SlideShare a Scribd company logo
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Enterprise Management Associates
Research Director, Security and Risk Management
Twitter: @SecurityMonahan
Achieving Hi-Fidelity Security
by Combining Packet and
Endpoint Data
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Featured Speaker
David Monahan
Research Director, Risk and Security
David is a senior information security executive with several
years of experience. He has organized and managed both
physical and information security programs, including
security and network operations (SOCs and NOCs) for
organizations ranging from Fortune 100 companies to local
government and small public and private companies.
Slide 2 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Logistics for Today’s Webinar
Slide 3 © 2016 Enterprise Management Associates, Inc.
• An archived version of the event recording will be
available at www.enterprisemanagement.com
• Log questions in the Q&A panel located on
the lower right corner of your screen
• Questions will be addressed during the Q&A
session of the event
> QUESTIONS
> EVENT RECORDING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Enterprise Management Associates
Research Director, Security and Risk Management
Twitter: @SecurityMonahan
Achieving Hi-Fidelity Security
by Combining Packet and
Endpoint Data
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Sponsors
Slide 5 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Report Demographics
• 225 Respondents
• Industries
 Education
 Finance/Banking
 Health care/ Pharma
 High Tech
 Retail
 Manufacturing
Slide 6 © 2016 Enterprise Management Associates, Inc.
25%
30%
45%
SMB (<1K)
MidMarket (1K- <5K)
Enterprise (5K+)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 7 © 2016 Enterprise Management Associates, Inc.
Top Challenges Driving Combining Data
59%
38%
37%
34%
31%
4%
Lack of analysis capabilities in the solutions
Lack of dashboards
Lack of reporting capabilities
Lack of vendor supplied integration
Lack of open APIs
Other
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 8 © 2016 Enterprise Management Associates, Inc.
Most Important Business Need for Data Integration
25%
20%
16%
14%
13%
6%
6%
Prevent breaches
Respond to breaches
Analyze attacks
Confirm indicators of breach
Predict attacks
Forensic analysis
Reporting/monitoring state of security
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Least Confidence in Security Control
Slide 9 © 2016 Enterprise Management Associates, Inc.
22%
17%
16%
15%
10%
7%
7%
6%
Endpoint Prevention
Endpoint Detection
Concerned equally with more than one
Confident in all four areas
Perimeter Prevention
Perimeter Detection
Incident response (breach investigation capabilities)
Protection (configuration management,…
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Which Type of Data is Best to Identify Attacks?
Slide 10 © 2016 Enterprise Management Associates, Inc.
41%
39%
20%
It really depends upon the type of attack
Network data
Endpoint data
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Endpoint Program Maturity Definitions
Very Strong
At least 99% of endpoints have active prevention/detection (as applicable) and are actively monitored and managed.
AND
The system generates very few, if any, false positives. The system prevents/detects (as applicable) 99% or greater of the endpoint attacks, including those
classified as APT, ATA, or zero-day.)
Strong
At least 85% of endpoints have active prevention/detection (as applicable) and are actively monitored and managed.
AND
The system generates only a few false positives. The system prevents/detects (as applicable) 95% or greater of the endpoint attacks, some of which would
be those classified as APT, ATA, or zero-day.
Competent
At least 75% of endpoints have active prevention/detection (as applicable) and are actively monitored and managed.
AND
The system generates some but not excessive false positives. The system prevents/detects (as applicable) 90% or greater of the endpoint attacks, some of
which could be those classified as APT, ATA, or zero-day.
Slide 11 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Network Program Maturity Definitions
Very Strong
At least 99% of the network segments have active prevention and are actively monitored and managed.
AND
The system generates very few, if any, false positives. The system prevents/detects (as applicable) 99% or greater of the network-based attacks.
Strong
At least 85% of the network segments have active prevention/detection (as applicable) and are actively monitored and managed.
AND
The system generates only a few false positives. The system prevents/detects (as applicable) 95% or greater of the network-based attacks.
Competent
At least 75% of network segments have active prevention/detection (as applicable) and are actively monitored and managed.
AND
The system generates some but not excessive false positives. The system prevents/detects (as applicable) 90% or greater of the network-based attacks.
Underdeveloped
Less than 75% of network segments have active prevention/detection (as applicable) and are not necessarily actively monitored and managed.
OR
The system generates an excessive number of false positives. The system prevents/detects (as applicable) no more than 90% of the network-based attacks.
Slide 12 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Endpoint & Network Security Detection Program Maturity
Slide 13 © 2016 Enterprise Management Associates, Inc.
20%
47%
26%
5%
2%
25%
46%
24%
4%
1%
Very Strong
Strong
Competent
Underdeveloped
Endpoint security detection is not a significant focus
of our security program
Endpoint Network
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Endpoint & Network Security Prevention Program Maturity
Slide 14 © 2016 Enterprise Management Associates, Inc.
21%
42%
28%
7%
2%
19%
47%
27%
6%
1%
Very Strong
Strong
Competent
Underdeveloped
Endpoint security prevention is not a significant
focus of our security program
Endpoint Network
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 15 © 2016 Enterprise Management Associates, Inc.
Endpoint & Network Security Detection Program Maturity
20%
47%
26%
5%
2%
25%
46%
24%
4%
1%
Very Strong
Strong
Competent
Underdeveloped
Endpoint security detection is not a significant focus
of our security program
Endpoint Network
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Effectiveness of Endpoint and Network Protection Tools
Slide 16 © 2016 Enterprise Management Associates, Inc.
67%
21%
11%
63%
20%
17%
Effective
Ineffective
I don't know
Endpoint Network
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Importance of Automation for Prevention
Slide 17 © 2016 Enterprise Management Associates, Inc.
41%
44%
12%
1%
2%
46%
39%
13%
1%
1%
Very Important
Important
Somewhat Important
Somewhat Unimportant
Not Important at All
Endpoint Network
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Importance of Automation for Detection
Slide 18 © 2016 Enterprise Management Associates, Inc.
50%
35%
12%
1%
2%
51%
35%
13%
0%
1%
Very Important
Important
Somewhat Important
Somewhat Unimportant
Not Important at All
Endpoint Network
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Maintaining Historical Data for
Behavioral Analysis and Anomaly Detection
Slide 19 © 2016 Enterprise Management Associates, Inc.
45%
40%
2%
13%
58%
35%
7%
We maintain historical Data
We do not, but we believe it is important
We do not and do not believe it is necessary
I don't know
Endpoint Network
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Summary: Best Data for Early Detection
Slide 20 © 2016 Enterprise Management Associates, Inc.
22%
21%
17%
16%
13%
7%
4%
Access logs
Network Security Logs (Firewall, IDS, DNS, etc.)
Systems Log Monitoring (Application, Server, User
chg, etc)
Network Data (Packets, Flows, etc.)
Endpoint Change Data
Performance Logs
Other
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Data Sources Used for Network Security
Slide 21 © 2016 Enterprise Management Associates, Inc.
42%
36%
35%
29%
28%
2%
18%
Network flows (Netflow, IPFIX, etc.)
Deep packet inspection (DPI)
Cloud based API for reporting
Transaction metrics
Time series data/device metrics (SNMP, WMI, etc.)
Other
I don't know
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Endpoint Data Used for Security
Slide 22 © 2016 Enterprise Management Associates, Inc.
79%
52%
49%
41%
38%
36%
33%
27%
26%
File system changes (new files, permission changes,
movement, etc)
Successful or Failed logins
Newly installed applications
Registry changes
Unidentified/new processes
Local application logs
Process to network connection mapping
New local users
Disk usage changes
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tools Used to Correlate Network and Endpoint Data
Slide 23 © 2016 Enterprise Management Associates, Inc.
46%
36%
33%
32%
32%
11%
4%
Log management with custom scripts
Security incident and event management (SIEM )
Single-vendor solution with both endpoint and
network prevention or detection capabilities
Vendor-provided APIs to integrate other
monitoring/management tools
Security analytics (UBA, anomaly detection, or
predictive analytics)
We currently do not have the capability and evaluate
these data silos separately
I don’t know
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Using Network Data for Security
Slide 24 © 2016 Enterprise Management Associates, Inc.
37%
30%
14%
3%
16%
Yes, but only for critical investigations
No, but we would like to/plan to
Yes, for all investigations
No, and we have no particular need/interest
I don't know
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Data Integration Approaches in Used in Security
Slide 25 © 2016 Enterprise Management Associates, Inc.
48%
37%
37%
36%
23%
2%
Vendor-driven technology partnerships/integrations
Vendor-created open APIs
Third-party integration tools
In-house created custom integrations
Third party analysis of data
Other
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Metadata: Creation and Value
Slide 26 © 2016 Enterprise Management Associates, Inc.
79%
15%
69%
15%
Collection systems create metadata
Invaluable
Very valuable
Moderately invaluable
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Full-Time Equivalent Working Security
Slide 27 © 2016 Enterprise Management Associates, Inc.
30%
32%
19%
19%
<5 FTE
6 to 10 FTE
11 to 20 FTE
>20 FTE
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 28 © 2016 Enterprise Management Associates, Inc.
FTE Applied to Event Investigation per Day
34%
24%
30%
9%
2%
1%
1-4 (> 1 FTE)
5-8 (approximately 1 FTE)
9-24 (1-3 FTE)
25-40 (>3- <=5 FTE)
41-80 (>5- <=10 FTE)
81+ (more than 10 FTE)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTINGSlide 29 © 2016 Enterprise Management Associates, Inc.
Alert Volume per Day
60% 40% <100 Alerts / Day
>=100 Alerts / Day
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Sever/Critical Alert Volume per Day
Slide 30 © 2016 Enterprise Management Associates, Inc.
50%
23%
15%
7%
5%
0%
<=25
26-99
100-499
250-499
500-999
>=1,000
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Severe/Critical Alerts Investigated per Day
Slide 31 © 2016 Enterprise Management Associates, Inc.
67%
21%
6%
6%
10 or fewer
11-25
More than 25
We don't generally investigate security alerts
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Network Strengths and Weaknesses:
• Strengths
• Early warning of a network-based attack
• Attack telemetry
• Payload dissection/determination
• Identification of lateral movement (if placed where they can monitor the traffic)
• Weaknesses
• Limited deployment at perimeter hampers internal visibility.
• They provide no warning of attacks that start on endpoint. (e.g. removable media)
• Cannot provide insight if packets are encrypted.
• Dormant or “triggered” attacks may not be detected by network sandboxes.
• May provide “indeterminate” attack success when used alone.
Slide 32 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Endpoint Strengths and Weaknesses:
• Strengths
• Provides detailed data:
 Application installation and process changes
 Registry/configuration changes, file changes, and data moves
 User additions, removals, and permission changes
 Process association with network connections
• Weaknesses
• Data can be very compartmentalized so trends may be missed.
• Missing or failing agents cause visibility gaps.
• Gaps in scanning or polling cause visibility gaps.
Slide 33 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Summary:
• Over Confidence in Prevention
• Over Confidence in the Security Programs
• Focusing on the Wrong Data
• Lack of Tools (and people)
• Task and Analysis Automation are Key for Success
• Too many alerts to manually investigate
• Both Sets of Data are Valuable but Have Gaps
• Need to get out of Data Silos
• Need better analysis capability using combined data
Slide 34 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Questions?
Get the Full Report: http://bit.ly/1mKekfd
Slide 35 © 2016 Enterprise Management Associates, Inc.

More Related Content

PDF
Website Security Statistics Report 2013
PDF
EMA Megatrends in Cyber-Security
PPTX
IT Alert Management Survey Results - February 2013
PDF
Unlocking High Fidelity Security
PDF
WhiteHat Security 8th Website Security Statistics Report
PDF
Next Generation Endpoint Prtection Buyers Guide
PDF
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
PDF
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Website Security Statistics Report 2013
EMA Megatrends in Cyber-Security
IT Alert Management Survey Results - February 2013
Unlocking High Fidelity Security
WhiteHat Security 8th Website Security Statistics Report
Next Generation Endpoint Prtection Buyers Guide
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -

What's hot (20)

PPTX
Survey: Application Use & Challenges in Government IT Infrastructures
PDF
Avoiding Data Breaches in 2016: What You Need to Know
PDF
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
PPTX
Survey: Security Analytics and Intelligence
PPTX
SolarWinds State of Government IT Management and Monitoring Survey
PPT
Ca world 2007 SOC integration
PDF
A Definitive Market Guide to Deception Technology
PDF
Avoiding Data Breaches in 2016: What You Need to Kow
PDF
Transform Your Security Operations with Security Automation and Orchestration
PPTX
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
PPTX
2018 State of Cyber Resilience Insurance
PPTX
Stay out of headlines for non compliance or data breach
PDF
VIPRE --Responding to Cyberattacks
PPTX
Top 10 tips for effective SOC/NOC collaboration or integration
DOCX
Weathering the Storm of IT Security Compliance
PDF
Top 10 Questions to Ask Your Vulnerability Management Provider
PDF
The Measure of Success: Security Metrics to Tell Your Story
PDF
How close is your organization to being breached | Safe Security
PDF
Open service risk correlation
DOC
081014 Vulnerability Management - VM Framework Procedural Guidelines 1.0
Survey: Application Use & Challenges in Government IT Infrastructures
Avoiding Data Breaches in 2016: What You Need to Know
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Survey: Security Analytics and Intelligence
SolarWinds State of Government IT Management and Monitoring Survey
Ca world 2007 SOC integration
A Definitive Market Guide to Deception Technology
Avoiding Data Breaches in 2016: What You Need to Kow
Transform Your Security Operations with Security Automation and Orchestration
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
2018 State of Cyber Resilience Insurance
Stay out of headlines for non compliance or data breach
VIPRE --Responding to Cyberattacks
Top 10 tips for effective SOC/NOC collaboration or integration
Weathering the Storm of IT Security Compliance
Top 10 Questions to Ask Your Vulnerability Management Provider
The Measure of Success: Security Metrics to Tell Your Story
How close is your organization to being breached | Safe Security
Open service risk correlation
081014 Vulnerability Management - VM Framework Procedural Guidelines 1.0
Ad

Viewers also liked (19)

PDF
The Four V’s of Big Data Testing: Variety, Volume, Velocity, and Veracity
PDF
Comment augmenter son volume d'admission dans les écoles privés ?
PPT
Imagenes fijas
PPT
Fiesta de Amely
PPTX
Vanguardia
PDF
Digital Heritage Documentation Via TLS And Photogrammetry Case Study
PPS
Verdadero como la vida misma
PDF
New Analytical Technique For The Determination Of Mercury (II) By Synergistic...
PDF
Influence of Environmental Factors on the Production of Violacein Synthesized...
PDF
1pre_engineered_building_system
PDF
நல்ல போர்ச்சேவகன்
PDF
Sulphonamides: A Pharmaceutical Review
DOCX
Medikonda_CRM_PM
PDF
Selling Your House Winter 2017
PDF
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
PDF
Secreto a voces de la Estética 2015
PPTX
Polimerizacion por emulsion 1
PPTX
Los misterios del rosario
PDF
EMA Analyst Slides: 2013 Big Data Research Results
The Four V’s of Big Data Testing: Variety, Volume, Velocity, and Veracity
Comment augmenter son volume d'admission dans les écoles privés ?
Imagenes fijas
Fiesta de Amely
Vanguardia
Digital Heritage Documentation Via TLS And Photogrammetry Case Study
Verdadero como la vida misma
New Analytical Technique For The Determination Of Mercury (II) By Synergistic...
Influence of Environmental Factors on the Production of Violacein Synthesized...
1pre_engineered_building_system
நல்ல போர்ச்சேவகன்
Sulphonamides: A Pharmaceutical Review
Medikonda_CRM_PM
Selling Your House Winter 2017
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
Secreto a voces de la Estética 2015
Polimerizacion por emulsion 1
Los misterios del rosario
EMA Analyst Slides: 2013 Big Data Research Results
Ad

Similar to Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data (20)

PDF
EMA Network Security Survey Findings (SEP 2016)
PDF
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
PPTX
SANS Report: The State of Security in Control Systems Today
PDF
The Value of Using Security Policy Orchestration and Automation for Improving...
PDF
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
PDF
Democratizing IT Automation in a Multi-Cloud World
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PDF
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
PPTX
SaaS Data Protection
PDF
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
PDF
Advanced IT Analytics: A Look at Real Adoptions in the Real World
PPTX
Security and Accountability in the Cloud (in partnership with SANS)
PDF
Accelerating Enhanced Threat Identification and Incident Investigation
PDF
Tame Complex IT Environments with Data-Driven IT Automation
PPTX
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
PDF
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
PPT
Smart security solutions for SMBs
PDF
The Imitation Game: Detecting and Thwarting Automated Bot Attacks
PDF
Splunk conf2014 - Operationalizing Advanced Threat Defense
EMA Network Security Survey Findings (SEP 2016)
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
SANS Report: The State of Security in Control Systems Today
The Value of Using Security Policy Orchestration and Automation for Improving...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Democratizing IT Automation in a Multi-Cloud World
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
SaaS Data Protection
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Advanced IT Analytics: A Look at Real Adoptions in the Real World
Security and Accountability in the Cloud (in partnership with SANS)
Accelerating Enhanced Threat Identification and Incident Investigation
Tame Complex IT Environments with Data-Driven IT Automation
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Bridging the Gap Between Your Security Defenses and Critical Data
Smart security solutions for SMBs
The Imitation Game: Detecting and Thwarting Automated Bot Attacks
Splunk conf2014 - Operationalizing Advanced Threat Defense

More from Enterprise Management Associates (20)

PDF
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
PDF
Enterprise Strategies for Hybrid, Multi-Cloud Networks
PDF
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
PDF
The AI Advantage: How IT Leaders are Redefining Operations in 2025
PDF
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
PDF
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
PDF
Network Observability: Managing Performance Across Hybrid Networks
PDF
Zero Trust Networking: How Network Teams Support Cybersecurity
PDF
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
PDF
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
PDF
Applying Generative AI to IT Operations Research
PPTX
Network as a Service: Understanding the Cloud Consumption Model in Networking
PDF
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
PDF
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
PDF
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
PDF
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
PDF
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
PDF
EMA AIOps Radar: A Guide to Investing in Innovation
PDF
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
PDF
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
Enterprise Strategies for Hybrid, Multi-Cloud Networks
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
The AI Advantage: How IT Leaders are Redefining Operations in 2025
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Network Observability: Managing Performance Across Hybrid Networks
Zero Trust Networking: How Network Teams Support Cybersecurity
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
Applying Generative AI to IT Operations Research
Network as a Service: Understanding the Cloud Consumption Model in Networking
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
EMA AIOps Radar: A Guide to Investing in Innovation
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The AUB Centre for AI in Media Proposal.docx
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf

Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING David Monahan Enterprise Management Associates Research Director, Security and Risk Management Twitter: @SecurityMonahan Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
  • 2. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Featured Speaker David Monahan Research Director, Risk and Security David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. Slide 2 © 2016 Enterprise Management Associates, Inc.
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Logistics for Today’s Webinar Slide 3 © 2016 Enterprise Management Associates, Inc. • An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the Q&A panel located on the lower right corner of your screen • Questions will be addressed during the Q&A session of the event > QUESTIONS > EVENT RECORDING
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING David Monahan Enterprise Management Associates Research Director, Security and Risk Management Twitter: @SecurityMonahan Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
  • 5. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Sponsors Slide 5 © 2016 Enterprise Management Associates, Inc.
  • 6. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Report Demographics • 225 Respondents • Industries  Education  Finance/Banking  Health care/ Pharma  High Tech  Retail  Manufacturing Slide 6 © 2016 Enterprise Management Associates, Inc. 25% 30% 45% SMB (<1K) MidMarket (1K- <5K) Enterprise (5K+)
  • 7. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTINGSlide 7 © 2016 Enterprise Management Associates, Inc. Top Challenges Driving Combining Data 59% 38% 37% 34% 31% 4% Lack of analysis capabilities in the solutions Lack of dashboards Lack of reporting capabilities Lack of vendor supplied integration Lack of open APIs Other
  • 8. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTINGSlide 8 © 2016 Enterprise Management Associates, Inc. Most Important Business Need for Data Integration 25% 20% 16% 14% 13% 6% 6% Prevent breaches Respond to breaches Analyze attacks Confirm indicators of breach Predict attacks Forensic analysis Reporting/monitoring state of security
  • 9. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Least Confidence in Security Control Slide 9 © 2016 Enterprise Management Associates, Inc. 22% 17% 16% 15% 10% 7% 7% 6% Endpoint Prevention Endpoint Detection Concerned equally with more than one Confident in all four areas Perimeter Prevention Perimeter Detection Incident response (breach investigation capabilities) Protection (configuration management,…
  • 10. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Which Type of Data is Best to Identify Attacks? Slide 10 © 2016 Enterprise Management Associates, Inc. 41% 39% 20% It really depends upon the type of attack Network data Endpoint data
  • 11. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Endpoint Program Maturity Definitions Very Strong At least 99% of endpoints have active prevention/detection (as applicable) and are actively monitored and managed. AND The system generates very few, if any, false positives. The system prevents/detects (as applicable) 99% or greater of the endpoint attacks, including those classified as APT, ATA, or zero-day.) Strong At least 85% of endpoints have active prevention/detection (as applicable) and are actively monitored and managed. AND The system generates only a few false positives. The system prevents/detects (as applicable) 95% or greater of the endpoint attacks, some of which would be those classified as APT, ATA, or zero-day. Competent At least 75% of endpoints have active prevention/detection (as applicable) and are actively monitored and managed. AND The system generates some but not excessive false positives. The system prevents/detects (as applicable) 90% or greater of the endpoint attacks, some of which could be those classified as APT, ATA, or zero-day. Slide 11 © 2016 Enterprise Management Associates, Inc.
  • 12. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Network Program Maturity Definitions Very Strong At least 99% of the network segments have active prevention and are actively monitored and managed. AND The system generates very few, if any, false positives. The system prevents/detects (as applicable) 99% or greater of the network-based attacks. Strong At least 85% of the network segments have active prevention/detection (as applicable) and are actively monitored and managed. AND The system generates only a few false positives. The system prevents/detects (as applicable) 95% or greater of the network-based attacks. Competent At least 75% of network segments have active prevention/detection (as applicable) and are actively monitored and managed. AND The system generates some but not excessive false positives. The system prevents/detects (as applicable) 90% or greater of the network-based attacks. Underdeveloped Less than 75% of network segments have active prevention/detection (as applicable) and are not necessarily actively monitored and managed. OR The system generates an excessive number of false positives. The system prevents/detects (as applicable) no more than 90% of the network-based attacks. Slide 12 © 2016 Enterprise Management Associates, Inc.
  • 13. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Endpoint & Network Security Detection Program Maturity Slide 13 © 2016 Enterprise Management Associates, Inc. 20% 47% 26% 5% 2% 25% 46% 24% 4% 1% Very Strong Strong Competent Underdeveloped Endpoint security detection is not a significant focus of our security program Endpoint Network
  • 14. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Endpoint & Network Security Prevention Program Maturity Slide 14 © 2016 Enterprise Management Associates, Inc. 21% 42% 28% 7% 2% 19% 47% 27% 6% 1% Very Strong Strong Competent Underdeveloped Endpoint security prevention is not a significant focus of our security program Endpoint Network
  • 15. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTINGSlide 15 © 2016 Enterprise Management Associates, Inc. Endpoint & Network Security Detection Program Maturity 20% 47% 26% 5% 2% 25% 46% 24% 4% 1% Very Strong Strong Competent Underdeveloped Endpoint security detection is not a significant focus of our security program Endpoint Network
  • 16. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Effectiveness of Endpoint and Network Protection Tools Slide 16 © 2016 Enterprise Management Associates, Inc. 67% 21% 11% 63% 20% 17% Effective Ineffective I don't know Endpoint Network
  • 17. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Importance of Automation for Prevention Slide 17 © 2016 Enterprise Management Associates, Inc. 41% 44% 12% 1% 2% 46% 39% 13% 1% 1% Very Important Important Somewhat Important Somewhat Unimportant Not Important at All Endpoint Network
  • 18. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Importance of Automation for Detection Slide 18 © 2016 Enterprise Management Associates, Inc. 50% 35% 12% 1% 2% 51% 35% 13% 0% 1% Very Important Important Somewhat Important Somewhat Unimportant Not Important at All Endpoint Network
  • 19. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Maintaining Historical Data for Behavioral Analysis and Anomaly Detection Slide 19 © 2016 Enterprise Management Associates, Inc. 45% 40% 2% 13% 58% 35% 7% We maintain historical Data We do not, but we believe it is important We do not and do not believe it is necessary I don't know Endpoint Network
  • 20. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Summary: Best Data for Early Detection Slide 20 © 2016 Enterprise Management Associates, Inc. 22% 21% 17% 16% 13% 7% 4% Access logs Network Security Logs (Firewall, IDS, DNS, etc.) Systems Log Monitoring (Application, Server, User chg, etc) Network Data (Packets, Flows, etc.) Endpoint Change Data Performance Logs Other
  • 21. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Data Sources Used for Network Security Slide 21 © 2016 Enterprise Management Associates, Inc. 42% 36% 35% 29% 28% 2% 18% Network flows (Netflow, IPFIX, etc.) Deep packet inspection (DPI) Cloud based API for reporting Transaction metrics Time series data/device metrics (SNMP, WMI, etc.) Other I don't know
  • 22. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Endpoint Data Used for Security Slide 22 © 2016 Enterprise Management Associates, Inc. 79% 52% 49% 41% 38% 36% 33% 27% 26% File system changes (new files, permission changes, movement, etc) Successful or Failed logins Newly installed applications Registry changes Unidentified/new processes Local application logs Process to network connection mapping New local users Disk usage changes
  • 23. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tools Used to Correlate Network and Endpoint Data Slide 23 © 2016 Enterprise Management Associates, Inc. 46% 36% 33% 32% 32% 11% 4% Log management with custom scripts Security incident and event management (SIEM ) Single-vendor solution with both endpoint and network prevention or detection capabilities Vendor-provided APIs to integrate other monitoring/management tools Security analytics (UBA, anomaly detection, or predictive analytics) We currently do not have the capability and evaluate these data silos separately I don’t know
  • 24. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Using Network Data for Security Slide 24 © 2016 Enterprise Management Associates, Inc. 37% 30% 14% 3% 16% Yes, but only for critical investigations No, but we would like to/plan to Yes, for all investigations No, and we have no particular need/interest I don't know
  • 25. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Data Integration Approaches in Used in Security Slide 25 © 2016 Enterprise Management Associates, Inc. 48% 37% 37% 36% 23% 2% Vendor-driven technology partnerships/integrations Vendor-created open APIs Third-party integration tools In-house created custom integrations Third party analysis of data Other
  • 26. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Metadata: Creation and Value Slide 26 © 2016 Enterprise Management Associates, Inc. 79% 15% 69% 15% Collection systems create metadata Invaluable Very valuable Moderately invaluable
  • 27. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Full-Time Equivalent Working Security Slide 27 © 2016 Enterprise Management Associates, Inc. 30% 32% 19% 19% <5 FTE 6 to 10 FTE 11 to 20 FTE >20 FTE
  • 28. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTINGSlide 28 © 2016 Enterprise Management Associates, Inc. FTE Applied to Event Investigation per Day 34% 24% 30% 9% 2% 1% 1-4 (> 1 FTE) 5-8 (approximately 1 FTE) 9-24 (1-3 FTE) 25-40 (>3- <=5 FTE) 41-80 (>5- <=10 FTE) 81+ (more than 10 FTE)
  • 29. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTINGSlide 29 © 2016 Enterprise Management Associates, Inc. Alert Volume per Day 60% 40% <100 Alerts / Day >=100 Alerts / Day
  • 30. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Sever/Critical Alert Volume per Day Slide 30 © 2016 Enterprise Management Associates, Inc. 50% 23% 15% 7% 5% 0% <=25 26-99 100-499 250-499 500-999 >=1,000
  • 31. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Severe/Critical Alerts Investigated per Day Slide 31 © 2016 Enterprise Management Associates, Inc. 67% 21% 6% 6% 10 or fewer 11-25 More than 25 We don't generally investigate security alerts
  • 32. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Network Strengths and Weaknesses: • Strengths • Early warning of a network-based attack • Attack telemetry • Payload dissection/determination • Identification of lateral movement (if placed where they can monitor the traffic) • Weaknesses • Limited deployment at perimeter hampers internal visibility. • They provide no warning of attacks that start on endpoint. (e.g. removable media) • Cannot provide insight if packets are encrypted. • Dormant or “triggered” attacks may not be detected by network sandboxes. • May provide “indeterminate” attack success when used alone. Slide 32 © 2016 Enterprise Management Associates, Inc.
  • 33. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Endpoint Strengths and Weaknesses: • Strengths • Provides detailed data:  Application installation and process changes  Registry/configuration changes, file changes, and data moves  User additions, removals, and permission changes  Process association with network connections • Weaknesses • Data can be very compartmentalized so trends may be missed. • Missing or failing agents cause visibility gaps. • Gaps in scanning or polling cause visibility gaps. Slide 33 © 2016 Enterprise Management Associates, Inc.
  • 34. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Summary: • Over Confidence in Prevention • Over Confidence in the Security Programs • Focusing on the Wrong Data • Lack of Tools (and people) • Task and Analysis Automation are Key for Success • Too many alerts to manually investigate • Both Sets of Data are Valuable but Have Gaps • Need to get out of Data Silos • Need better analysis capability using combined data Slide 34 © 2016 Enterprise Management Associates, Inc.
  • 35. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Questions? Get the Full Report: http://bit.ly/1mKekfd Slide 35 © 2016 Enterprise Management Associates, Inc.