When Every Minute Counts: Fighting Advanced Threats With Real-Time SIEM

Survey shows that reducing time-to-detection is possible with the right approach.

Ryan Allphin, Senior Vice President & General Manager, Security Management, McAfee

November 20, 2014

2 Min Read

In a recent study by Evalueserve for Intel Security, only 24% of companies surveyed said they are confident of their ability to detect an attack within minutes of its starting, and just under half said it would take days, weeks, or even months before they noticed. That is plenty of time for your data to be carried out the door.

According to the survey, as well as our experience investigating attacks, reducing time-to-detection is very possible. Many of the more than 450 companies surveyed have tools and technologies to deliver faster incident response. But too often, the significant signals could not be isolated from the mass of alerts being generated. When we looked for differences among the agile companies – those that could respond to an attack within minutes, and the rest – we found that real-time security information and event management (SIEM) was a fundamental distinction. Real-time SIEM can analyze security event and flow and log data fast enough for proactive internal and external threat management.

Real-time SIEM contributes to faster detection by doing more than the minimum of collecting and storing data. A proactive SIEM can rapidly correlate an enormous range and volume of alerts against external threat intelligence, abnormal versus normal activity, and threat priorities. Threats are prioritized through risk scores based on data such as asset value, patch level, location, and available defenses and countermeasures. Armed with this information, the security operations center gets a much clearer picture of the current state of assets and overall security posture, along with a heat map of the areas that require immediate attention. The organization pivots from being a gatherer of historical data to an active hunter with real-time data.

Some of this data is available via sensors and tools that are deployed today but are not communicating with the SIEM for evaluation. If organizations can begin to collect this data and process it in real time, they can shift the detection time from days and weeks to minutes. Reducing time to detection may have a longer-term impact on event volume as well. Most of the agile companies investigated fewer attacks per year than the study average, possibly indicating that the attackers have moved on to softer targets. (Caveat: Some agile companies investigated 50+ attacks last year, showing that some bad guys remain tenacious, or those companies have a special appeal to attackers.)

Our overall takeaway from the report is that security teams could make better use of the tools and options available today and should definitely chart a course that intersects with a real-time SIEM. Download your free copy of this special report at: http://www.mcafee.com/us/resources/reports/rp-when-minutes-count.pdf.

About the Author(s)

Ryan Allphin

Senior Vice President & General Manager, Security Management, McAfee

Ryan Allphin is responsible for defining and executing the strategic direction for the McAfee Security Management business, which includes McAfee's flagship product ePolicy Orchestrator (ePO), Enterprise Security Manager (SIEM), Data & Threat Intelligence Exchange, Vulnerability Management, Policy Compliance, Risk Advisor and Security-as-a-Service products. Allphin leads the product management, engineering, marketing, and sales functions that drive innovation and worldwide growth for this area of the business.

Since joining McAfee in 2002, Allphin has been a technologist leading several product engineering teams within security management and endpoint system security. His teams have been innovators and set the standard for security management in the industry with ePO and McAfee Agent technologies.

Prior to joining McAfee, Allphin worked at Novell for seven years where he held various product development and leadership positions.

Allphin has a Bachelor's degree in Computer Science from Utah Valley University and has completed executive leadership courses. He lives in Utah, with his wife and 4 children.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights