IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Achieving High-Fidelity
Security
Combining Network and Endpoint Monitoring
with RSA Security Analytics and RSA ECAT
An ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) White Paper
Prepared for RSA
February 2016
Table of Contents
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
Executive Summary..................................................................................................................................1
Achieving High-Fidelity Security........................................................................................................1
Visibility Provided by Endpoint Monitoring............................................................................................1
Visibility Gaps in Endpoint Monitoring.............................................................................................1
Visibility Provided by Network Data........................................................................................................2
Visibility Gaps in Network Data ........................................................................................................2
Issues with Current Programs ..................................................................................................................3
Overconfidence...................................................................................................................................3
High-Fidelity Challenges.....................................................................................................................3
Combining Network and Endpoint Data Creates High-Fidelity Security................................................4
The Right Data for the Right Job........................................................................................................4
Obtaining High-Fidelity Security with RSA Security Analytics and RSA ECAT .....................................5
RSA Security Analytics........................................................................................................................5
RSA ECAT..........................................................................................................................................5
Customer Perspective ...............................................................................................................................6
EMA Perspective ......................................................................................................................................7
About RSA...............................................................................................................................................7
Page 1
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 1
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
Executive Summary
Achieving High-Fidelity Security
The term “hi-fidelity” was first coined in the entertainment industry in the 1950s to indicate advances
in audio technology that provided the listener with a richer “just like being there” experience. In the
security context, “high fidelity” communicates the ability to provide a richer experience to the security
analyst to deliver better security outcomes.
High-fidelity security systems provide more comprehensive and timelier information from multiple
sources, both internal and external, in the appropriate volume and with the appropriate types of data
to provide the best context and priority for decision making and to drive appropriate detection and
incident response activities.
This paper discusses the benefits of using both network and endpoint data with a strong analysis toolset
to create high-fidelity security.
Visibility Provided by Endpoint Monitoring
Quite simply the endpoint is where the bad action takes place. Each device connected to an organization’s
network where information resides or is processed, especially if it’s a device people work on directly,
is a potential point for security threats to enter and exploit an enterprise. In today’s environments,
endpoints are no longer just desktop or laptop computers. The definition of an endpoint has expanded
to include everything from servers to smartphones and tablets to special function and embedded
Internet of Things (IoT) devices.
However, IT professionals have been somewhat slow to acknowledge these newer endpoints. While over
90% of IT professionals use smartphones themselves, only 64% of respondents identified smartphones
as endpoints in EMA’s 2016 “Achieving High-Fidelity Security” research. Servers scored even lower,
with only 57% considering those as endpoints. While the shift to a more mobile workforce has been
taking place, the shift in understanding of what a potentially vulnerable endpoint is has lagged behind.
To make matters worse security threats targeting these endpoints are many and varied and go well
beyond malware. Threats also include attack modes that include misusing user credentials, running
rogue services, using unapproved applications and sharing company data, running apps that leak
confidential data, and many others. Whatever the mode, the detailed data about the execution of
the attack that is contained within the endpoint is far richer than anything that can be gained at the
network level alone or by merely looking at activity logs. Given that threats at some point in their
lifecycle operate directly on endpoints, it is only common sense that monitoring systems should have a
strong capability for monitoring the endpoints directly.
Visibility Gaps in Endpoint Monitoring
Security data from the endpoint is extremely important when it comes to an overall security monitoring
program. But it only goes so far. Endpoint data by definition covers the last mile of an attack, but on
its own does not provide a 360-degree view of the security posture of an organization.
Endpoint data can be compartmentalized since the endpoint monitoring system only knows about
the activities happening within the monitored and impacted endpoints. Attacks that hit unmonitored
endpoints obviously will not be picked up unless additional security monitoring is being used. This
brings us to the importance of network-level visibility.
Page 2
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 2
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
Visibility Provided by Network Data
The two most popular network security monitoring data sources used by organizations today are
network flows and deep packet inspection (DPI). Network flows are used by 42% of respondents, and
DPI (which is sometimes referred to as “full packet capture”) is used by 36%. Of course, when trying
to get a full picture of security threats, DPI provides a much more complete view than network flows,
but for practical purposes using network flows also has its place.
Network flow (netflow) tools, such as NetFlow, J-Flow, sFlow, etc., are great at identifying the usage
of odd protocols and abnormal traffic patterns at an overview level. But they can’t provide information
on the details of a network conversation, such as details on the data and files that were passed. DPI-
based monitoring systems can provide those details. A best practice is to use DPI to monitor Internet
egress points and very sensitive network segments and to use netflow to cover other internal network
segments, in particular to monitor for attackers’ lateral movement.
Organizations need visibility to prevent and detect breaches. Most attacks traverse the perimeter of
the network, meaning network-based tools have the opportunity to identify an attack at an early stage
and to alert on and address it before a significant incursion occurs. Maximally effective network tools
can identify many types of activity, from reconnaissance and initial malware payload drops to the
use of malformed protocols, protocol tunneling, abnormal encrypted traffic, and unusual/abnormal
communication between hosts. Any of these can be indicative of not only compromise but also lateral
movement, data collection, and data exfiltration.
Visibility Gaps in Network Data
Unfortunately, there are also gaps in network data. First, network monitoring systems for practical
purposes are generally only deployed at the perimeters and at select internal network segments. When
this is the case, data gaps can occur within or between local segments where the network is not being
as closely monitored. This can lead to a false sense of security via false negatives in those missing areas
of network coverage. Second, network solutions can’t detect, at least initially, attacks that occur off
network (for example, attacks that come in the form of removable media or come across home, hotel,
or coffee shop networks). Not only are these attack vectors common, but compromising mobile devices
that are connected to other endpoint systems for charging can also be an attack technique. This threat
combined with the potential gaps in network data means an organization could be compromised on
multiple internal hosts before the enterprise even sees the first network communication to or from
those hosts. Third, there is a problem with false positives. In cases where the inbound communication
and/or data payload is detected but no outbound response is observed, there is no way for the network
detection tool to be certain that the incursion was successful or is simply lying dormant
Confirmation of the scope of an attack is also difficult to discern if the communications are encrypted.
While there are ways to peer into encrypted network traffic, this requires the deployment of specialized
decryption devices. In each of these cases, a false positive (or false negative) response may occur. The
obvious point of this paper is that many of these gaps can be filled with the complementary use of
endpoint and network monitoring tools.
Page 3
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 3
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
Issues with Current Programs
Overconfidence
When asked about the maturity of their endpoint and network security program in terms of prevention,
detection, and response, over 60% of the respondents identified all three aspects of network and
endpoint as having “strong” or “very strong” maturity. (See Table 1 below.)
Function/Maturity
Network Maturity:
Strong or Very Strong
Endpoint Maturity:
Strong or Very Strong
Prevention 66% 63%
Detection 71% 67%
Incident Response 65% 62%
Table 1. Endpoint and Network Program Self-Reported Maturity
However, based upon other information collected in the survey, these results seem to be a sign of
overconfidence. It is very likely organizations don’t yet understand the level and type of network and
endpoint monitoring needed to protect against today’s threats. Surprisingly, the answers given leaned
more towards strong or very strong maturity in both areas, whereas the results of other parts of our
research indicated these security programs were actually very underdeveloped. For example, EMA asked
about confidence in and use of network and endpoint tools. Only 15% of respondents were confident
in the accuracy of their network and endpoint tools. Figures 1 through 3, shown in the following
section, depict other inconsistencies.
High-Fidelity Challenges
Clearly a high-fidelity security approach that combines network and endpoint level monitoring would
solve many of these security monitoring challenges. So what’s preventing companies from going down
this path? Largely, it’s because the security systems they have in place lack key capabilities.
When respondents were asked to indicate the top challenges inhibiting the combined use of network
and endpoint security data, the top response was lack of analysis capabilities in their existing solutions
(59%), as shown in Figure 1.
Figure 2 illustrates perhaps the most glaring challenge organizations have in achieving high-fidelity
security: Over 60% of organizations do not have any network analysis tools (packet capture, netflow,
etc.) deployed.
Figure 3 shows another major challenge: lack of historical data for analysis. Forty-two percent (42%) of
respondents do not store the data they do collect for any length of time, which means it is not available
for historical detective analysis or post-event investigation and forensics.
	 	
	
59%
Lack analysis
capabilities
60%
Do not have
network analysis
capabilities
42%
Do not maintain
historical data
for analysis
Figure 1. Lack of Analysis Capabilities Figure 2. Lack of Network Analysis Tools Figure 3. Lack of Historical Data
Page 4
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 4
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
Combining Network and Endpoint Data
Creates High-Fidelity Security
The Right Data for the Right Job
Due in part to these fundamental issues, organizations often rely on the wrong data when it comes to
their security monitoring programs. Figure 4 shows responses concerning the types of data respondents
used most often for providing an early warning of a breach. Though each of the data types listed has its
place in detection and investigations, some are better than others.
22%
21%
17%
16%
13%
7%
4%
Access logs
Network Security Logs (Firewall, IDS, DNS, etc.)
Systems Log Monitoring (Application, Server, User chg, etc)
Network Data (Packets, Flows, etc.)
Endpoint Change Data
Performance Logs
Other
Figure 4. Data Used for Early Breach Detection
This data is highly indicative that many of the respondents either did not understand the value of
the data or did not have the tools to leverage the data, regardless of their understanding. Access logs
can indicate access attempts, but in most environments successful logins either are not logged or are
not investigated unless they are preceded by a significant number of failed logins. This approach will
not show an exploited vulnerability, a malware-based attack, or even a previously phished, legitimate
credential. Network security logs and systems logs are similar in nature as they will both identify
attempts to access resources that violate policy, but unless a successful attempt has been preceded by
numerous failed attempts, it doesn’t tend to be investigated in a timely manner. In the opinion of EMA,
network packet data flows and DPI provide the best data for early threat warning, and, when combined
with endpoint monitoring data are generally superior for threat detection and response.
When asked how important it was to integrate their endpoint security system with network security,
less than 20% of organizations thought this was “very important,” “extremely important,” or “critical.”
Clearly organizations have a long way to go to understand the critical and complementary value of
network and endpoint monitoring data.
The role of metadata in this area is also crucial. Metadata, or data about data, can provide valuable
information about the characteristics of an attempted attack, such as the creator, the time and date
of creation, and even the geographical location it came from. It is encouraging that over 80% of
organizations that use network data in security investigations employ systems that create metadata. And,
of these organizations, almost 85% found metadata to be extremely valuable to their investigations.
However, 60% of organizations only keep this metadata for two weeks or less, which is a short time
window given that incidents often persist for over six months before being detected.
Page 5
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 5
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
Obtaining High-Fidelity Security with RSA Security
Analytics and RSA ECAT
RSA Security Analytics
RSA Security Analytics (SA) enables organizations to collect, manage, and analyze their security activity,
leveraging logs, events, netflow, DPI, endpoint data (provided by RSA ECAT), and other data. It does
this through two core elements: its capture infrastructure and its analysis and retention infrastructure.
The capture infrastructure features a highly configurable Decoder that works with packet capture data
(as well as a version that works with netflow, logs, and events). The Concentrator portion, which
sits behind the Decoder, aggregates the metadata and enables query scalability, letting organizations
deploy the solution across diverse network topologies and geographies. Finally, the Broker and Security
Analytics server allows for queries to be distributed across enterprise-level deployments.
The analysis and retention infrastructure is made up of an Archiver, which manages long-term data
storage as well as an Event Stream Analysis (ESA) service which processes high volumes of disparate
event data, including correlating logs, packets, netflow, and endpoint-sourced information as well as
executing real-time machine learning and data science models. The metadata can also be fed into
Hadoop infrastructures for more historical analysis.
Security Analytics’ interface presents incident data, investigations, and reports in multiple formats that
can be customized by role/function to match incident management and investigative workflow needs.
Dashboards are also customizable by the user.
RSA ECAT
RSA® ECAT is designed to enable active endpoint defense against advanced threats by rapidly detecting
and blocking or quarantining suspicious files and processes without the need for signatures.
Through its behavior-based detection, RSA ECAT lets organizations discover attacks that might
otherwise be hidden. It accomplishes this with kernel- and user-level system monitoring, enabling
real-time alerting, using unique scan techniques, full device inventorying, profiling, risk scoring, and
automatically scanning the system when unknown files or processes are loaded.
If a possible threat is detected, ECAT quickly analyzes the endpoint to confirm an infection. The system
then scores and flags suspicious endpoints and the associated activity for further investigation. ECAT
also maintains a global repository of all existing files and IP addresses connected to the network to help
reduce investigation time. It also performs a wide range of file checks to determine if a file is malicious
and to provide more context—incorporating YARA rules, STIX-delivered threat intelligence, and the
results of multiple AV engines to complement its behavior-based analytics.
If an endpoint compromise has occurred, ECAT enables security teams to take quick action. ECAT
helps the analyst to determine the scope of an attack instantly—for example, by simply right-clicking
on a malicious file, the system will show all other endpoints with that same file. ECAT automatically
gathers critical forensic information that allows teams to see all modified and deleted files at a glance.
Finally, ECAT allows teams to conduct precise blocking. By providing the exact location of malicious
files, ECAT lets teams quarantine and block malicious files quickly.
In addition, RSA has integrated Security Analytics and the RSA ECAT endpoint monitoring tools
together to provide a unified data source, analytics, reporting, and a single console for security detection
and investigations.
Page 6
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 6
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
Customer Perspective
Perhaps the easiest way to understand the benefits of high-fidelity security and how it can be achieved
using RSA Security Analytics and ECAT is to discuss how a real customer is using these solutions. This
customer perspective was drawn from an interview with cyber security personnel at a large healthcare
services provider.
Any healthcare services company is responsible for safeguarding a tremendous amount of extremely
confidential data—security cannot be an afterthought. The systems processing, storing, and transmitting
this data represent a wide variety of device platforms that combine to deliver the data in diverse forms.
Before introducing RSA Security Analytics and ECAT into its environment, the company had several
issues. Though the security team relied heavily on packet capture and endpoint information, this data
was maintained by separate teams with separate systems. These teams had little operational integration
and no mid-level management in common, so coordination between them was cumbersome at best.
The security team in charge of investigations did not have direct access to certain types of data, and
making formal requests for delivery of copies was required to pursue investigations. To top it off, the
security team would receive the data raw and unparsed, with no metadata. Reporting was a manual
process that required cobbling data together from several different tools.
After implementing RSA Security Analytics and ECAT, the situation improved significantly.
Now, the security group has much greater visibility into its security data because it is piped directly into
Security Analytics from the respective network points and systems. Using the now-unified data, Security
Analytics creates confidence ratings for alerts, which has led to both higher accuracy when determining
security threats and vastly improved work prioritization, thus reducing risk to the environment.
When responding to incidents, the security team values the network and endpoint visibility they get
from Security Analytics and ECAT. For example, once an alert against an internal host is presented
in Security Analytics, the security team can pivot on the IP address to determine what other alerts
have been presented against that host, or they can pivot on the alert to
determine what other hosts in the environment have been exposed to
the same threat. Using the IP address (or DNS information), the analyst
can pivot into ECAT to get more details about the host in question and
perform further investigation or remediation activities remotely.
Before the deployment, the healthcare provider had also been plagued
by false-positive alerts that wasted the time of its limited staff. The
Security Analytics–ECAT combination has also dramatically reduced
the false positives by providing better context with its metadata.
Not only has the metadata improved accuracy, the Security Analytics
alert filtering has also significantly improved the security team’s ability
to retrieve data and focus only on information that is relevant to the
current situation. They were using a top five antivirus provider that was
creating a huge number of false infection alerts, but by using Security
Analytics and ECAT together they were able to isolate and remove
these false positives from the investigation queue.
The benefits the company
has gained by being able
to combine deep packet
inspection and endpoint
data and augment them with
unified metadata has been
tremendous for accelerating
investigations and closing
incidents. Investigations
have been reduced from
hours or days to just minutes
or hours, leading to a 10X
reduction in resolution time!
Page 7
©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 7
Achieving High-Fidelity Security: Combining Network and
Endpoint Monitoring with RSA Security Analytics and RSA ECAT
The benefits the company has gained by being able to combine deep packet inspection and endpoint
data and augment them with unified metadata has been tremendous for accelerating investigations and
closing incidents. Investigations have been reduced from hours or days to just minutes or hours, leading
to a 10X reduction in resolution time!
EMA Perspective
Organizations today face a high level of complexity when trying to secure their systems and data and
must address a stunning number of issues, such as the ever-expanding number and types of endpoints,
the sophistication of threats being used against them, and the sheer amount of security data being
produced and captured, to name a few.
To deal with these issues, organizations need better information, analysis, and prioritization to identify
and act on the most important security threats.
Generally, organizations have relied on either endpoint or network-sourced security data to make
decisions. But in order to have optimal situational awareness they really need the combination of
network and endpoint security and the ability to enrich that data with metadata and use it for both
detection and response. Only through this combination can organizations have all the information they
need to effectively identify and respond to security threats.
RSA Security Analytics and ECAT provide an opportunity for security organizations to propel their
security operations and analysts forward. Using a single interface with all the relevant data for both
detection and investigation, combined with the drill-down and pivoting capability between the two
products, allows a high degree of flexibility for the investigation of events and incidents.
When used together, RSA ECAT and RSA Security Analytics provide visibility and agility at levels
unparalleled by other tools that use more limited data feeds. Together they provide a comprehensive
security monitoring solution, accelerating incident detection and investigation and significantly
reducing the time to resolve. This provides a high return on investment for both security and IT
operations teams.
About RSA
RSA provides more than 30,000 customers around the world with the essential security capabilities to
protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations
effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and
ultimately, reduce IP theft, fraud, and cybercrime.
About Enterprise Management Associates, Inc.
Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst firm that provides deep insight across the full spectrum
of IT and data management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices,
and in-depth knowledge of current and planned vendor solutions to help EMA’s clients achieve their goals. Learn more about EMA research,
analysis, and consulting services for enterprise line of business users, IT professionals and IT vendors at www.enterprisemanagement.com or
blogs.enterprisemanagement.com. You can also follow EMA on Twitter, Facebook or LinkedIn.
This report in whole or in part may not be duplicated, reproduced, stored in a retrieval system or retransmitted without prior written permission
of Enterprise Management Associates, Inc. All opinions and estimates herein constitute our judgement as of this date and are subject to change
without notice. Product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. “EMA” and
“Enterprise Management Associates” are trademarks of Enterprise Management Associates, Inc. in the United States and other countries.
©2016 Enterprise Management Associates, Inc. All Rights Reserved. EMA™, ENTERPRISE MANAGEMENT ASSOCIATES®
, and the
mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc.
Corporate Headquarters:
1995 North 57th Court, Suite 120
Boulder, CO 80301
Phone: +1 303.543.9500
Fax: +1 303.543.7687
www.enterprisemanagement.com
3334.021916

More Related Content

PDF
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
PPTX
LIFT OFF 2017: Transforming Security
PDF
Ethical hacking-guide-infosec
PDF
Enterprise Security featuring UBA
PDF
Data Sheet_What Darktrace Finds
PDF
Darktrace_WhitePaper_Needle_final
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
DOCX
Network Access Control as a Network Security Solution
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
LIFT OFF 2017: Transforming Security
Ethical hacking-guide-infosec
Enterprise Security featuring UBA
Data Sheet_What Darktrace Finds
Darktrace_WhitePaper_Needle_final
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
Network Access Control as a Network Security Solution

What's hot (17)

PDF
Darktrace enterprise immune system whitepaper_digital
PDF
Antigena Overview
PDF
Darktrace white paper_ics_final
PPTX
LIFT OFF 2017: Ransomware and IR Overview
PDF
Enterprise Immune System
PDF
GBS - Prevent network security fires
PDF
Websense security prediction 2014
DOCX
Case Study of RSA Data Breach
PDF
What's behind a cyber attack
PDF
Splunk for security
PDF
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
PDF
Cisco amp everywhere
PDF
Forcepoint SD-WAN and NGFW + IPS
PPTX
Balance Risk With Better Threat Detection
PDF
Security in Computing and IT
PDF
Cisco amp for networks
PDF
Lookingglass whitepaper
Darktrace enterprise immune system whitepaper_digital
Antigena Overview
Darktrace white paper_ics_final
LIFT OFF 2017: Ransomware and IR Overview
Enterprise Immune System
GBS - Prevent network security fires
Websense security prediction 2014
Case Study of RSA Data Breach
What's behind a cyber attack
Splunk for security
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
Cisco amp everywhere
Forcepoint SD-WAN and NGFW + IPS
Balance Risk With Better Threat Detection
Security in Computing and IT
Cisco amp for networks
Lookingglass whitepaper
Ad

Viewers also liked (20)

PPTX
Targeted Attacks: Have you found yours?
PPT
Trend micro real time threat management press presentation
PDF
DEEPSEC 2013: Malware Datamining And Attribution
PDF
Evaluation of DDoS attacks generated on mobile devices and their effect on th...
PDF
114986362 ddos
PPT
Rsa
PPTX
Sql injection
PDF
PPTX
Extending Network Visibility: Down to the Endpoint
PDF
Seguridad sql injection
PPT
Sql Injection
PPT
Exploiting Web applications SQL Injection
PPTX
Viii congreso isaca 2015 grc
PDF
Panda Security - Adaptive Defense
PDF
Panda Security - Endpoint Protection
PPTX
Ransomware
PDF
Panda Security - Adaptive Defense 360
PPTX
CIFRADO RSA
PDF
Data Loss Prevention de RSA
Targeted Attacks: Have you found yours?
Trend micro real time threat management press presentation
DEEPSEC 2013: Malware Datamining And Attribution
Evaluation of DDoS attacks generated on mobile devices and their effect on th...
114986362 ddos
Rsa
Sql injection
Extending Network Visibility: Down to the Endpoint
Seguridad sql injection
Sql Injection
Exploiting Web applications SQL Injection
Viii congreso isaca 2015 grc
Panda Security - Adaptive Defense
Panda Security - Endpoint Protection
Ransomware
Panda Security - Adaptive Defense 360
CIFRADO RSA
Data Loss Prevention de RSA
Ad

Similar to Achieving high-fidelity security (20)

PDF
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
PDF
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
PPTX
Detect Threats Faster
PDF
GBS - 8 ways to knockout network headaches
PDF
Passive monitoring to build Situational Awareness
PDF
REAL TIME ENDPOINT INSIGHTS
DOC
Network security
PDF
Sideband_SB_020316
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PDF
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
PDF
Deploying Network Taps for Improved Security
PDF
Co se skrývá v datovém provozu? - Pavel Minařík
PPT
Ben Rothke - NBA for The Security Professional
PDF
Enterprise Edge Security with Cisco ISE
PDF
Gigamon - Network Visibility Solutions
PDF
Plugging Network Security Holes Using NetFlow
PDF
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
PDF
Solving the Visibility Gap for Effective Security
PPTX
Network Security of Data Protection
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
Detect Threats Faster
GBS - 8 ways to knockout network headaches
Passive monitoring to build Situational Awareness
REAL TIME ENDPOINT INSIGHTS
Network security
Sideband_SB_020316
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
Deploying Network Taps for Improved Security
Co se skrývá v datovém provozu? - Pavel Minařík
Ben Rothke - NBA for The Security Professional
Enterprise Edge Security with Cisco ISE
Gigamon - Network Visibility Solutions
Plugging Network Security Holes Using NetFlow
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Solving the Visibility Gap for Effective Security
Network Security of Data Protection

More from balejandre (7)

PDF
A Data-driven Maturity Model for Modernized, Automated, and Transformed IT
PDF
Ataques de seguridad y GRC
PDF
White paper cyber risk appetite defining and understanding risk in the moder...
PDF
Nuevo Enfoque de la Auditoría Empresarial a través de GRC
PDF
Itss bc my grc 2013 v1
PDF
Grc y seguridad
PDF
11479 Ponemon Report Egrc Ar
A Data-driven Maturity Model for Modernized, Automated, and Transformed IT
Ataques de seguridad y GRC
White paper cyber risk appetite defining and understanding risk in the moder...
Nuevo Enfoque de la Auditoría Empresarial a través de GRC
Itss bc my grc 2013 v1
Grc y seguridad
11479 Ponemon Report Egrc Ar

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Configure Apache Mutual Authentication
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
What is a Computer? Input Devices /output devices
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
1 - Historical Antecedents, Social Consideration.pdf
Zenith AI: Advanced Artificial Intelligence
Configure Apache Mutual Authentication
Hindi spoken digit analysis for native and non-native speakers
sbt 2.0: go big (Scala Days 2025 edition)
CloudStack 4.21: First Look Webinar slides
Abstractive summarization using multilingual text-to-text transfer transforme...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
UiPath Agentic Automation session 1: RPA to Agents
A contest of sentiment analysis: k-nearest neighbor versus neural network
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
Taming the Chaos: How to Turn Unstructured Data into Decisions
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Consumable AI The What, Why & How for Small Teams.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Microsoft Excel 365/2024 Beginner's training
The influence of sentiment analysis in enhancing early warning system model f...
Getting started with AI Agents and Multi-Agent Systems
1 - Historical Antecedents, Social Consideration.pdf

Achieving high-fidelity security

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Achieving High-Fidelity Security Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT An ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) White Paper Prepared for RSA February 2016
  • 2. Table of Contents ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.com Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT Executive Summary..................................................................................................................................1 Achieving High-Fidelity Security........................................................................................................1 Visibility Provided by Endpoint Monitoring............................................................................................1 Visibility Gaps in Endpoint Monitoring.............................................................................................1 Visibility Provided by Network Data........................................................................................................2 Visibility Gaps in Network Data ........................................................................................................2 Issues with Current Programs ..................................................................................................................3 Overconfidence...................................................................................................................................3 High-Fidelity Challenges.....................................................................................................................3 Combining Network and Endpoint Data Creates High-Fidelity Security................................................4 The Right Data for the Right Job........................................................................................................4 Obtaining High-Fidelity Security with RSA Security Analytics and RSA ECAT .....................................5 RSA Security Analytics........................................................................................................................5 RSA ECAT..........................................................................................................................................5 Customer Perspective ...............................................................................................................................6 EMA Perspective ......................................................................................................................................7 About RSA...............................................................................................................................................7
  • 3. Page 1 ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 1 Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT Executive Summary Achieving High-Fidelity Security The term “hi-fidelity” was first coined in the entertainment industry in the 1950s to indicate advances in audio technology that provided the listener with a richer “just like being there” experience. In the security context, “high fidelity” communicates the ability to provide a richer experience to the security analyst to deliver better security outcomes. High-fidelity security systems provide more comprehensive and timelier information from multiple sources, both internal and external, in the appropriate volume and with the appropriate types of data to provide the best context and priority for decision making and to drive appropriate detection and incident response activities. This paper discusses the benefits of using both network and endpoint data with a strong analysis toolset to create high-fidelity security. Visibility Provided by Endpoint Monitoring Quite simply the endpoint is where the bad action takes place. Each device connected to an organization’s network where information resides or is processed, especially if it’s a device people work on directly, is a potential point for security threats to enter and exploit an enterprise. In today’s environments, endpoints are no longer just desktop or laptop computers. The definition of an endpoint has expanded to include everything from servers to smartphones and tablets to special function and embedded Internet of Things (IoT) devices. However, IT professionals have been somewhat slow to acknowledge these newer endpoints. While over 90% of IT professionals use smartphones themselves, only 64% of respondents identified smartphones as endpoints in EMA’s 2016 “Achieving High-Fidelity Security” research. Servers scored even lower, with only 57% considering those as endpoints. While the shift to a more mobile workforce has been taking place, the shift in understanding of what a potentially vulnerable endpoint is has lagged behind. To make matters worse security threats targeting these endpoints are many and varied and go well beyond malware. Threats also include attack modes that include misusing user credentials, running rogue services, using unapproved applications and sharing company data, running apps that leak confidential data, and many others. Whatever the mode, the detailed data about the execution of the attack that is contained within the endpoint is far richer than anything that can be gained at the network level alone or by merely looking at activity logs. Given that threats at some point in their lifecycle operate directly on endpoints, it is only common sense that monitoring systems should have a strong capability for monitoring the endpoints directly. Visibility Gaps in Endpoint Monitoring Security data from the endpoint is extremely important when it comes to an overall security monitoring program. But it only goes so far. Endpoint data by definition covers the last mile of an attack, but on its own does not provide a 360-degree view of the security posture of an organization. Endpoint data can be compartmentalized since the endpoint monitoring system only knows about the activities happening within the monitored and impacted endpoints. Attacks that hit unmonitored endpoints obviously will not be picked up unless additional security monitoring is being used. This brings us to the importance of network-level visibility.
  • 4. Page 2 ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 2 Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT Visibility Provided by Network Data The two most popular network security monitoring data sources used by organizations today are network flows and deep packet inspection (DPI). Network flows are used by 42% of respondents, and DPI (which is sometimes referred to as “full packet capture”) is used by 36%. Of course, when trying to get a full picture of security threats, DPI provides a much more complete view than network flows, but for practical purposes using network flows also has its place. Network flow (netflow) tools, such as NetFlow, J-Flow, sFlow, etc., are great at identifying the usage of odd protocols and abnormal traffic patterns at an overview level. But they can’t provide information on the details of a network conversation, such as details on the data and files that were passed. DPI- based monitoring systems can provide those details. A best practice is to use DPI to monitor Internet egress points and very sensitive network segments and to use netflow to cover other internal network segments, in particular to monitor for attackers’ lateral movement. Organizations need visibility to prevent and detect breaches. Most attacks traverse the perimeter of the network, meaning network-based tools have the opportunity to identify an attack at an early stage and to alert on and address it before a significant incursion occurs. Maximally effective network tools can identify many types of activity, from reconnaissance and initial malware payload drops to the use of malformed protocols, protocol tunneling, abnormal encrypted traffic, and unusual/abnormal communication between hosts. Any of these can be indicative of not only compromise but also lateral movement, data collection, and data exfiltration. Visibility Gaps in Network Data Unfortunately, there are also gaps in network data. First, network monitoring systems for practical purposes are generally only deployed at the perimeters and at select internal network segments. When this is the case, data gaps can occur within or between local segments where the network is not being as closely monitored. This can lead to a false sense of security via false negatives in those missing areas of network coverage. Second, network solutions can’t detect, at least initially, attacks that occur off network (for example, attacks that come in the form of removable media or come across home, hotel, or coffee shop networks). Not only are these attack vectors common, but compromising mobile devices that are connected to other endpoint systems for charging can also be an attack technique. This threat combined with the potential gaps in network data means an organization could be compromised on multiple internal hosts before the enterprise even sees the first network communication to or from those hosts. Third, there is a problem with false positives. In cases where the inbound communication and/or data payload is detected but no outbound response is observed, there is no way for the network detection tool to be certain that the incursion was successful or is simply lying dormant Confirmation of the scope of an attack is also difficult to discern if the communications are encrypted. While there are ways to peer into encrypted network traffic, this requires the deployment of specialized decryption devices. In each of these cases, a false positive (or false negative) response may occur. The obvious point of this paper is that many of these gaps can be filled with the complementary use of endpoint and network monitoring tools.
  • 5. Page 3 ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 3 Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT Issues with Current Programs Overconfidence When asked about the maturity of their endpoint and network security program in terms of prevention, detection, and response, over 60% of the respondents identified all three aspects of network and endpoint as having “strong” or “very strong” maturity. (See Table 1 below.) Function/Maturity Network Maturity: Strong or Very Strong Endpoint Maturity: Strong or Very Strong Prevention 66% 63% Detection 71% 67% Incident Response 65% 62% Table 1. Endpoint and Network Program Self-Reported Maturity However, based upon other information collected in the survey, these results seem to be a sign of overconfidence. It is very likely organizations don’t yet understand the level and type of network and endpoint monitoring needed to protect against today’s threats. Surprisingly, the answers given leaned more towards strong or very strong maturity in both areas, whereas the results of other parts of our research indicated these security programs were actually very underdeveloped. For example, EMA asked about confidence in and use of network and endpoint tools. Only 15% of respondents were confident in the accuracy of their network and endpoint tools. Figures 1 through 3, shown in the following section, depict other inconsistencies. High-Fidelity Challenges Clearly a high-fidelity security approach that combines network and endpoint level monitoring would solve many of these security monitoring challenges. So what’s preventing companies from going down this path? Largely, it’s because the security systems they have in place lack key capabilities. When respondents were asked to indicate the top challenges inhibiting the combined use of network and endpoint security data, the top response was lack of analysis capabilities in their existing solutions (59%), as shown in Figure 1. Figure 2 illustrates perhaps the most glaring challenge organizations have in achieving high-fidelity security: Over 60% of organizations do not have any network analysis tools (packet capture, netflow, etc.) deployed. Figure 3 shows another major challenge: lack of historical data for analysis. Forty-two percent (42%) of respondents do not store the data they do collect for any length of time, which means it is not available for historical detective analysis or post-event investigation and forensics. 59% Lack analysis capabilities 60% Do not have network analysis capabilities 42% Do not maintain historical data for analysis Figure 1. Lack of Analysis Capabilities Figure 2. Lack of Network Analysis Tools Figure 3. Lack of Historical Data
  • 6. Page 4 ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 4 Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT Combining Network and Endpoint Data Creates High-Fidelity Security The Right Data for the Right Job Due in part to these fundamental issues, organizations often rely on the wrong data when it comes to their security monitoring programs. Figure 4 shows responses concerning the types of data respondents used most often for providing an early warning of a breach. Though each of the data types listed has its place in detection and investigations, some are better than others. 22% 21% 17% 16% 13% 7% 4% Access logs Network Security Logs (Firewall, IDS, DNS, etc.) Systems Log Monitoring (Application, Server, User chg, etc) Network Data (Packets, Flows, etc.) Endpoint Change Data Performance Logs Other Figure 4. Data Used for Early Breach Detection This data is highly indicative that many of the respondents either did not understand the value of the data or did not have the tools to leverage the data, regardless of their understanding. Access logs can indicate access attempts, but in most environments successful logins either are not logged or are not investigated unless they are preceded by a significant number of failed logins. This approach will not show an exploited vulnerability, a malware-based attack, or even a previously phished, legitimate credential. Network security logs and systems logs are similar in nature as they will both identify attempts to access resources that violate policy, but unless a successful attempt has been preceded by numerous failed attempts, it doesn’t tend to be investigated in a timely manner. In the opinion of EMA, network packet data flows and DPI provide the best data for early threat warning, and, when combined with endpoint monitoring data are generally superior for threat detection and response. When asked how important it was to integrate their endpoint security system with network security, less than 20% of organizations thought this was “very important,” “extremely important,” or “critical.” Clearly organizations have a long way to go to understand the critical and complementary value of network and endpoint monitoring data. The role of metadata in this area is also crucial. Metadata, or data about data, can provide valuable information about the characteristics of an attempted attack, such as the creator, the time and date of creation, and even the geographical location it came from. It is encouraging that over 80% of organizations that use network data in security investigations employ systems that create metadata. And, of these organizations, almost 85% found metadata to be extremely valuable to their investigations. However, 60% of organizations only keep this metadata for two weeks or less, which is a short time window given that incidents often persist for over six months before being detected.
  • 7. Page 5 ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 5 Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT Obtaining High-Fidelity Security with RSA Security Analytics and RSA ECAT RSA Security Analytics RSA Security Analytics (SA) enables organizations to collect, manage, and analyze their security activity, leveraging logs, events, netflow, DPI, endpoint data (provided by RSA ECAT), and other data. It does this through two core elements: its capture infrastructure and its analysis and retention infrastructure. The capture infrastructure features a highly configurable Decoder that works with packet capture data (as well as a version that works with netflow, logs, and events). The Concentrator portion, which sits behind the Decoder, aggregates the metadata and enables query scalability, letting organizations deploy the solution across diverse network topologies and geographies. Finally, the Broker and Security Analytics server allows for queries to be distributed across enterprise-level deployments. The analysis and retention infrastructure is made up of an Archiver, which manages long-term data storage as well as an Event Stream Analysis (ESA) service which processes high volumes of disparate event data, including correlating logs, packets, netflow, and endpoint-sourced information as well as executing real-time machine learning and data science models. The metadata can also be fed into Hadoop infrastructures for more historical analysis. Security Analytics’ interface presents incident data, investigations, and reports in multiple formats that can be customized by role/function to match incident management and investigative workflow needs. Dashboards are also customizable by the user. RSA ECAT RSA® ECAT is designed to enable active endpoint defense against advanced threats by rapidly detecting and blocking or quarantining suspicious files and processes without the need for signatures. Through its behavior-based detection, RSA ECAT lets organizations discover attacks that might otherwise be hidden. It accomplishes this with kernel- and user-level system monitoring, enabling real-time alerting, using unique scan techniques, full device inventorying, profiling, risk scoring, and automatically scanning the system when unknown files or processes are loaded. If a possible threat is detected, ECAT quickly analyzes the endpoint to confirm an infection. The system then scores and flags suspicious endpoints and the associated activity for further investigation. ECAT also maintains a global repository of all existing files and IP addresses connected to the network to help reduce investigation time. It also performs a wide range of file checks to determine if a file is malicious and to provide more context—incorporating YARA rules, STIX-delivered threat intelligence, and the results of multiple AV engines to complement its behavior-based analytics. If an endpoint compromise has occurred, ECAT enables security teams to take quick action. ECAT helps the analyst to determine the scope of an attack instantly—for example, by simply right-clicking on a malicious file, the system will show all other endpoints with that same file. ECAT automatically gathers critical forensic information that allows teams to see all modified and deleted files at a glance. Finally, ECAT allows teams to conduct precise blocking. By providing the exact location of malicious files, ECAT lets teams quarantine and block malicious files quickly. In addition, RSA has integrated Security Analytics and the RSA ECAT endpoint monitoring tools together to provide a unified data source, analytics, reporting, and a single console for security detection and investigations.
  • 8. Page 6 ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 6 Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT Customer Perspective Perhaps the easiest way to understand the benefits of high-fidelity security and how it can be achieved using RSA Security Analytics and ECAT is to discuss how a real customer is using these solutions. This customer perspective was drawn from an interview with cyber security personnel at a large healthcare services provider. Any healthcare services company is responsible for safeguarding a tremendous amount of extremely confidential data—security cannot be an afterthought. The systems processing, storing, and transmitting this data represent a wide variety of device platforms that combine to deliver the data in diverse forms. Before introducing RSA Security Analytics and ECAT into its environment, the company had several issues. Though the security team relied heavily on packet capture and endpoint information, this data was maintained by separate teams with separate systems. These teams had little operational integration and no mid-level management in common, so coordination between them was cumbersome at best. The security team in charge of investigations did not have direct access to certain types of data, and making formal requests for delivery of copies was required to pursue investigations. To top it off, the security team would receive the data raw and unparsed, with no metadata. Reporting was a manual process that required cobbling data together from several different tools. After implementing RSA Security Analytics and ECAT, the situation improved significantly. Now, the security group has much greater visibility into its security data because it is piped directly into Security Analytics from the respective network points and systems. Using the now-unified data, Security Analytics creates confidence ratings for alerts, which has led to both higher accuracy when determining security threats and vastly improved work prioritization, thus reducing risk to the environment. When responding to incidents, the security team values the network and endpoint visibility they get from Security Analytics and ECAT. For example, once an alert against an internal host is presented in Security Analytics, the security team can pivot on the IP address to determine what other alerts have been presented against that host, or they can pivot on the alert to determine what other hosts in the environment have been exposed to the same threat. Using the IP address (or DNS information), the analyst can pivot into ECAT to get more details about the host in question and perform further investigation or remediation activities remotely. Before the deployment, the healthcare provider had also been plagued by false-positive alerts that wasted the time of its limited staff. The Security Analytics–ECAT combination has also dramatically reduced the false positives by providing better context with its metadata. Not only has the metadata improved accuracy, the Security Analytics alert filtering has also significantly improved the security team’s ability to retrieve data and focus only on information that is relevant to the current situation. They were using a top five antivirus provider that was creating a huge number of false infection alerts, but by using Security Analytics and ECAT together they were able to isolate and remove these false positives from the investigation queue. The benefits the company has gained by being able to combine deep packet inspection and endpoint data and augment them with unified metadata has been tremendous for accelerating investigations and closing incidents. Investigations have been reduced from hours or days to just minutes or hours, leading to a 10X reduction in resolution time!
  • 9. Page 7 ©2016 Enterprise Management Associates, Inc. All Rights Reserved. | www.enterprisemanagement.comPage 7 Achieving High-Fidelity Security: Combining Network and Endpoint Monitoring with RSA Security Analytics and RSA ECAT The benefits the company has gained by being able to combine deep packet inspection and endpoint data and augment them with unified metadata has been tremendous for accelerating investigations and closing incidents. Investigations have been reduced from hours or days to just minutes or hours, leading to a 10X reduction in resolution time! EMA Perspective Organizations today face a high level of complexity when trying to secure their systems and data and must address a stunning number of issues, such as the ever-expanding number and types of endpoints, the sophistication of threats being used against them, and the sheer amount of security data being produced and captured, to name a few. To deal with these issues, organizations need better information, analysis, and prioritization to identify and act on the most important security threats. Generally, organizations have relied on either endpoint or network-sourced security data to make decisions. But in order to have optimal situational awareness they really need the combination of network and endpoint security and the ability to enrich that data with metadata and use it for both detection and response. Only through this combination can organizations have all the information they need to effectively identify and respond to security threats. RSA Security Analytics and ECAT provide an opportunity for security organizations to propel their security operations and analysts forward. Using a single interface with all the relevant data for both detection and investigation, combined with the drill-down and pivoting capability between the two products, allows a high degree of flexibility for the investigation of events and incidents. When used together, RSA ECAT and RSA Security Analytics provide visibility and agility at levels unparalleled by other tools that use more limited data feeds. Together they provide a comprehensive security monitoring solution, accelerating incident detection and investigation and significantly reducing the time to resolve. This provides a high return on investment for both security and IT operations teams. About RSA RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.
  • 10. About Enterprise Management Associates, Inc. Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst firm that provides deep insight across the full spectrum of IT and data management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor solutions to help EMA’s clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise line of business users, IT professionals and IT vendors at www.enterprisemanagement.com or blogs.enterprisemanagement.com. You can also follow EMA on Twitter, Facebook or LinkedIn. This report in whole or in part may not be duplicated, reproduced, stored in a retrieval system or retransmitted without prior written permission of Enterprise Management Associates, Inc. All opinions and estimates herein constitute our judgement as of this date and are subject to change without notice. Product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. “EMA” and “Enterprise Management Associates” are trademarks of Enterprise Management Associates, Inc. in the United States and other countries. ©2016 Enterprise Management Associates, Inc. All Rights Reserved. EMA™, ENTERPRISE MANAGEMENT ASSOCIATES® , and the mobius symbol are registered trademarks or common-law trademarks of Enterprise Management Associates, Inc. Corporate Headquarters: 1995 North 57th Court, Suite 120 Boulder, CO 80301 Phone: +1 303.543.9500 Fax: +1 303.543.7687 www.enterprisemanagement.com 3334.021916