15
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

Embed Size (px)

Citation preview

Page 1: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

Security intelligence: solving the puzzle for actionable insight

Fran HowarthSenior analyst, security

Bloor Research

Page 2: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

http://www.logrhythm.com/resources/resource-library/analyst-reports.aspx

Page 3: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

The situation today

“It is not if, but when and how often”

$

$ $ $

$

Targeted Sophisticated Well-resourced

Page 4: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Today’s security imperative

Prevention

Detection

Response

Page 5: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Prevention alone is not enough

Prevention

Detection

Response

Page 6: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Impact of malicious breaches

Page 7: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Detection is the new imperative

Prevention

Detection

Response

Page 8: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Malicious breaches take time to discover

Page 9: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

From detection to containment

Page 10: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Where remediation falls short

Prevention

Detection

Response

Page 11: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Time taken to resolve a breach

Page 12: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

The role of security intelligence platforms

Page 13: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Most cost-effective security tools

Page 14: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Core capabilities

Log management and analysis

Advanced analytics

Continuous monitoring

Automated remediation

Forensics

Actionableintelligence

Page 15: Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right storyConfidential © Bloor Research 2014

Sample use cases

Advanced threat management

Compliance management

Continuous monitoring

Forensic investigation

Fraud detection

Insider threat detection

Monitoring of remote facilities

Network behaviour anomaly detection

Support for multiple locations

Web application defence