Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
11/19/2014
05:00 PM
Ryan Allphin
Ryan Allphin
Partner Perspectives
100%
0%

When Every Minute Counts: Fighting Advanced Threats With Real-Time SIEM

Survey shows that reducing time-to-detection is possible with the right approach.

In a recent study by Evalueserve for Intel Security, only 24% of companies surveyed said they are confident of their ability to detect an attack within minutes of its starting, and just under half said it would take days, weeks, or even months before they noticed. That is plenty of time for your data to be carried out the door.

According to the survey, as well as our experience investigating attacks, reducing time-to-detection is very possible. Many of the more than 450 companies surveyed have tools and technologies to deliver faster incident response. But too often, the significant signals could not be isolated from the mass of alerts being generated. When we looked for differences among the agile companies – those that could respond to an attack within minutes, and the rest – we found that real-time security information and event management (SIEM) was a fundamental distinction. Real-time SIEM can analyze security event and flow and log data fast enough for proactive internal and external threat management.

Real-time SIEM contributes to faster detection by doing more than the minimum of collecting and storing data. A proactive SIEM can rapidly correlate an enormous range and volume of alerts against external threat intelligence, abnormal versus normal activity, and threat priorities. Threats are prioritized through risk scores based on data such as asset value, patch level, location, and available defenses and countermeasures. Armed with this information, the security operations center gets a much clearer picture of the current state of assets and overall security posture, along with a heat map of the areas that require immediate attention. The organization pivots from being a gatherer of historical data to an active hunter with real-time data.

Some of this data is available via sensors and tools that are deployed today but are not communicating with the SIEM for evaluation. If organizations can begin to collect this data and process it in real time, they can shift the detection time from days and weeks to minutes. Reducing time to detection may have a longer-term impact on event volume as well. Most of the agile companies investigated fewer attacks per year than the study average, possibly indicating that the attackers have moved on to softer targets. (Caveat: Some agile companies investigated 50+ attacks last year, showing that some bad guys remain tenacious, or those companies have a special appeal to attackers.)

Our overall takeaway from the report is that security teams could make better use of the tools and options available today and should definitely chart a course that intersects with a real-time SIEM. Download your free copy of this special report at: http://www.mcafee.com/us/resources/reports/rp-when-minutes-count.pdf.

Ryan Allphin is responsible for defining and executing the strategic direction for the McAfee Security Management business, which includes McAfee's flagship product ePolicy Orchestrator (ePO), Enterprise Security Manager (SIEM), Data & Threat Intelligence Exchange, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
11/21/2014 | 2:47:35 PM
Re: SIEM Data Correlation
It is a foregone conclusion that proper sizing, configuration, and correlation rules must be in place for the SIEM to be effective. In addition, the security staff must also know how to use the SIEM and have a properly structured incident response plan in place. The growing complexity of internal networks with increasingly heterogeneous systems demands automation for speedier responses to threats. Unless human operators have slot machine eyeballs, it is hard to beat machine speed and efficiency.
RyanAllphin
100%
0%
RyanAllphin,
User Rank: Apprentice
11/21/2014 | 12:29:05 PM
Re: SIEM Data Correlation

I'm glad you've seen the true impact of automated correlations by the SIEM. We see this as one of the most potent tools for uncloaking increasingly subtle attacks.  In particular, rule-less correlation can give you ways to detect threats as they develop based on what is important to your business. Factors such as alerts from a particular service or application, a group of users, or specific types of data can feed into traditional rules-based correlation for the greatest sensitivity to evolving risk – in real or near real time.

RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
11/20/2014 | 8:33:55 AM
SIEM Data Correlation
I believe the below line is very pertinent.

"Some of this data is available via sensors and tools that are deployed today but are not communicating with the SIEM for evaluation. If organizations can begin to collect this data and process it in real time, they can shift the detection time from days and weeks to minutes."

I have seen organizations that have all the proper tools in place but are not leveraging a SIEM tool. In a lot of those cases the organization has the SIEM tool but instead are relying entirely on their security staff to correlate events. In these cases, I think the best advice is not to reinvent the wheel. Do the work up front to have your SIEM do the heavy lifting for event correlation. From this have your security team analyze the events. 
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26077
PUBLISHED: 2021-05-10
Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring...
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.