SlideShare a Scribd company logo
Future of cyber security www.rasoolirfan.com
Build cost effective
Security Data Lake
Future of cyber security www.rasoolirfan.com
Definitions
“A data lake is a method of storing data within
a system or repository, in its natural format,
that facilitates the collocation of data in
various schemata and structural forms, usually
object blobs or files. The idea of data lake is
to have a single store of all data in the
enterprise ranging from raw data (which
implies exact copy of source system data) to
transformed data which is used for various
tasks including reporting, visualization,
analytics and machine learning.”
~Wikipedia
Security incident and event management
(SIEM) is the process of identifying,
monitoring, recording and analyzing security
events or incidents within a real-time IT
environment. It provides a comprehensive and
centralized view of the security scenario of an
IT infrastructure
~Techopedia
Data Lake SIEM
Future of cyber security www.rasoolirfan.com
Why organization choose Data Lake or SIEM
Rationale Data Lake SIEM
Purpose
Reason
Technology
Expertise
Search, hunting Detecting malware,
anomalies, offenses
Less Capex; Log
Management; Investigations
Better Correlation &
Detection capabilities
Open source Commercial
Experts Dependent Out of box Product features
Future of cyber security www.rasoolirfan.com
How IBM QRadar help achieve customer achieve both Data Lake & SIEM
Answer - QRadar Data Store to enable efficient data mining for security and compliance use cases
 QRadar Data Store has a predictable pricing model based on
the number of hosts that store data, and customers can
optionally add as much storage and compute power as needed.
 Data Store is configured using a simple collection filter in
QRadar. By selecting the data source, or the event criteria
from the data source, you can easily define which data is sent
directly to Data Store
 Data Store is a QRadar licensing overlay that leverages existing
storage and processing capacity on Event Processors and Data
Nodes to collect, process and store data identified for Data
Store
 Data Store is primarily used for log management, so its data is
excluded from correlation and advanced security analytics
capabilities. However, Data Store data can be used by most
other capabilities, such as searching, reporting, visualization
and custom apps built using the QRadar App Framework.
 Data Store data cannot be used for historical correlation.
However, the filtering policy that separates Data Store data
from SIEM data can easily be changed. As soon as the policy is
updated, all future data collected will be included in all
analytics and correlation processes within QRadar
 Because Data Store data does not go through analysis or
correlation, analytics-driven apps may not be able to fully
leverage data collected using Data Store. All other
capabilities, such as reporting, parsing, custom properties and
dashboards, should work as expected.
 Leverage the QRadar SDK to build custom apps and analytics
on top of your data to address a variety of unique security and
IT operations use cases
 Provide security teams with massive volumes of data to which
they can pose a variety of questions via Ariel Query Language
and easily filter through results.
 Share data between Security and IT Ops. Centralize
enterprise-wide data for reporting and analytics, and control
access to data based on data type and user role.
Future of cyber security www.rasoolirfan.com
Now, you can build a security data lake without
breaking your budget or adding another vendor to
your security stack
https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.2/com.ibm.qradar.doc/t_qradar_adm_data_store.html

More Related Content

PDF
Secure your workloads with microsegmentation
PDF
What is micro segmentation?
PDF
Microsegmentation for enterprise data centers
PDF
Micro segmentation and zero trust for security and compliance - Guardicore an...
PPTX
The Top Cloud Security Issues
PPTX
Introduction to Network Security
PDF
Top reasons why Endpoint Security should move to Cloud | Sysfore
PPTX
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Secure your workloads with microsegmentation
What is micro segmentation?
Microsegmentation for enterprise data centers
Micro segmentation and zero trust for security and compliance - Guardicore an...
The Top Cloud Security Issues
Introduction to Network Security
Top reasons why Endpoint Security should move to Cloud | Sysfore
Mark Lomas | Zero-Trust Trust No One, Trust Nothing

What's hot (20)

PPTX
Zero trust deck 2020
PPTX
Web application firewall
PPTX
Zero Trust Framework for Network Security​
PPTX
Network Security
DOCX
What is zero trust model of information security?
PPTX
Can Cloud Solutions Transform Network Security
PDF
Cloud Security - Made simple
PPTX
What is zero trust model (ztm)
DOCX
Security architecture principles isys 0575general att
PPTX
Ics & computer security for nuclear facilities
DOCX
Residency research makeup project acme enterprise scenario resi
PPTX
An introduction to Cyber Essentials
PDF
ATP Technology Pillars
PPTX
Zero Trust
PDF
Zero Trust Model Presentation
PDF
Cybersecurity Summit AHR20 NIST framework Cimetrics
PDF
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
PPTX
Network Security Goals
PDF
Network Security Certification
PPTX
Cloud security training, certified cloud security professional
Zero trust deck 2020
Web application firewall
Zero Trust Framework for Network Security​
Network Security
What is zero trust model of information security?
Can Cloud Solutions Transform Network Security
Cloud Security - Made simple
What is zero trust model (ztm)
Security architecture principles isys 0575general att
Ics & computer security for nuclear facilities
Residency research makeup project acme enterprise scenario resi
An introduction to Cyber Essentials
ATP Technology Pillars
Zero Trust
Zero Trust Model Presentation
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Network Security Goals
Network Security Certification
Cloud security training, certified cloud security professional
Ad

Similar to Build cost effective Security Data Lake + SIEM (20)

DOCX
Overall Security Process Review CISC 6621Agend.docx
PDF
SECURING THE CLOUD DATA LAKES
PDF
ALTR Company Overview 2023
PPTX
DG_Architecture_Training.pptx
PPTX
Data Privacy By Design with AWS
PPTX
IBM QRadar’s DomainTools Application.pptx
PPTX
IBM QRadar’s DomainTools Application.pptx
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
PPTX
SIEM : Security Information and Event Management
PDF
eBook: 5 Steps to Secure Cloud Data Governance
PDF
Whitepaper IBM Qradar Security Intelligence
PDF
G05.2013 Security Information and Event Management
DOCX
SureLog Large-scale SIEM Implementation in a Distributed It Security World
PDF
Sqrrl Enterprise: Big Data Security Analytics Use Case
PDF
Top 10 cloud security tools to adopt in 2024.pdf
PPTX
SOAR and SIEM.pptx
PPTX
PKI.pptx
PDF
Cybersecurity Series SEIM Log Analysis
PPTX
QRadar, ArcSight and Splunk
PPTX
Designing for Privacy in AWS cloud
Overall Security Process Review CISC 6621Agend.docx
SECURING THE CLOUD DATA LAKES
ALTR Company Overview 2023
DG_Architecture_Training.pptx
Data Privacy By Design with AWS
IBM QRadar’s DomainTools Application.pptx
IBM QRadar’s DomainTools Application.pptx
Applying Auto-Data Classification Techniques for Large Data Sets
SIEM : Security Information and Event Management
eBook: 5 Steps to Secure Cloud Data Governance
Whitepaper IBM Qradar Security Intelligence
G05.2013 Security Information and Event Management
SureLog Large-scale SIEM Implementation in a Distributed It Security World
Sqrrl Enterprise: Big Data Security Analytics Use Case
Top 10 cloud security tools to adopt in 2024.pdf
SOAR and SIEM.pptx
PKI.pptx
Cybersecurity Series SEIM Log Analysis
QRadar, ArcSight and Splunk
Designing for Privacy in AWS cloud
Ad

More from Rasool Irfan (7)

PDF
45 key vendors and thier online fraud prevention solutions
PPTX
Digital workplace security for gen z
PDF
Maximize your investment with AWS Native Security Controls
PDF
Multi Cloud Security Technology Requirements.
PDF
Ethical Hacking by Rasool Kareem Irfan
PPTX
Honeypots and honeynets
PDF
Your growth in corporate life
45 key vendors and thier online fraud prevention solutions
Digital workplace security for gen z
Maximize your investment with AWS Native Security Controls
Multi Cloud Security Technology Requirements.
Ethical Hacking by Rasool Kareem Irfan
Honeypots and honeynets
Your growth in corporate life

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Tartificialntelligence_presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
20250228 LYD VKU AI Blended-Learning.pptx
Big Data Technologies - Introduction.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
A comparative analysis of optical character recognition models for extracting...
Reach Out and Touch Someone: Haptics and Empathic Computing
SOPHOS-XG Firewall Administrator PPT.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...

Build cost effective Security Data Lake + SIEM

  • 1. Future of cyber security www.rasoolirfan.com Build cost effective Security Data Lake
  • 2. Future of cyber security www.rasoolirfan.com Definitions “A data lake is a method of storing data within a system or repository, in its natural format, that facilitates the collocation of data in various schemata and structural forms, usually object blobs or files. The idea of data lake is to have a single store of all data in the enterprise ranging from raw data (which implies exact copy of source system data) to transformed data which is used for various tasks including reporting, visualization, analytics and machine learning.” ~Wikipedia Security incident and event management (SIEM) is the process of identifying, monitoring, recording and analyzing security events or incidents within a real-time IT environment. It provides a comprehensive and centralized view of the security scenario of an IT infrastructure ~Techopedia Data Lake SIEM
  • 3. Future of cyber security www.rasoolirfan.com Why organization choose Data Lake or SIEM Rationale Data Lake SIEM Purpose Reason Technology Expertise Search, hunting Detecting malware, anomalies, offenses Less Capex; Log Management; Investigations Better Correlation & Detection capabilities Open source Commercial Experts Dependent Out of box Product features
  • 4. Future of cyber security www.rasoolirfan.com How IBM QRadar help achieve customer achieve both Data Lake & SIEM Answer - QRadar Data Store to enable efficient data mining for security and compliance use cases  QRadar Data Store has a predictable pricing model based on the number of hosts that store data, and customers can optionally add as much storage and compute power as needed.  Data Store is configured using a simple collection filter in QRadar. By selecting the data source, or the event criteria from the data source, you can easily define which data is sent directly to Data Store  Data Store is a QRadar licensing overlay that leverages existing storage and processing capacity on Event Processors and Data Nodes to collect, process and store data identified for Data Store  Data Store is primarily used for log management, so its data is excluded from correlation and advanced security analytics capabilities. However, Data Store data can be used by most other capabilities, such as searching, reporting, visualization and custom apps built using the QRadar App Framework.  Data Store data cannot be used for historical correlation. However, the filtering policy that separates Data Store data from SIEM data can easily be changed. As soon as the policy is updated, all future data collected will be included in all analytics and correlation processes within QRadar  Because Data Store data does not go through analysis or correlation, analytics-driven apps may not be able to fully leverage data collected using Data Store. All other capabilities, such as reporting, parsing, custom properties and dashboards, should work as expected.  Leverage the QRadar SDK to build custom apps and analytics on top of your data to address a variety of unique security and IT operations use cases  Provide security teams with massive volumes of data to which they can pose a variety of questions via Ariel Query Language and easily filter through results.  Share data between Security and IT Ops. Centralize enterprise-wide data for reporting and analytics, and control access to data based on data type and user role.
  • 5. Future of cyber security www.rasoolirfan.com Now, you can build a security data lake without breaking your budget or adding another vendor to your security stack https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.2/com.ibm.qradar.doc/t_qradar_adm_data_store.html