SlideShare a Scribd company logo
The Easiest
Solution for
Next-Generation
SIEM
SureLog
International Edition
//2016www.anetusa.net
SureLog
Next –Generation SIEM
ANET
Agenda
• Introduction to SureLog
• What is SureLog
• Benefits of SureLog
SureLog
Next –Generation SIEM
ANET
More Than Just a SIEM
 Integrated Log Management and SIEM Solution
SureLog
Next –Generation SIEM
ANET
Advanced Correlation Engine
 Observed Rule: This is the most frequently used component and it
performs a criteria match based on the elements of an event that are
contained within it. One or more filters can be within a Match
Component. Each Match Component within a rule may match
separate events in order to satisfy the rule.
 Threshold Rule: Count Based rules. This rule will look for total count
of predefined event within a time window. The threshold should be
adjusted based on use case
 Trend Monitor Rule: By trending any event, SureLog can find
deviations from time to time that may be indications of important
security or performance events
SureLog
Next –Generation SIEM
ANET
Advanced Correlation Engine
SureLog
Next –Generation SIEM
ANET
Advanced Correlation Engine
 Statistical Rule: As the label describes, this component uses the
traditional model for Standard Deviation and applies this deviation to
the filters contained within the component. In addition to traditional
Deviation, we’ve added Percent from Average and Fixed Value from
Average as additional comparison operators.
• Population Standard Deviation
• Sample Standard Deviation
• Variance(Sample Standard)
• Variance (Population Standard)
This provides more flexibility than regular standard deviation. For a quick
primer on Standard Deviation, see this Wiki link:
http://en.wikipedia.org/wiki/Standard_deviation.
SureLog
Next –Generation SIEM
ANET
Advanced Correlation Engine
 Value Changed Rule: Match when a field has two different values
within some time
 Never Seen Before Rule: Match when a never before seen term
appears in a field
SureLog
Next –Generation SIEM
ANET
Advanced Correlation Engine
 New correlation engine also has many new features like:
Suppression (Starts Time), Expire Time, Timer (Periodic running),
etc..
 New correlation engine has many new operators like: Starts with
in List, Regex search in List, matches etc..
SureLog
Next –Generation SIEM
ANET
Advanced Correlation Engine
SureLog
Next –Generation SIEM
ANET
Advanced Correlation Engine
 Wizard Driven Rule Samples:
1. If 100 packets are blocked within 15 minutes by UTM/FireWall from the same outside source IP to
distinct destination inside IPs and then starts a traffic session from ANY of the inside (destination) IPs to the
(outside) IP, send ALL IPs (Source, Destination) as a mail
2. If 100 packets are blocked within 15 minutes by UTM/FireWall from the same outside source IP to
distinct destination inside IPs and then starts a traffic session from ALL of the inside (destination) IPs to the
(outside) IP, send Outside IP as a mail
3. Monitor weekly running processes by a user and compare the trend with the current week running process list
4. Detects An Unusual Condition Where A Source Has Authentication Failures At A Host But That Is Not Followed
By A Successful Authentication by the Same User At The Same Host Within 2 Hours
5. If the traffic on port X exceeds the standard deviation of historic traffic patterns then trigger an alert (e.g.,
new worm, bot communicating with C&C).
6. If attack type is destructive (e.g., buffer overflow vs. SYN scan), and target is a critical asset (production server
vs. workstation), then trigger an alert.
7. Detect a scenario where the server stopped but did not start again within an interval of 5 minutes
SureLog
Next –Generation SIEM
ANET
Historical Correlation
 Use historical correlation to run past events through the custom
rules engine to identify threats or security incidents that already
occurred.
 By default, an SureLog SIEM deployment analyzes information
that is collected from log sources in near real-time. With
historical correlation, you can correlate by either the start time or
the device time. Start time is the time that the event was
received by SureLog. Device time is the time that the event
occurred on the device.
SureLog
Next –Generation SIEM
ANET
SureLog
SureLog
Next –Generation SIEM
ANET
Risk Calculation
 Content Based Risk Calculation
Content Based Risk Calculation: If log type is critical (e.g., failed login),
and target is a critical asset (production server vs. workstation), maybe
time is suspicious (during lunch) then risk of this event is important.
Alarm will be triggered without developing additional correlation rule.
 Rule Based Risk Calculation
Alarms can be created with one or more correlation rules. If attack type
is destructive (e.g., buffer overflow vs. SYN scan), and target is a critical
asset (production server vs. workstation), then trigger an alert
SureLog
Next –Generation SIEM
ANET
Rich Taxonomy
Taxonomy is a mapping of information from heterogeneous sources to a
common classification. A taxonomy aids in pattern recognition and also
improves the scope and stability of correlation rules. When events from
heterogeneous sources are normalized they can be analyzed by a smaller
number of correlation rules, which reduces deployment and support
labor. In addition, normalized events are easier to work with when
developing reports and dashboards
SureLog
Next –Generation SIEM
ANET
• Some of the existing 1500+
taxonomy groups in SureLog:
• Reconnaissance->Scan->Host
• TCPTrafficAudit->TCP SYN Flag
• ICMPTrafficAudit
• NamingTrafficAudit
• Malicious->Web->SQL
• Flow->Fragmentation
• httpproxy->TrafficAudit accept
• HTTPDynamicContentAccess
• WebTrafficAudit.Web Content
• HealthStatus.Informational.Traffic.Start
• Malicious.BufferOverflow
• Malicious.Trojan
• PolicyViolation
• Malicious.Web.Attack
Rich Taxonomy
SureLog
Next –Generation SIEM
ANET
Rich Taxonomy
Enrich log data with context
data in real-time
SureLog
Next –Generation SIEM
ANET
Multilayer Data Management
• Column-oriented DBMS
:
https://en.wikipedia.org
/wiki/Column-
oriented_DBMS
• ElasticSearch
SureLog
Next –Generation SIEM
ANET
Multilayer Data Management
• BIG DATA Architecture
• SureLog uses a custom, extremely fast, data
execution engine for its large-scale, real-time data
and warehouse reporting. Capacity and
performance are measured in trillions of logs
within SureLog- allowing reporting across
thousands of devices simultaneously.
SureLog
Next –Generation SIEM
ANET
Change Management
SureLog supports change reporting in log data, give answers to what is
changed in log data in a defined time period within selected time range.
Example: What is the traffic counts for all IPs (Top N IPs) for the last
month in a daily period?
SureLog
Next –Generation SIEM
ANET
Advanced User Management
The SureLog SIEM allows for granular and deeply-tiered user control.
Permissions can be determined with a high level of specificity and nested
into multiple hierarchies. User profiles can be replicated to provide
administrators an efficient template method for creating user accounts.
The Open Source SIEM provides basic controls of user permission and a
single simple user hierarchy. Profile templates cannot be used to create
new user accounts
• Reports
• Correlation Rules
• Administrative Activities are role based
SureLog
Next –Generation SIEM
ANET
Google Like Search & Kibana Integration
SureLog
Next –Generation SIEM
ANET
Drill Down Support
 You can organize data in a variety of ways to show the relationship of
the general to the detailed.
 You can put all the data in the report, but set it to be hidden until a
user clicks to reveal details;
 You can display the data in a data region, such as a table or chart,
which is nested inside report. You can display the data in a sub report
that is completely contained within a main report. Or, you can put the
detail data in drill down reports, separate reports that are displayed
when a user clicks a link.
SureLog
Next –Generation SIEM
ANET
Time Analysis
SureLog
Next –Generation SIEM
ANET
Dashboards & Monitoring
Unlimited user defined report creation supported. Dashboard refresh
settings are configurable. One of the new dashboard feature is: you can
configure dashboards that will be displayed periodically which gives slide
show affect
SureLog
Next –Generation SIEM
ANET
Intelligent Response
 ANET SureLog SIEM product can handle correlation alerts and actions in
smart way through intelligent response system.
 Mail sending
 Executing script
• Visual basic
• Batch file
• Perl script
• Phyton script
 Executing java code
 Running application
 Dynamic list update. Example: Adding or removing new IP to the banned IP
list, Adding or removing a new user to those which try more than three failed
login attempts to the same machine within the last week.,etc.
SureLog
Next –Generation SIEM
ANET
Intelligent Response
 Suspend Users: If an account compromise is suspected, halt a user’s
account access
 Suspend Network Access: If data exfiltration is occurring, the incident
response team can kill the connection by updating the access control
list used by corporate firewalls.
 Kill Processes: If a team detects unknown or blacklisted processes on
critical devices, Intelligent Response can kill the specific running
program.
SureLog
Next –Generation SIEM
ANET
Manageable Threat Intelligence
Threat Intelligence is integrated with different global sources and takes
black lists from there and works as warning system by using these data.
SureLog Threat Intelligence module constantly updates its rich feed
sources and enables rapid discovery of events involving communications
with suspicious or malicious IP addresses.
SureLog
Next –Generation SIEM
ANET
Manageable Threat Intelligence
SureLog aggregates information from numerous sources and applies
automated confidence algorithms to produce intelligence and reputation
data. A large library of openly available information lists, which is
consolidated, classified and automatically analyzed to derive intelligence
and reputation information with confidence
• Sources include:
• Botnet Domains
• Botnet URL’s
• Malware Domains
• Malware URL’s
• Email Phishing
• Phishing Domains
• Phishing URL’s
SureLog
Next –Generation SIEM
ANET
 SureLog Incident Management module helps organization to identify,
analyze, and correct hazards to prevent a future re-occurrence. Incidents will
be assigned to specialist security admins. A resolution or work-around should
be established as quickly as possible in order to correct the security breaches.
Incident Management
SureLog
Next –Generation SIEM
ANET
 SureLog consolidates and normalizes output from multiple vulnerability
scanners.
 SureLog provides analyzed and prioritized vulnerabilities by applying threat
intelligence and full data-enrichment capabilities.
 SureLog supports log data from vulnerability scanners such as Nessus, Qualys,
OpenVas, and NMAP.
VA Reports
SureLog
Next –Generation SIEM
ANET
 SureLog supports 500+ log types like:
Rich Normalizer Library
Apache HTTP Server
Cisco IOS
Cisco IronPort
Cisco PIX Firewall
Fortinet FortiGate Security Gateway
Juniper Networks Firewall and VPN
Linux iptables Firewall
Linux OS
Microsoft ISA
Microsoft SQL Server
Microsoft Windows OS
Microsoft Windows DHCP&DNS
Microsoft Windows IIS
Nessus
NMAP
OpenVas
Oracle RDBMS OS Audit Record
Qualys
Sophos
SonicWall UTM/Firewall/VPN
Sourcefire Defense Center
Symantec Endpoint Protection
TippingPoint Intrusion Prevention System
Websense
SureLog
Next –Generation SIEM
ANET
SureLog
SureLog
Next –Generation SIEM
ANET
Custom&Extended Parser API
SureLog's simple and XML based parsers API will give the power of
parser engine to the developers
Developers
• Can change the output of the normalization engine with Extended Parser API
• Can develop new parser for unparsed log types with Custom Parser API
SureLog
Next –Generation SIEM
ANET
Intuitive Browser Based UI
SureLog's simple and user friendly interfaces helps you to find your way
even in complex definitions like advanced correlation rules or extended
event queries. We made every effort to fulfill the requirements and yet
be simple and fast. Browser based single UI makes it easy to configure,
control and manage all aspects of the system centrally including mobile
devices. SureLog is designed for you to have the best user experience
from a SIEM solution.
SureLog
Next –Generation SIEM
ANET
TAGS
SureLog brings about the addition of a very powerful event tagging system, which allows
individual users as well as teams to tag events with an unlimited number of keywords that
may define that various Characteristics of an event (intrusion, financial, departmental and
topological).
System users can create their own set of custom tags. Tags can be added to events
individually as needed or through the automated action system as events are imported and
normalized. Searching and reporting by tags is supported and tag statistics displays are
included as well.
SureLog
Next –Generation SIEM
ANET
Statistics Reports
Traffic and security statistics reports
SureLog
Next –Generation SIEM
ANET
Distributed Architecture
Supports master-slave mode installation. Hundreds of thousands of EPS
capacity and centralized correlation can be achieved.

More Related Content

PDF
Log correlation SIEM rule examples and correlation engine performance data
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
DOCX
SIEM Surelog Arcsight Qradar LogRhythm Alienvault Solarwinds LEM Performance...
Ertugrul Akbas
 
DOCX
Monitoring Privileged User Actions for Security and Compliance with SureLog: ...
Ertugrul Akbas
 
DOCX
Siem tools
Ertugrul Akbas
 
DOCX
Surelog Intelligence
Ertugrul Akbas
 
DOCX
Why taxonomy is critical
Ertugrul Akbas
 
DOCX
Which generation of siem?
Ertugrul Akbas
 
Log correlation SIEM rule examples and correlation engine performance data
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SIEM Surelog Arcsight Qradar LogRhythm Alienvault Solarwinds LEM Performance...
Ertugrul Akbas
 
Monitoring Privileged User Actions for Security and Compliance with SureLog: ...
Ertugrul Akbas
 
Siem tools
Ertugrul Akbas
 
Surelog Intelligence
Ertugrul Akbas
 
Why taxonomy is critical
Ertugrul Akbas
 
Which generation of siem?
Ertugrul Akbas
 

What's hot (12)

DOCX
Context Driven Scalable SIEM Solution
Ertugrul Akbas
 
DOC
Enhancing SIEM Correlation Rules Through Baselining
Ertugrul Akbas
 
DOCX
SureLog SIEM Profiler
Ertugrul Akbas
 
PPTX
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
TriNimbus
 
PDF
Bir macOS APT Senaryosu
BGA Cyber Security
 
PPTX
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
PDF
Ignyte assurance platform NIST RMF datasheet.
Ignyte Assurance Platform
 
PPTX
Security Monitoring using SIEM null bangalore meet april 2015
n|u - The Open Security Community
 
PPTX
OSSIM User Training: Get Improved Security Visibility with OSSIM
AlienVault
 
PPTX
Presentatie McAfee: Optimale Endpoint Protection 26062015
SLBdiensten
 
PDF
Changing the Security Monitoring Status Quo
EMC
 
PPTX
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
Context Driven Scalable SIEM Solution
Ertugrul Akbas
 
Enhancing SIEM Correlation Rules Through Baselining
Ertugrul Akbas
 
SureLog SIEM Profiler
Ertugrul Akbas
 
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
TriNimbus
 
Bir macOS APT Senaryosu
BGA Cyber Security
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
Ignyte assurance platform NIST RMF datasheet.
Ignyte Assurance Platform
 
Security Monitoring using SIEM null bangalore meet april 2015
n|u - The Open Security Community
 
OSSIM User Training: Get Improved Security Visibility with OSSIM
AlienVault
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
SLBdiensten
 
Changing the Security Monitoring Status Quo
EMC
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
Ad

Viewers also liked (20)

PPTX
SureLog SIEM Compliancy Korelasyon Log Yonetimi Tehdit istihbarati Threat Int...
Ertugrul Akbas
 
DOCX
Log yonetimi korelasyon ve SIEM
Ertugrul Akbas
 
DOCX
SIEM ÇÖZÜMLERİNDE TAXONOMY NE İŞE YARAR?
Ertugrul Akbas
 
PDF
ANET SureLog SIEM avantajları
Ertugrul Akbas
 
PDF
5651 sayili kanun
Ertugrul Akbas
 
PDF
Güvenlik, uyumluluk ve veritabani loglama
Ertugrul Akbas
 
DOCX
Hep İşin Geyiğini Yapıyoruz: AR-GE, İnovasyon, Endüstri 4.0, Ahlak, Eğitim, P...
Ertugrul Akbas
 
DOCX
SIEM ÜRÜNLERİ GÖRÜNÜŞTE BİRBİRİNE BENZİYOR HATTA LOG YÖNETİMİ ÇÖZÜMÜ OLUP DA ...
Ertugrul Akbas
 
PDF
MonkeySpider at Sicherheit 2008
Ali Ikinci
 
PPTX
Dell Boomi HIMSS 2017 Demo: Solve Health IT Interoperability Challenges
DellBoomi
 
DOCX
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Ertugrul Akbas
 
DOCX
SureLog SIEM Jobs
Ertugrul Akbas
 
PDF
Log Yönetiminde Gerçek Veriler ve Tutarlı Analiz
Ertugrul Akbas
 
DOCX
Log yonetmi ve siem ürünlerinde veri analizi, sonuclarin tutarliligi ve dogru...
Ertugrul Akbas
 
PDF
ANET SURELOG INTERNATIONAL EDITION SIEM ÜRÜNÜNÜN KORELASYON İLE İLGİLİ ÜSTÜNL...
Ertugrul Akbas
 
DOCX
ANET SureLog SIEM IntelligentResponse
Ertugrul Akbas
 
DOCX
Anet SureLog SIEM IntelligentResponse
Ertugrul Akbas
 
PDF
Machine learning scientist
Ertugrul Akbas
 
PDF
The correlation advantages of ANET SURELOG International Edition SIEM product
Ertugrul Akbas
 
DOCX
Log siem korelasyon
Ertugrul Akbas
 
SureLog SIEM Compliancy Korelasyon Log Yonetimi Tehdit istihbarati Threat Int...
Ertugrul Akbas
 
Log yonetimi korelasyon ve SIEM
Ertugrul Akbas
 
SIEM ÇÖZÜMLERİNDE TAXONOMY NE İŞE YARAR?
Ertugrul Akbas
 
ANET SureLog SIEM avantajları
Ertugrul Akbas
 
5651 sayili kanun
Ertugrul Akbas
 
Güvenlik, uyumluluk ve veritabani loglama
Ertugrul Akbas
 
Hep İşin Geyiğini Yapıyoruz: AR-GE, İnovasyon, Endüstri 4.0, Ahlak, Eğitim, P...
Ertugrul Akbas
 
SIEM ÜRÜNLERİ GÖRÜNÜŞTE BİRBİRİNE BENZİYOR HATTA LOG YÖNETİMİ ÇÖZÜMÜ OLUP DA ...
Ertugrul Akbas
 
MonkeySpider at Sicherheit 2008
Ali Ikinci
 
Dell Boomi HIMSS 2017 Demo: Solve Health IT Interoperability Challenges
DellBoomi
 
Log Korelasyon/SIEM Kural Örnekleri ve Korelasyon Motoru Performans Verileri
Ertugrul Akbas
 
SureLog SIEM Jobs
Ertugrul Akbas
 
Log Yönetiminde Gerçek Veriler ve Tutarlı Analiz
Ertugrul Akbas
 
Log yonetmi ve siem ürünlerinde veri analizi, sonuclarin tutarliligi ve dogru...
Ertugrul Akbas
 
ANET SURELOG INTERNATIONAL EDITION SIEM ÜRÜNÜNÜN KORELASYON İLE İLGİLİ ÜSTÜNL...
Ertugrul Akbas
 
ANET SureLog SIEM IntelligentResponse
Ertugrul Akbas
 
Anet SureLog SIEM IntelligentResponse
Ertugrul Akbas
 
Machine learning scientist
Ertugrul Akbas
 
The correlation advantages of ANET SURELOG International Edition SIEM product
Ertugrul Akbas
 
Log siem korelasyon
Ertugrul Akbas
 
Ad

Similar to Why SureLog? (20)

PDF
Sure log full
ANETUSA Software
 
PPSX
ANET SureLog International Edition Main Advantages
Murat Korucu
 
PDF
SureLog intelligent response
Ertugrul Akbas
 
PDF
Use Exabeam Smart Timelines to improve your SOC efficiency
JonathanPritchard12
 
PDF
Event mgt feb09
pladott11
 
PDF
Crypto sim_cryptolog_cryptospot_v3
Mustafa Kuğu
 
PPTX
Correlog Overview Presentation
Ameritech Systems Corporation
 
PDF
Open service risk correlation
frantzyv
 
PPTX
Generic siem how_2017
Anton Chuvakin
 
PDF
What is Continuous Monitoring in DevOps.pdf
flufftailshop
 
PDF
What is Continuous Monitoring in DevOps.pdf
kalichargn70th171
 
PDF
Security Certification: Security Analytics using Sumo Logic - Oct 2018
Sumo Logic
 
PDF
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
 
PPTX
McAfee SIEM solution
hashnees
 
PPTX
Hacking appliances
Jonathan Suldo
 
PDF
A practical look at how to build & run IoT business logic
Veselin Pizurica
 
PPTX
Dot Net performance monitoring
Kranthi Paidi
 
PDF
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
ijtsrd
 
PDF
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
 
DOCX
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
Sure log full
ANETUSA Software
 
ANET SureLog International Edition Main Advantages
Murat Korucu
 
SureLog intelligent response
Ertugrul Akbas
 
Use Exabeam Smart Timelines to improve your SOC efficiency
JonathanPritchard12
 
Event mgt feb09
pladott11
 
Crypto sim_cryptolog_cryptospot_v3
Mustafa Kuğu
 
Correlog Overview Presentation
Ameritech Systems Corporation
 
Open service risk correlation
frantzyv
 
Generic siem how_2017
Anton Chuvakin
 
What is Continuous Monitoring in DevOps.pdf
flufftailshop
 
What is Continuous Monitoring in DevOps.pdf
kalichargn70th171
 
Security Certification: Security Analytics using Sumo Logic - Oct 2018
Sumo Logic
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
 
McAfee SIEM solution
hashnees
 
Hacking appliances
Jonathan Suldo
 
A practical look at how to build & run IoT business logic
Veselin Pizurica
 
Dot Net performance monitoring
Kranthi Paidi
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
ijtsrd
 
TimeSeries Machine Learning - PyData London 2025
Suyash Joshi
 
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 

More from Ertugrul Akbas (20)

PDF
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...
Ertugrul Akbas
 
PDF
Olay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
Ertugrul Akbas
 
PDF
SOC ve SIEM Çözümlerinde Korelasyon
Ertugrul Akbas
 
PDF
SIEM den Maksimum Fayda Almak
Ertugrul Akbas
 
PDF
SureLog SIEM Fast Edition Özellikleri ve Fiyatı
Ertugrul Akbas
 
PDF
Neden SureLog?
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
PDF
SureLog SIEM Fast Edition
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
PDF
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
Ertugrul Akbas
 
PDF
Detecting attacks with SureLog SIEM
Ertugrul Akbas
 
PDF
SureLog SIEM
Ertugrul Akbas
 
DOCX
KVKK
Ertugrul Akbas
 
PPTX
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
Ertugrul Akbas
 
PDF
KVKK Siperium Data Analyzer & Data Discovery
Ertugrul Akbas
 
DOCX
SIEM
Ertugrul Akbas
 
BDDK, SPK, TCMB, Cumhurbaşkanlığı Dijital Dönüşüm Ofisi ve ISO27001 Denetiml...
Ertugrul Akbas
 
Olay Müdahale İçin Canlı Kayıtların Saklanmasının Önemi
Ertugrul Akbas
 
SOC ve SIEM Çözümlerinde Korelasyon
Ertugrul Akbas
 
SIEM den Maksimum Fayda Almak
Ertugrul Akbas
 
SureLog SIEM Fast Edition Özellikleri ve Fiyatı
Ertugrul Akbas
 
Neden SureLog?
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SureLog SIEM Fast Edition
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SureLog SIEM Has The Best On-Line Log Retention Time (Hot Storage).
Ertugrul Akbas
 
Detecting attacks with SureLog SIEM
Ertugrul Akbas
 
SureLog SIEM
Ertugrul Akbas
 
SIEM ve KVKK Teknik Tedbirlerinin ANET SureLog SIEM ile uygulanması
Ertugrul Akbas
 
KVKK Siperium Data Analyzer & Data Discovery
Ertugrul Akbas
 

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Doc9.....................................
SofiaCollazos
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Software Development Methodologies in 2025
KodekX
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 

Why SureLog?

  • 2. SureLog Next –Generation SIEM ANET Agenda • Introduction to SureLog • What is SureLog • Benefits of SureLog
  • 3. SureLog Next –Generation SIEM ANET More Than Just a SIEM  Integrated Log Management and SIEM Solution
  • 4. SureLog Next –Generation SIEM ANET Advanced Correlation Engine  Observed Rule: This is the most frequently used component and it performs a criteria match based on the elements of an event that are contained within it. One or more filters can be within a Match Component. Each Match Component within a rule may match separate events in order to satisfy the rule.  Threshold Rule: Count Based rules. This rule will look for total count of predefined event within a time window. The threshold should be adjusted based on use case  Trend Monitor Rule: By trending any event, SureLog can find deviations from time to time that may be indications of important security or performance events
  • 6. SureLog Next –Generation SIEM ANET Advanced Correlation Engine  Statistical Rule: As the label describes, this component uses the traditional model for Standard Deviation and applies this deviation to the filters contained within the component. In addition to traditional Deviation, we’ve added Percent from Average and Fixed Value from Average as additional comparison operators. • Population Standard Deviation • Sample Standard Deviation • Variance(Sample Standard) • Variance (Population Standard) This provides more flexibility than regular standard deviation. For a quick primer on Standard Deviation, see this Wiki link: http://en.wikipedia.org/wiki/Standard_deviation.
  • 7. SureLog Next –Generation SIEM ANET Advanced Correlation Engine  Value Changed Rule: Match when a field has two different values within some time  Never Seen Before Rule: Match when a never before seen term appears in a field
  • 8. SureLog Next –Generation SIEM ANET Advanced Correlation Engine  New correlation engine also has many new features like: Suppression (Starts Time), Expire Time, Timer (Periodic running), etc..  New correlation engine has many new operators like: Starts with in List, Regex search in List, matches etc..
  • 10. SureLog Next –Generation SIEM ANET Advanced Correlation Engine  Wizard Driven Rule Samples: 1. If 100 packets are blocked within 15 minutes by UTM/FireWall from the same outside source IP to distinct destination inside IPs and then starts a traffic session from ANY of the inside (destination) IPs to the (outside) IP, send ALL IPs (Source, Destination) as a mail 2. If 100 packets are blocked within 15 minutes by UTM/FireWall from the same outside source IP to distinct destination inside IPs and then starts a traffic session from ALL of the inside (destination) IPs to the (outside) IP, send Outside IP as a mail 3. Monitor weekly running processes by a user and compare the trend with the current week running process list 4. Detects An Unusual Condition Where A Source Has Authentication Failures At A Host But That Is Not Followed By A Successful Authentication by the Same User At The Same Host Within 2 Hours 5. If the traffic on port X exceeds the standard deviation of historic traffic patterns then trigger an alert (e.g., new worm, bot communicating with C&C). 6. If attack type is destructive (e.g., buffer overflow vs. SYN scan), and target is a critical asset (production server vs. workstation), then trigger an alert. 7. Detect a scenario where the server stopped but did not start again within an interval of 5 minutes
  • 11. SureLog Next –Generation SIEM ANET Historical Correlation  Use historical correlation to run past events through the custom rules engine to identify threats or security incidents that already occurred.  By default, an SureLog SIEM deployment analyzes information that is collected from log sources in near real-time. With historical correlation, you can correlate by either the start time or the device time. Start time is the time that the event was received by SureLog. Device time is the time that the event occurred on the device.
  • 13. SureLog Next –Generation SIEM ANET Risk Calculation  Content Based Risk Calculation Content Based Risk Calculation: If log type is critical (e.g., failed login), and target is a critical asset (production server vs. workstation), maybe time is suspicious (during lunch) then risk of this event is important. Alarm will be triggered without developing additional correlation rule.  Rule Based Risk Calculation Alarms can be created with one or more correlation rules. If attack type is destructive (e.g., buffer overflow vs. SYN scan), and target is a critical asset (production server vs. workstation), then trigger an alert
  • 14. SureLog Next –Generation SIEM ANET Rich Taxonomy Taxonomy is a mapping of information from heterogeneous sources to a common classification. A taxonomy aids in pattern recognition and also improves the scope and stability of correlation rules. When events from heterogeneous sources are normalized they can be analyzed by a smaller number of correlation rules, which reduces deployment and support labor. In addition, normalized events are easier to work with when developing reports and dashboards
  • 15. SureLog Next –Generation SIEM ANET • Some of the existing 1500+ taxonomy groups in SureLog: • Reconnaissance->Scan->Host • TCPTrafficAudit->TCP SYN Flag • ICMPTrafficAudit • NamingTrafficAudit • Malicious->Web->SQL • Flow->Fragmentation • httpproxy->TrafficAudit accept • HTTPDynamicContentAccess • WebTrafficAudit.Web Content • HealthStatus.Informational.Traffic.Start • Malicious.BufferOverflow • Malicious.Trojan • PolicyViolation • Malicious.Web.Attack Rich Taxonomy
  • 16. SureLog Next –Generation SIEM ANET Rich Taxonomy Enrich log data with context data in real-time
  • 17. SureLog Next –Generation SIEM ANET Multilayer Data Management • Column-oriented DBMS : https://en.wikipedia.org /wiki/Column- oriented_DBMS • ElasticSearch
  • 18. SureLog Next –Generation SIEM ANET Multilayer Data Management • BIG DATA Architecture • SureLog uses a custom, extremely fast, data execution engine for its large-scale, real-time data and warehouse reporting. Capacity and performance are measured in trillions of logs within SureLog- allowing reporting across thousands of devices simultaneously.
  • 19. SureLog Next –Generation SIEM ANET Change Management SureLog supports change reporting in log data, give answers to what is changed in log data in a defined time period within selected time range. Example: What is the traffic counts for all IPs (Top N IPs) for the last month in a daily period?
  • 20. SureLog Next –Generation SIEM ANET Advanced User Management The SureLog SIEM allows for granular and deeply-tiered user control. Permissions can be determined with a high level of specificity and nested into multiple hierarchies. User profiles can be replicated to provide administrators an efficient template method for creating user accounts. The Open Source SIEM provides basic controls of user permission and a single simple user hierarchy. Profile templates cannot be used to create new user accounts • Reports • Correlation Rules • Administrative Activities are role based
  • 21. SureLog Next –Generation SIEM ANET Google Like Search & Kibana Integration
  • 22. SureLog Next –Generation SIEM ANET Drill Down Support  You can organize data in a variety of ways to show the relationship of the general to the detailed.  You can put all the data in the report, but set it to be hidden until a user clicks to reveal details;  You can display the data in a data region, such as a table or chart, which is nested inside report. You can display the data in a sub report that is completely contained within a main report. Or, you can put the detail data in drill down reports, separate reports that are displayed when a user clicks a link.
  • 24. SureLog Next –Generation SIEM ANET Dashboards & Monitoring Unlimited user defined report creation supported. Dashboard refresh settings are configurable. One of the new dashboard feature is: you can configure dashboards that will be displayed periodically which gives slide show affect
  • 25. SureLog Next –Generation SIEM ANET Intelligent Response  ANET SureLog SIEM product can handle correlation alerts and actions in smart way through intelligent response system.  Mail sending  Executing script • Visual basic • Batch file • Perl script • Phyton script  Executing java code  Running application  Dynamic list update. Example: Adding or removing new IP to the banned IP list, Adding or removing a new user to those which try more than three failed login attempts to the same machine within the last week.,etc.
  • 26. SureLog Next –Generation SIEM ANET Intelligent Response  Suspend Users: If an account compromise is suspected, halt a user’s account access  Suspend Network Access: If data exfiltration is occurring, the incident response team can kill the connection by updating the access control list used by corporate firewalls.  Kill Processes: If a team detects unknown or blacklisted processes on critical devices, Intelligent Response can kill the specific running program.
  • 27. SureLog Next –Generation SIEM ANET Manageable Threat Intelligence Threat Intelligence is integrated with different global sources and takes black lists from there and works as warning system by using these data. SureLog Threat Intelligence module constantly updates its rich feed sources and enables rapid discovery of events involving communications with suspicious or malicious IP addresses.
  • 28. SureLog Next –Generation SIEM ANET Manageable Threat Intelligence SureLog aggregates information from numerous sources and applies automated confidence algorithms to produce intelligence and reputation data. A large library of openly available information lists, which is consolidated, classified and automatically analyzed to derive intelligence and reputation information with confidence • Sources include: • Botnet Domains • Botnet URL’s • Malware Domains • Malware URL’s • Email Phishing • Phishing Domains • Phishing URL’s
  • 29. SureLog Next –Generation SIEM ANET  SureLog Incident Management module helps organization to identify, analyze, and correct hazards to prevent a future re-occurrence. Incidents will be assigned to specialist security admins. A resolution or work-around should be established as quickly as possible in order to correct the security breaches. Incident Management
  • 30. SureLog Next –Generation SIEM ANET  SureLog consolidates and normalizes output from multiple vulnerability scanners.  SureLog provides analyzed and prioritized vulnerabilities by applying threat intelligence and full data-enrichment capabilities.  SureLog supports log data from vulnerability scanners such as Nessus, Qualys, OpenVas, and NMAP. VA Reports
  • 31. SureLog Next –Generation SIEM ANET  SureLog supports 500+ log types like: Rich Normalizer Library Apache HTTP Server Cisco IOS Cisco IronPort Cisco PIX Firewall Fortinet FortiGate Security Gateway Juniper Networks Firewall and VPN Linux iptables Firewall Linux OS Microsoft ISA Microsoft SQL Server Microsoft Windows OS Microsoft Windows DHCP&DNS Microsoft Windows IIS Nessus NMAP OpenVas Oracle RDBMS OS Audit Record Qualys Sophos SonicWall UTM/Firewall/VPN Sourcefire Defense Center Symantec Endpoint Protection TippingPoint Intrusion Prevention System Websense
  • 33. SureLog Next –Generation SIEM ANET Custom&Extended Parser API SureLog's simple and XML based parsers API will give the power of parser engine to the developers Developers • Can change the output of the normalization engine with Extended Parser API • Can develop new parser for unparsed log types with Custom Parser API
  • 34. SureLog Next –Generation SIEM ANET Intuitive Browser Based UI SureLog's simple and user friendly interfaces helps you to find your way even in complex definitions like advanced correlation rules or extended event queries. We made every effort to fulfill the requirements and yet be simple and fast. Browser based single UI makes it easy to configure, control and manage all aspects of the system centrally including mobile devices. SureLog is designed for you to have the best user experience from a SIEM solution.
  • 35. SureLog Next –Generation SIEM ANET TAGS SureLog brings about the addition of a very powerful event tagging system, which allows individual users as well as teams to tag events with an unlimited number of keywords that may define that various Characteristics of an event (intrusion, financial, departmental and topological). System users can create their own set of custom tags. Tags can be added to events individually as needed or through the automated action system as events are imported and normalized. Searching and reporting by tags is supported and tag statistics displays are included as well.
  • 36. SureLog Next –Generation SIEM ANET Statistics Reports Traffic and security statistics reports
  • 37. SureLog Next –Generation SIEM ANET Distributed Architecture Supports master-slave mode installation. Hundreds of thousands of EPS capacity and centralized correlation can be achieved.