effective solutionYolanta Beresna
This presentation provides an overview of UEBA space and gives insights into the core components of an effective solution, such as relevant Threat and Attack Scenarios, Data Sources, and various Analytic techniques. This was presented during ISSA-UK chapter meeting.
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
SIEM is a technological solution that collects and aggregates logs from various data sources, discovers trends, and alerts when it spots anomalous activity, like a possible security threat.
The document provides a review and comparison of the QRadar, ArcSight, and Splunk SIEM platforms. It summarizes their key capabilities and components. For each solution, it outlines strengths such as integrated monitoring, analytics features, and scalability. It also notes weaknesses such as complexity, customization limitations, and high data volume licensing costs. The comparison finds QRadar well-suited for smaller deployments, ArcSight for medium-large organizations, and notes Splunk's log collection strengths but limited out-of-the-box correlations compared to competitors. Gartner assessments for each platform cover visibility trends, deployment challenges, and roadmap monitoring advice.
This document discusses IBM's acquisition of Resilient Systems and how it will advance IBM's security strategy. It notes that the acquisition will unite security operations and incident response, deliver a single hub for response management, and allow seamless integration with IBM and third-party solutions. This will help organizations of all sizes successfully prevent, detect, and respond to cyberattacks.
Azure Sentinel is a cloud-native security information and event management (SIEM) and security orchestration, automation and response (SOAR) solution that uses built-in machine learning to detect threats and allows security teams to automate responses. It collects security data from across an organization, including Microsoft 365 data for free. Azure Sentinel is scalable and has no infrastructure costs, with customers only paying for resources used. It integrates with existing security tools and data sources.
Get comprehensive protection across all your platforms and clouds
Protect your organization from threats across devices, identities, apps, data and clouds. Get unmatched visibility into your multiplatform environment that unifies Security Information and Event Management (SIEM) and Extended Detection and Response (XDR). Simplify your security stack with Azure Sentinel and Microsoft Defender.
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
This document discusses log management and security information and event management (SIEM). It defines log management and outlines the log management challenges organizations face. It then introduces SIEM, describing what it is, why it is necessary, its typical features and process flow. The document outlines eight critical features of an effective SIEM solution including log collection, user activity monitoring, event correlation, log retention, compliance reports, file integrity monitoring, log forensics and dashboards. It also discusses typical SIEM products, uses cases for PCI DSS compliance and reasons why SIEM implementations may fail.
Effective Security Operation Center - present by Reza AdinehReZa AdineH
The document discusses how to effectively manage a cyber security operations center (SOC). It addresses questions about how to assess the effectiveness and maturity of a SOC, ensure sufficient threat detection capabilities through proper sensors and data collection, and utilize threat intelligence and data enrichment. The document also provides steps to implement threat management, incident response processes, and leverage machine learning and user entity behavior analytics to detect anomalous user behavior and insider threats.
An introduction to SOC (Security Operation Center)Ahmad Haghighi
The document discusses building a security operations center (SOC). It defines a SOC as a centralized unit that deals with security issues on an organizational and technical level. It monitors, assesses, and defends enterprise information systems. The document discusses whether to build an internal SOC or outsource it. It also covers SOC technologies, personnel requirements, and the five generations of SOCs. It provides resources for learning more about designing and maturing a SOC.
Cyber Security Trends
Business Concerns
Cyber Threats
The Solutions
Security Operation Center
requirement
SOC Architecture model
SOC Implementation
SOC & NOC
SOC & CSIRT
SIEM & Correlation
-----------------------------------------------------------
Definition
Gartner defines a SOC as both a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance. The term "cybersecurity operation center "is often used synonymously for SOC.
A network operations center (NOC) is not a SOC, which focuses on network device management rather than detecting and responding to cybersecurity incidents. Coordination between the two is common, however.
A managed security service is not the same as having a SOC — although a service provider may offer services from a SOC. A managed service is a shared resource and not solely dedicated to a single organization or entity. Similarly, there is no such thing as a managed SOC.
Most of the technologies, processes and best practices that are used in a SOC are not specific to a SOC. Incident response or vulnerability management remain the same, whether delivered from a SOC or not. It is a meta-topic, involving many security domains and disciplines, and depending on the services and functions that are delivered by the SOC.
Services that often reside in a SOC are:
• Cyber security incident response
• Malware analysis
• Forensic analysis
• Threat intelligence analysis
• Risk analytics and attack path modeling
• Countermeasure implementation
• Vulnerability assessment
• Vulnerability analysis
• Penetration testing
• Remediation prioritization and coordination
• Security intelligence collection and fusion
• Security architecture design
• Security consulting
• Security awareness training
• Security audit data collection and distribution
Alternative names for SOC :
Security defense center (SDC)
Security intelligence center
Cyber security center
Threat defense center
security intelligence and operations center (SIOC)
Infrastructure Protection Centre (IPC)
مرکز عملیات امنیت
LTS Secure Security Information and Event Management (SIEM), is a technology that provides real-time analysis of security alerts generated by network hardware and applications.
This document discusses how IBM's QRadar security intelligence platform can enable service providers to extend security capabilities to customers through multi-tenancy and software-as-a-service (SaaS) delivery models. It describes QRadar's multi-tenant capabilities that allow a single deployment to securely support multiple customer domains. It also introduces the QRadar Master Console, which provides centralized monitoring and management across multiple QRadar systems. Finally, it discusses how service providers can deploy QRadar in the cloud through IBM Security Intelligence on Cloud to minimize costs and offer an operating expense model.
Many organizations and managed security providers are starting to move from SIEM, Security Information and Event Management, to EDR, Endpoint Detection and Response. The problem is this may not be the best decision for your organization. These technologies are similar but fundamentally different. This presentation also shares innovating ways to use your SIEM to catch the bad guys as well as learn some simple tricks for easing the burden of SIEM management.
Elastic Security : Protéger son entreprise avec la Suite ElasticElasticsearch
Elastic Security provides unified protection built on the Elastic Stack. It aims to stop threats at scale, eliminate blind spots, and arm every analyst. Features include new modules for collecting data from Office 365 and Okta, CEF module support for Check Point, streaming logs to Logstash, and direct ML integration. Elastic Security is intended to be an out-of-the-box solution that provides prevention, detection, and response capabilities for security analysts everywhere using free and open source tools.
Limitless XDR with Elastic Security introduces the first free and open extended detection and response (XDR) solution that unifies security information and event management (SIEM) and endpoint security. XDR modernizes security operations by enabling analytics across all data sources, automating key processes, and providing native endpoint security to every host. Elastic Security provides limitless visibility through hundreds of integrations, limitless data through long-term storage, and limitless analysis across multi-cloud environments.
Empower your security practitioners with the Elastic StackElasticsearch
How does your organization detect and respond to cyber threats? Learn how the latest security capabilities in the Elastic Stack enable interactive exploration and automated analysis with speed and at scale.
Elastic Security provides security teams with a unified platform to prevent, detect, and respond to cyber threats at scale. It allows teams to search across petabytes of data in seconds, gain visibility across cloud, network, and endpoint data through one-click integrations, and accelerate investigations and incident response through built-in case management and collaboration tools. Elastic Security offers capabilities for threat prevention and detection, hunting and investigation, continuous monitoring, and analytics on large volumes of security data.
Conferencia principal: Evolución y visión de Elastic SecurityElasticsearch
Los equipos de SecOps asumen más responsabilidad que nunca para aumentar actividad desde una fuerza de trabajo recientemente remota, lo que acelera la necesidad de la transformación digital. Conoce cómo evolucionó Elastic Security para ayudar a los equipos de SecOps tomar un enfoque más amplio e inclusivo en base a la seguridad y preparar a sus organizaciones para el éxito. Además, conoce la visión de lo que vendrá.
A growing number of SIEM platforms target MSPs and MSSPs, offering SOC-as-a-Service tools with SIEM features and functions. However, business models for SIEM services provided by MSPs and MSSPs can vary widely, with some requiring fully built-out SOCs and others available as white-label services from master MSSPs or software companies. Log360 is a comprehensive SIEM tool that provides holistic security visibility across on-premises and hybrid networks through six components to help resolve challenges including log management, Active Directory auditing, public cloud log management, compliance, and data security.
07 - Defend Against Threats with SIEM Plus XDR Workshop - Microsoft Sentinel ...carlitocabana
This document provides an overview and summary of Microsoft Sentinel, a cloud-native security information and event management (SIEM) tool powered by artificial intelligence. The summary highlights that Microsoft Sentinel allows organizations to harness the scale of the cloud to optimize security operations, detect evolving threats using machine learning, and expedite incident response. It collects security data from any source at cloud scale, provides analytics and hunting capabilities, integrates threat intelligence, and enables automated incident response through orchestration and playbooks.
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
Overall Security Process Review
CISC 662
1
Agenda
Review of the following technologies and current products:
SIEM
CASB
EDR (Enterprise Detection and Response)
NGFW (Next Generation Firewalls)
Threat Intelligence
Summary of Term
SANS Technology Institute - Candidate for Master of Science Degree
What is a SIEM?
SIEM - Security Information Event Management
Logging and Event Aggregation
Network (router,switch,firewall,etc)
System (Server,workstation,etc)
Application (Web, DB )
Correlation Engine
2+ related events = higher alarm (1+1=3)
3
At first glance SIEM's appliances and software look like an event aggregator. While a SIEM has the advantage of aggregating logs what puts them apart from the event aggregator market are the correlation engines.
The correlation engines allow the ability to uncover threats/attacks across multiple related events which by themselves would not be a cause for alarm.
SIEM
4
What is a SIEM?
5
Security information and event management (SIEM) is the technology that can tie all your systems together and give you a comprehensive view of IT security.
IT security is typically a patchwork of technologies – firewalls, intrusion prevention, endpoint protection, threat intelligence and the like – that work together to protect an organization’s network and data from hackers and other threats. Tying all those disparate systems together is another challenge, however, and that’s where SIEM can help.
SIEM systems manage and make sense of security logs from all kinds of devices and carry out a range of functions, including spotting threats, preventing breaches before they occur, detecting breaches, and providing forensic information to determine how a security incident occurred as well as its possible impact.
Using SIEM
How do SIEM Products help the following Security concerns?
Countermeasures to detect attempts to infect internal system
Identification of infected systems trying to exfiltrate information
Mitigation of the impact of infected systems
Detection of outbound sensitive information ( DLP)
6
These questions are a core part of a companies overall security architecture. If a SIEM isn't providing answers or solutions to these questions what is it doing?
If you aren't using your SIEM to solve issues like these it may just be an expensive log aggregator/collection system sitting in your network collecting dust.
SIEM Advantages
Correlation of data from multiple systems and from different events detecting security and operational conditions
Anomaly detection by using a baseline of events over time to find deviations from expected or normal behavior
Comprehensive view into an environment based on event types, protocols, log sources, etc
APT (advanced persistent threat) protection through detection of protocol and application anomalies
Prioritization based on risk of threat to assets, staff can triage the most vulnerable targets
Alerting and monitoring on events of interest to escalate pri ...
Microsoft Sentinel- a cloud native SIEM & SOAR.pdfKranthi Aragonda
This document provides an overview of Microsoft Sentinel, a cloud-native SIEM and SOAR solution. It discusses what SOAR is, important SOAR capabilities like security orchestration and automation. It also covers the benefits of SOAR like faster incident detection and boosting analyst productivity. The document then explains how Microsoft Sentinel collects data at cloud scale, responds to incidents with automation, and detects threats using analytics. It describes features like data connectors, workbooks, hunting, notebooks and certifications related to Microsoft Sentinel.
IBM Security Strategy Intelligence, Integration and Expertise
by Marc van Zadelhoff, VP, WW Strategy and Product Management and Joe Ruthven IBM MEA Security Leader
SIEM Vendors Leading the Way in Cybersecurity Monitoring and Threat DetectionSafeAeon Inc.
The market for SIEM solutions is diverse, with many vendors offering specialized capabilities designed to meet the varying needs of businesses across different industries. Whether you're a large enterprise or a small business, choosing the right SIEM vendor can significantly enhance your security posture by enabling better visibility, quicker threat detection, and more effective incident response.
Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution powered by AI and automation. It collects security data from various sources at cloud scale, uses machine learning to analyze the data and detect threats, provides visualizations to investigate incidents and related entities, and enables automating common security tasks and workflows through automation rules and playbooks. This increases security operations efficiency and helps organizations accelerate response to security threats.
Security Information and Event Management (SIEM) is software that combines security information management (SIM) and security event management (SEM). It collects logs from network devices, applications, servers and other sources to detect threats, ensure compliance with regulations, and aid investigations. Key features of SIEM include log collection, user activity monitoring, real-time event correlation, log retention, compliance reports, file integrity monitoring, log forensics, and customizable dashboards. SIEM solutions can be deployed in various ways including self-hosted, cloud-based, or as a hybrid model managed by the organization or a managed security service provider.
Elastic Security delivers unlimited visibility into threats through its Limitless XDR solution which integrates SIEM, endpoint security, and cloud security solutions. It allows users to ingest and analyze diverse data sources at scale through its common schema. Elastic Security reduces investigation times and protects enterprises from evolving threats with out-of-the-box protections, customizable workflows, and pay-as-you-grow adoption.
Elastic Security: Your one-stop OODA loop shopElasticsearch
Elastic Security, leveraging the expertise of the makers of Elasticsearch coupled with the subject matter experts of the security domain, brings enterprise-grade SIEM and response to all users. With Elastic Security and the Elastic Agent, users can search, see, and stop threats, adding the critical “act” step in the OODA loop cycle. Learn how to take control of your environment and see what Elastic Security has in store next.
SIEM (security information and event management) technology collects and analyzes log and event data from across an organization's IT infrastructure to provide visibility into security threats and other events. EDR (endpoint detection and response) technology focuses specifically on monitoring endpoints like desktops and servers to detect and respond to threats. Using both SIEM and EDR provides a more complete picture of an organization's security posture and cybersecurity threats. Together, they can improve threat detection, response, investigation and remediation compared to using either technology alone. Leading security service providers use both SIEM and EDR solutions to more effectively protect their clients.
This webinar series is designed to help internal auditors looking to equip themselves with competencies and confidence to handle audit of IT controls and information security, and learn about the emerging technologies and their underlying risks
The series focuses on contemporary IT audit approaches relevant to Internal Auditors and the processes underlying risk based IT audits.
Session 7 of 10
This Webinar focuses on SEIM Log Analysis
• Logging Sources & Servers
• What is a SIEM?
• Advantages of a SIEM?
• Using SIEM
• Detection of outbound sensitive information
• Data Collection
• Aggrefation, Normalization and Enrichment
• Reporting and Forensics
• Challenges in log management
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
This document provides an overview and update on Splunk's Enterprise Security and User Behavior Analytics solutions. It discusses the latest releases of Splunk Enterprise, Enterprise Security, and User Behavior Analytics. It describes the key functions and use cases of Enterprise Security, which provides security monitoring, alert management, and incident response capabilities. It also outlines the main functions and use cases of User Behavior Analytics, which uses unsupervised machine learning to detect anomalies and advanced threats. The document promotes Splunk as an effective security intelligence platform to collect, analyze, and investigate machine data from various sources.
We all love the chameleon, and SUSE is long known for its Linux OS - but there is so much more in the world of SUSE.
In this session Jurriën will dive into how SUSE is helping organizations accelerate their digital transformation through container management, hybrid cloud IT infrastructure, and IT operations at the Edge.
Because from core, to cloud, to Edge, SUSE is helping firms to innovate everywhere.
This document summarizes SEP's hybrid backup and recovery software. SEP has over 30 years of backup experience and supports backups from SMB to enterprise. Their software is made in Germany and they have a reputation for excellent support. The document outlines SEP's partnerships with companies like SAP, Red Hat, SUSE, and others. It provides information on backup capabilities for virtualization platforms, databases, operating systems, and applications that SEP supports through various agents and integrations.
The document discusses requirements and considerations for selecting open source tools for container orchestration and runtime. It evaluates Ansible, Terraform, Puppet, Kubernetes, and Nomad for orchestration and decides on Nomad for its ease of use and low learning curve. It also selects Consul for service discovery. The document outlines the installation process and architecture, showing how Consul, Nomad, Traefik, Prometheus, Grafana, Loki, and Minio would integrate together. It provides version details and screenshots of the setup. It suggests next steps like full testing and Raspberry Pi support. Managed options from Devfactory are also discussed.
The document outlines the agenda for the OPEN'22 conference, including sessions on Red Hat, new partners like HashiCorp and Confluent, and product sponsor shoutouts. It also discusses Kangaroot's transition to more virtual work over the past two years, emphasizing an anytime/anywhere flexible approach and emphasizing asynchronous collaboration. Lastly, it proposes initiatives like the ROOT Fund to support open source community work, the Automation Factory to advance Ansible skills, and RootStacks with open source infrastructure templates and managed services.
The document discusses open source software and provides examples of its use by government agencies in Belgium. It begins with an anecdote about how the author got introduced to open source software while sailing. It then discusses how open source has risen in popularity due to factors like EU policies encouraging less dependence on closed source software. The document provides examples of government agencies in Belgium that have adopted open source solutions like PostgreSQL and migrated away from proprietary databases. It discusses case studies of the National Forensic Institute and RvIG adopting open source.
Deploying NGINX in Cloud Native KubernetesKangaroot
Using cloud-native application services is easy, it “just works”. Many customers choose them without giving it a second thought. However, these app services vary from cloud to cloud, with differing levels of quality and numbers of features making visibility and control inconsistent across clouds.
And then there is cost…it’s hard to know what your deployment is going to cost until after it’s been built. Often the services must be compiled in a piecemeal fashion and many products carry bloated code that increases costs.
Finally, security is often an afterthought. Moreover, SecOps teams struggle to keep up with the breakneck app release cadence that has become typical. Often they are seen as DevOps viewing them as a major constraint on the ability to deliver software quickly.
In this workshop, we showcase the NGINX solutions for cloud native Kubernetes that will allow you to:
- Reduce tool sprawl and provide a standard set of services
- Control costs with lightweight and easy solutions
- Bring teams together with automation and self‑service capabilities
Cloud demystified, what remains after the fog has lifted. Kangaroot
The document provides an introduction to cloud computing concepts from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) to Software as a Service (SaaS) to Database as a Service (DBaaS). It discusses different cloud models including private, public, multi-cloud and hybrid clouds. It also covers cloud native technologies like Kubernetes and microservices. The document cautions that while cloud promises flexibility and agility, the realities of cloud adoption require assessing one's specific business needs and whether a cloud provider can truly deliver the desired advantages. It promotes BigAnimal as a fully managed PostgreSQL database service in the cloud to help enterprises with their cloud journeys.
From NetOps to DevOps, modern app teams need a self‑service, API‑driven platform that integrates easily into CI/CD workflows to accelerate app deployment and makes app lifecycle management easier – whether your app has a hybrid or microservices architecture.
Built to manage NGINX Plus instances, NGINX Controller is cloud‑native, secure, and high‑performance. During this webinar, we demonstrate how NGINX Controller can streamline the management of your NGINX Application Services.
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot
The webinar will review a multi-layered framework for PostgreSQL security, with a deeper focus on limiting access to the database and data, as well as securing the data.
Using the popular AAA (Authentication, Authorisation, Auditing) framework EnterpriseDB will cover:
- Best practices for authentication (trust, certificate, MD5, Scram, etc).
- Advanced approaches, such as password profiles.
- Deep dive of authorisation and data access control for roles, database objects (tables, etc), view usage, row-level security, and data redaction.
- Auditing, encryption, and SQL injection attack prevention
Do you want to start with OpenShift but don’t have the manpower, knowledge, e...Kangaroot
Do you want to start with containers or a Kubernetes platform? You don’t have the in-house knowledge, experience, manpower to setup OpenShift? Get OpenShift in a box, managed by Kangaroot.
Digital Transformation requires a change in culture ànd in tools. OpenShift-in-a-box contains a managed platform to give you the tools at a fixed monthly fee ànd workshops & services to help you drive your change in development culture.
Red Hat multi-cluster management & what's new in OpenShiftKangaroot
More and more organisations are not only using container platforms but starting to run multiple clusters of containers. And with that comes new headaches of maintaining, securing, and updating those multiple clusters. In this session we'll look into how Red Hat has solved multi-cluster management, covering cluster lifecycle, app lifecycle, and governance/risk/compliance.
There is no such thing as “Vanilla Kubernetes”Kangaroot
홏홝홚홧홚 홞홨 홣홤 홨홪환홝 황홝홞홣활 홖홨 홑홖홣홞홡홡홖 홆홪홗홚홧홣홚황홚홨. Do you want to start your Digital Transformation, but struggling to find your way in OpenShift or Kubernetes? Together with Red Hat where we'll compare Vanilla Kubernetes with OpenShift. #DigitalTransformation #DevOps #RedHat #Kubernetes #OpenShift #VanillaKubernetes #automation #containers #orchestration
Bechtle AG is a large European IT infrastructure company with over 30 years of experience. It has a comprehensive portfolio of vendor-neutral cloud and IT solutions. Bechtle Clouds provides an enterprise-grade cloud platform through major brands and self-developed services in a multi-cloud environment. Bechtle has existing framework contracts with the Belgian government for services such as Red Hat subscriptions and software/hardware procurement.
Kangaroot open shift best practices - straight from the battlefieldKangaroot
This document discusses best practices for Day 2 operations on OpenShift infrastructure from experts with 20 years of experience in Linux and open source. It provides recommendations around designing highly available etcd clusters, implementing federated Prometheus monitoring across multiple clusters using Prometheus or Thanos, centralized logging with ElasticStack, persistent storage options, container registry considerations, backup solutions using Minio and Velero, application deployments with GitOps, and secrets storage with Vault. The company also provides 24/7 support for customers.
OpenShift 4, the smarter Kubernetes platformKangaroot
OpenShift 4 introduces automated installation, patching, and upgrades for every layer of the container stack from the operating system through application services.
The document provides an agenda for a MongoDB presentation, including an introduction to MongoDB's document model and how it differs from relational databases, how MongoDB brings value to clients with flexibility, performance, versatility and ease of use. It then demonstrates these qualities through MongoDB's features like rich queries, data models, and deployability anywhere. The presentation promotes MongoDB's cloud database as a service Atlas and tools like Compass. It outlines MongoDB's evolution and roadmap. It concludes by providing contact details for the presenter.
Quantum Computing Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Procurement Insights Cost To Value Guide.pptxJon Hansen
Procurement Insights integrated Historic Procurement Industry Archives, serves as a powerful complement — not a competitor — to other procurement industry firms. It fills critical gaps in depth, agility, and contextual insight that most traditional analyst and association models overlook.
Learn more about this value- driven proprietary service offering here.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just tools—they're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPathCommunity
Join this UiPath Community Berlin meetup to explore the Orchestrator API, Swagger interface, and the Test Manager API. Learn how to leverage these tools to streamline automation, enhance testing, and integrate more efficiently with UiPath. Perfect for developers, testers, and automation enthusiasts!
📕 Agenda
Welcome & Introductions
Orchestrator API Overview
Exploring the Swagger Interface
Test Manager API Highlights
Streamlining Automation & Testing with APIs (Demo)
Q&A and Open Discussion
Perfect for developers, testers, and automation enthusiasts!
👉 Join our UiPath Community Berlin chapter: https://community.uipath.com/berlin/
This session streamed live on April 29, 2025, 18:00 CET.
Check out all our upcoming UiPath Community sessions at https://community.uipath.com/events/.
Semantic Cultivators : The Critical Future Role to Enable AIartmondano
By 2026, AI agents will consume 10x more enterprise data than humans, but with none of the contextual understanding that prevents catastrophic misinterpretations.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
📕 Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
👨🏫 Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
3. SIEM app
released
2010 Today
Elasticsearch 0.4
released
ECS 1.0
released
Elasticsearch 1.0
released
Growing use of ELK
for threat hunting
Security consultancy
Perched acquired
Endgame
acquired
Logstash
joins forces
Kibana
joins forces
Beats to collect
all the data
Machine learning
firm Prelert acquired
Elastic Cloud
launched
4. 4
Elastic Builds Software
To Make Data Usable
In Real Time And At Scale,
Powering Solutions Like
Search,
Logging,
Metrics, Security
And more.
6. 6
Vision
To protect the world’s data from attack.
Goal
Deliver a single security solution, combining SIEM
and endpoint, powered by industry-leading and
validated protections to reduce risk for any user.
Elastic Security
14. 14
New threats
every day
# 2 Elastic Edge
• Everything is indexed
• Snappy search at scale
• Do more with machine
learning
15. 15
Volume pricing
not viable
# 3 Elastic Edge
• Licensing model that puts
the customer in control
• Flexibility to balance data
retention, performance, and
cost objectives
• Price points that don’t limit
decision-making
16. 16
Beyond SIEM
Extended SecOps functions beyond SIEM
Existing SIEM hitting limits
MSSP
Data store and search engine for security events
Service providers offer managed SIEM solution
SIEM Alternative Centralized log collection and security analysis
No existing SIEM
Custom Security Application
Platform for special security projects/apps
In-house app dev team creates app
OEM Solution
Data store, search engine, and analysis platform
Security vendor companies build an end-user product
Many Security Analytics Use Cases
20. 20
Kibana
Visualize your Elasticsearch data
and navigate the Elastic Stack
Elasticsearch
A distributed, RESTful search
and analytics engine
Elastic SIEM
A SIEM for Elastic Stack users everywhere
Elastic SIEM app
Elastic Common
Schema (ECS)
Network & host
data integrations
Security
content by
Elastic &
community
Beats Logstash
Elastic
Endpoint
21. 2121
Elastic SIEM
Same data. Different questions.
Ingest & prepare
Ecosystem of network and host data connectors
Elastic Common Schema (ECS)
Analytics
Machine learning and alerting
Ad hoc queries at scale
Graph analytics
Detect, hunt, investigate
Automated attack detection
Interactive threat hunting
Rapid event triage and investigation
22. 22
Auditbeat
● System module (Linux, macOS, Win.): packages,
processes, logins, sockets, users and groups
● Auditd module (Linux Kernel Audit info)
● File integrity monitoring (Linux, macOS, Win.)
Filebeat
● System logs (auth logs) (Linux)
● Santa (macOS)
Winlogbeat
● Windows event logs
● Sysmon
Curated integrations
Host
data
25. Elastic Common Schema (ECS)
Normalize data to streamline analysis
Defines a common set of fields and
objects to ingest data into
Elasticsearch
Enables cross-source analysis of
diverse data
Designed to be extensible
ECS is in GA and is being adopted
throughout the Elastic Stack
Contributions & feedback welcome
at https://github.com/elastic/ecs
26. 26
SIEM App Overview
Curated workflows for
the SOC team
Manage security events
• Visualize and analyze security events
Perform initial triage
• Investigate security events, alerts, and alarms
• Annotate investigations and create incidents
• Handoff incidents to third-party
case/incident/orchestration (SOAR) system
View SOC security posture
• Visualize overall event, alarm, investigation,
incident status and history
27. 27
SIEM App Timeline
Event Explorer
Analyst-friendly qualification
and investigation workflows
● Time ordered events
● Drag and drop filtering
● Multi-index search
● Annotations, comments
● Formatted event views
● Persistent storage
28. 28
Integrated
ML Detection
Trigger jobs and view
results in the SIEM app
● Enable and control pre-built
and custom ML jobs
● View results in Hosts and
Network views
● Links to ML app within Kibana
29. 29
SIEM + Maps
Geo-based analysis with
Elastic Maps
● Shows source and destination
geo location of network data
● Interactive — responds to
filters and allows setting filters
● Further plans for SIEM + Maps
30. 30 These are just some of our partners and community members. The presence of a vendor logo doesn’t imply a business relationship with Elastic.
Elastic SIEM
Ecosystem
Security orchestration,
automation, response
Security incident
response
General ticket & case
management
● Host sources
● Network sources
● Cloud platforms &
applications
● User activity sources
● SIEMs & centralized
security data stores
Community
Consulting
Education & training
Solutions Integrators,
Value-added Resellers,
MSPs & MSSPs
Internal context
External context
32. 3434
Logstash
Elastic Endpoint Security
As simple as antivirus, but way more powerful
Prevents malware and
ransomware before
damage and loss
AI-powered endpoint
detection and response
Built for today’s hybrid
cloud environments
Security starts at the endpoint
33. 3535
Attacks have evolved
Of companies experienced 1+
attacks that compromised
data or IT infrastructure54%
Of those attacks utilized
exploits or fileless techniques
77%
Cyber criminals have broadened their reach to bypass simple
security mechanisms and use bespoke software to target your organization.
Rise of nation state
hacking groups
Malware now works to
stay hidden
Automated and “Malware-as-a-Service” tools
have made file-based detection obsolete
35. 3838
Act
Remediate, validate, and
learn from the threat
Decide
Collaborate, scope, and
build the response plan
Orient
Detect, analyze, and
visualize the attack
Observe
Collect, store, and search
all your data
SecOps
OODA Loop
37. 40
Prevent
Block threats as early as
possible
In-line, autonomous prevention
Blocks ransomware, phishing, exploits, and
malware, with capabilities proven by
rigorous third party testing.
No cloud-analysis required.
Protections mapped to the MITRE
ATT&CK matrix
It’s not just about the payload. Prevent
adversarial behavior before damage and
loss.
Completely customized controls
Create your own protection policy and easily
apply it at scale
38. 41
Collect
Store, and search all
your security data
Zero-trust policy
Kernel-level data collection and enrichment
for adversary tamper resistance
Elastic Common Schema
Open-source specification for uniform data
modeling
Instant access to all data sources
Security, operations, and more data sources
in one product without limitations
Elasticsearch at the core
The heart of the Stack; search across all
your data in an instant
39. 42
Detect
Investigate at scale,
determine the scope
Simple Alert Triage
Assign and manage alerts with a simple
workflow.
Automatic attack visualization
ResolverTM
view for scoping the attack and
root cause analysis, enriched to accelerate
and elevate users
Global detections with customized
machine-learning
Pre-loaded, one-click machine-learning
analysis across all your data
40. 43
Respond
Remediate, eliminate,
validate
One-click containment
Quickly isolate endpoints to prevent further
adversary activity
Real-time, automated response
Autonomous, mIllisecond response actions
for detections deeper in the attack lifecycle
Detect once, prevent many
Easily convert detections to preventions
Fits into your existing workflow
OOTB integrations to fit into your existing
business processes