SlideShare a Scribd company logo
Better Together:
Adrian DUMITRESCU
Q-East Software
www.qeast.ro
&
SECURITY AND COMPLIANCE IMPACT
2
2
88% 63,437 80%
64%
Of data braches are caused by
human error and system problems
365 days
Organizations need to be compliant and
maintain internal policies
75%
Of organizations have to adhere to
more than one compliance or
departmental requirement
1 in 5
Customers would stop doing
business with a bank, credit card co.
or retailer after a security breach
62%
Of organizations are unaware of
security breaches and non-compliance
for months
930 Million
The number of data breaches since
2005
Of threats come from privilege
insiders
Threats across organizations in
2014
Of Cyber-espionage is done
through internal systems
www.qeast.ro
TECHNICAL CHALLENGES
3
3
Event logs
Point products
IT Data
Analytics
Security
• Retention requirements for
compliance are long
• Noisy, cryptic, incomplete
data
• Vulnerable to manipulation
• Storage is expensive
• Lack of integration
• Too many data silos
• Too many GUIs
• Security gaps
• No comprehensive view of “who
has access” and “who did what”
• Inability to take action on
suspicious user activity and
patterns.
• Difficult to search & maintain
massive amounts of data
• Data resides on disparate,
heterogeneous networks
www.qeast.ro
5 IT AUDITING & COMPLIANCE MISTAKES ORGANIZATIONS MAKE
Lack of visibility into who is doing what in application silos.
Underestimating user & organizational impact.
Inconsistent or absence of a GRC strategy.
Inadequate data protection.
1
2
3
4
Failure to plan and manage external and internal audits.5
www.qeast.ro
WHAT IF YOU COULD…
1
With one view answer: who has access,
how was it obtained, and how was it used –
all in real time?
2
Complete investigations with full-text search
of critical IT data and its relation to users
and events?
3
Report on user activity for internal
investigations and compliance?
4
Be alerted on violations, malicious activity
and suspicious trends as they happen?
5
Automate and secure collection of log data
from disparate platforms without needing
expertise?
6
Save expensive storage space and maintain
compliance by storing event logs in a
compressed, encrypted format?
7
Troubleshoot and pinpoint problems should
an incident occur for operational visibility?
8
Improve insight and communication across
teams with flexible reporting?
9
Eliminate information security silos with
integration for SIEM solutions?
10
Leverage security and auditing solutions
already in place?
www.qeast.ro
GAIN IT INSIGHTS WITH ON-THE-FLY INVESTIGATIONS
6
6
Correlate disparate IT data
Review incidents quickly
Investigate Dynamically
www.qeast.ro
AUTOMATE, ARCHIVE AND SECURE EVENT LOGS
7
7
Real time log collection
Archive, normalize and categorize
Secure events before they’re sent
www.qeast.ro
IMPROVE IT DATA ANALYTICS
8
8
Single pane of glass
SIEM integration
Diverse systems support
www.qeast.ro
COVERING THE SIX COMPLIANCE “W”
9
9
Who made the change?
When the change was made?
Why the change was made? (Comment)
Where the change was made from?
What object was changed (before and after)?
Workstation where the request originated?
www.qeast.ro
DEDICATED AUDIT FOR CRITICAL PLATFORMS
10
10
 AD, LDAP,Exchange,SharePoint,SQLServer, WindowsNTFS
 Windowslogons,Defender, AuthenticationServices, Safeguard
 Registry,services
 Localusersandgroups
 SkypeforBusiness
 WindowsAzure,Office365,OneDrive
 VMwarevCenter
 NetApp,EMC, FluidFS, CloudStorage
www.qeast.ro
ACTIVE DIRECTORY AUDIT: ADMINISTRATIVE ACTIONS
11
11 www.qeast.ro
ACTIVE DIRECTORY AUDIT: USER ACTIONS
12
12 www.qeast.ro
ACTIVE DIRECTORY AUDIT: CRITICAL OBJECTS PROTECTION
13
13 www.qeast.ro
MICROSOFT EXCHANGE AUDIT: OWNER AND NON-OWNER ACTIVITY
14
14 www.qeast.ro
WINDOWS NTFS AUDIT: USER ACTIONS
15
15 www.qeast.ro
WINDOWS NTFS AUDIT: CUSTOM TEMPLATES
16
16 www.qeast.ro
SQL SERVER AUDIT: SUPPORT FOR ANY VERSION
17
17 www.qeast.ro
SQL SERVER AUDIT: DETAILED EVENTS
18
18
Captures the analyzed query
www.qeast.ro
SQL SERVER AUDIT: BEST PRACTICES TEMPLATE
19
19
• Add DB User
• Add Login
• Add Login to server role
• Add Member to DB role
• Add Role
• Change Database Owner
• Change Member in DB Role
• Create database
• Delete database
• Delete DB user
• Delete Login
• Delete Login from Server role
• Delete member from DB role
• Delete Role
• Grant database access to DB user
• Revoke database access from DB user
397 SQL events included in the template
www.qeast.ro
SHAREPOINT AUDIT: CUSTOM TEMPLATES
20
20 www.qeast.ro
SHAREPOINT AUDIT: CUSTOM TEMPLATES
21
21 www.qeast.ro
SHAREPOINT AUDIT: DETAILED USER ACTIVITY
22
22 www.qeast.ro
VMWARE AUDIT: ADD-ON TO ALL LICENSING OPTIONS
23
23 www.qeast.ro
IN 2016 SECURITYCURRENT.COM RELEASED A RESEARCH
25 CISOs identified the biggest security challenges for the new year
 The ability to detect and manage an incident
 Securing personally identifiable information records from cyber attacks
 Building a pervasive security culture at employee level
 Conversion of the traditional end-point protection into technologies that can counteract ransomware
 Reduce breach detection times and close all digital doors
 Transform the role of the CISO from business solution providers to leaders and protectors
 Manage cyberthreats in the IoT world
 Accelerate the adoption of simple things: asset inventory, implement strong admin and user authentication, device
encryption, backup etc.
 Elevate the “state of IT security” and communicate the right information to leadership
 Focus on compliance standards implementation
24
http://www.securitycurrent.com/en/ciso_journal/ac_ciso_journal/cisos-
identify-the-biggest-security-challenges-as-they-enter-the-new-year
www.qeast.ro
REAL LIFE APPLICATION OF THOSE CONCERNS
25
Capture ATP
Intrusion Prevention
Intrusion Detection
www.qeast.ro
THE BIGGEST SECURITY CHALLENGE IN THE WORLD TODAY
26
“...a wealth of information creates a poverty of attention...”
― Herbert A. Simon
“In the Information Age, the first step to sanity is FILTERING.
Filter the information: extract for knowledge.”
― Marc Stiegler
Where is the knowledge we have lost in information?
― T. S. Eliot
www.qeast.ro
THE BIGGEST SECURITY CHALLENGE IN THE WORLD TODAY
27
IDC predicts that, by 2020,
organizations that analyze all relevant
data and deliver actionable
information will achieve extra $430
billion in productivity gains over their
less analytically oriented peers.
Fast, accurate security insights that lead to better business decisions
It’s hard to deliver business value when you’re dealing with data that’s:
• Poor quality or incomplete
• Stale
• Siloed in dozens of unconnected applications
• Drawn from external sources that you don't control
www.qeast.ro
THIS IS WHY WE CREATED CYBERQUEST
A high performance investigation and analytics tool with contextual, industry-specific
dashboards: all in one place, in real time, to enhance the value of your existing
security setup
One Single View over All
Events
High-speed event search
Real-time Alerts
Enabling immediate
measures
Industry-specific
Dashboards
Rapid decision making
among infinite data logs
Predefined Scheduled
Reports
For compliance and reduced
internal effort
Fast Deployment
30 minutes - 4 hours,
depending on the customer’s
complexity
www.qeast.ro
SECURITY ANALYTICS PLATFORM
 Precise identification of security incidents through
innovative multi-SIEM/multi-platform data correlation
 Real-time / schedule based connectivity to classical
SIEM systems for data feeds
 Embedded reports to validate control efficiency and
effectiveness for frameworks and standards: ISO 27001,
COBIT, FISMA, HIPPA, PCI/DSS, SOX
 And more…
www.qeast.ro
HIGH LEVEL CAPABILITIES
 Pre-configured connectors for a wide number of industry standard platforms: operating systems, ODBC databases,
communications platforms, network devices, firewalls, IDS/IPS and database security solutions, SIEMs
 JavaScript based event log parsing
 NetFlow integration
 Report packs for multiple technologies and compliance standards
 Advanced Event Browser
 Unlimited data storage that is compressed, encrypted and digitally signed
 Unlimited number of nodes and scalability for all components (data collection, data parsing, data storage)
 Full Cisco support and Unified Event Bus
 Full support for Quest Change Auditor, One Identity Safeguard and SonicWall firewalls
 Biometric security data integration
www.qeast.ro
ONGOING DEVELOPMENT AND INTEGRATION
 Over 100 supported technologies from the initial 12
 Focus on security analytics and business insights
 Scaled up from 25,000 EPS to over 200,000
 Scaled up from 2TB of repository data to over 20TB and queries response from tens of minutes to <5 minutes
 Added built-in compliance for COSO and FIEL and reshaping the existing report packs
 Added case management module
 New modules for internal security evaluation and response: identity theft (biometrics and identity solutions integration,
internal fraud)
 New dedicated connectors for unified communications and distinct security platforms
 New data collection, data parsing and data storage processors
 New user interface for extended visibility into business processes
 GDPR compliance dashboards and reports
Version 2.5 is already in production since May 2018
www.qeast.ro
ENTERPRISE SECURITY: END-TO-END AUDIT AND COMPLIANCE
Graphical anomaly analyzer starting from
one single exception event
Correlation between tens of millions of
events in seconds
User-defined alerts for the most specific
event requirements
Intensive industry-specific expertise for
high visibility and compliance
Integration with physical security systems and
correlation of data logs with real life events
Based on synthesized results displayed into
graphical intuitive charts
www.qeast.ro
ANAF INTEGRITY DIVISION
Criminal investigations over ANAF applications
ANAF’s Integrity Division was created as an internal team of police officers with the single
purpose of gathering and investigating proofs of criminal activity performed by ANAF’s personnel,
as part of standard prosecuting procedure.
The biggest challenge was to have the ability of search and correlate information produced by
more 160 financial applications developed in the past 20 years, and used by more than 25,000
employees, in order to provide the required evidences of criminal activity.
They needed a solution that could extract data from all 160 applications, using more than 100
distinct connectors, and counting hundreds of thousands of records each day. The data had to be
kept online for 6 months, and archived for the next 5 years. As an extra, the requirements were
valid for all data that is currently in ANAF’s silos, some dating back to 2003. Execution time: 5
months.
We qualified Smart Investigator together with the Internal Fraud module and Quest Compliance
Suite and were able to meet all demands in the proper time, including the tight budget, due to the
product’s easiness in creation of new connectors, new dashboards and new reports, but also by
taking benefit of the good analytics capabilities that allowed for the proper correlation and display
of extremely heterogeneous data.
The extreme compression abilities and no-sql search capabilities allowed for maximization of the
minimal requirements, and at this moment the solution is able to keep online 1 years of data,
while archiving for 10 years. Extracting and making available data from archives takes less than
24 hours, in case of need. Reports can be produced in minutes, and investigations can be
performed in near real-time across all online silos, no matter the level of depth.
33 www.qeast.ro
ANAF INTEGRITY DIVISION INVESTIGATION
34 www.qeast.ro
VODAFONE ROMANIA
Internal audit, security analytics and fraud management
Vodafone has a long history in using Q-East Software solutions for managing its compliance over
systems and custom applications. The company uses a global SIEM provider to monitor the external
security level, and a local deployment for internal audits. In the past years, the Security Department
also implemented several other security platforms over network, databases and applications.
The main challenge came when the Business decided to unify operational activity over all security
applications, and correlate with insights from SIEM and internal audit in order to have the big
compliance picture.
As an extra, they reshaped the fraud management platform and decided to implement a unified
solution that can handle all of the above. All data needed to be enhanced with information from
custom applications.
Smart Investigator was the solution of choice following an internal PoC that took over 6 months, with
more than 100 customizations being implemented to address custom loads.
Customer benefits:
• Multi-SIEM/multi-platform data correlation using unique algoritms
• Fast search over millions of aggregated events in seconds
• Over 100k eps processed in real-time from security platforms
• Real-time, no-impact connectivity to SIEM and security applications
• Synthetic results presented in diagrams designed to support the decision process
• Built-in reports customized to support ISO 27001, COBIT, PCI DSS and SOX compliance over all
integrated platforms
• User-defined alerts for any new request
35 www.qeast.ro
VODAFONE ROMANIA INTERNAL FRAUD ANALYTICS
36
Data aggregation
from custom
applications and
fraud identification
Setting summary
alerts based on
identified fraud
cases
Alerting based on
defined scenario
and adding
fraudulent events
Pinpoint the fraud
responsible
www.qeast.ro
Thank you!

More Related Content

PPTX
Smart Analytics for The Big Unknown
PPTX
Data Driven Security in SSAS
PDF
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
PDF
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
PDF
Combating the enemy within – an elegant mathematical approach to insider thre...
PDF
The Evolution of and Need for Secure Network Access
PPTX
B2 - The History of Content Security: Part 2 - Adam Levithan
PDF
Elastic Security Brochure
Smart Analytics for The Big Unknown
Data Driven Security in SSAS
(SACON) Wasim Halani & Arpan Raval - Practical Threat Hunting - Developing an...
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
Combating the enemy within – an elegant mathematical approach to insider thre...
The Evolution of and Need for Secure Network Access
B2 - The History of Content Security: Part 2 - Adam Levithan
Elastic Security Brochure

What's hot (20)

PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PDF
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
PDF
Security Challenges in Cloud
PDF
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
PDF
Risk based it auditing for non it auditors (basics of it auditing) final 12
PDF
Attributable Networks - Guardtime Whitepaper
PDF
Microsoft Digital Crimes Unit
PPTX
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
PPTX
Lisa Guess - Embracing the Cloud
PDF
Infonetics Network and Content Security Vendor Scorecard
PDF
Securing Your Cloud Applications
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PPTX
OneIdentity - A Future-Ready Approach to IAM
PDF
Unlock the full potential of IoT
PDF
netskope-casb-for-microsoft-365.pdf
PPTX
GDPR Part 3: Practical Quest
PDF
Practical advice for cloud data protection ulf mattsson - bright talk webin...
PDF
Cloud security with Sage Construction Anywhere
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PDF
Enterprise policy-management
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Security Challenges in Cloud
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Risk based it auditing for non it auditors (basics of it auditing) final 12
Attributable Networks - Guardtime Whitepaper
Microsoft Digital Crimes Unit
Reduciendo riesgos a través de controles de acceso, manejo de privilegios y a...
Lisa Guess - Embracing the Cloud
Infonetics Network and Content Security Vendor Scorecard
Securing Your Cloud Applications
LoginCat - Zero Trust Integrated Cybersecurity
OneIdentity - A Future-Ready Approach to IAM
Unlock the full potential of IoT
netskope-casb-for-microsoft-365.pdf
GDPR Part 3: Practical Quest
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Cloud security with Sage Construction Anywhere
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Enterprise policy-management
Ad

Similar to GDPR Part 5: Better Together Quest & Cyberquest (20)

PPTX
Cybersecurity by the numbers
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PPTX
Arvind Mehrotra
PPTX
IT Security Essentials
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Introduction to Cybersecurity
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PPTX
A guide to Sustainable Cyber Security
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
GDPR Part 2: Quest Relevance
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PPTX
CSO CXO Series Breakfast
PPTX
Cyber security within Organisations: A sneaky peak of current status, trends,...
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPTX
Nist 800 53 deep dive 20210813
PPTX
Stay out of headlines for non compliance or data breach
PDF
Information Security It's All About Compliance
PDF
Security Industry Overview
Cybersecurity by the numbers
IT General Controls Presentation at IIA Vadodara Audit Club
Arvind Mehrotra
IT Security Essentials
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Introduction to Cybersecurity
Improve IT Security and Compliance with Mainframe Data in Splunk
Cyber Risk Management in 2017 - Challenges & Recommendations
A guide to Sustainable Cyber Security
Cyber Risk Management in 2017: Challenges & Recommendations
GDPR Part 2: Quest Relevance
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
CSO CXO Series Breakfast
Cyber security within Organisations: A sneaky peak of current status, trends,...
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Nist 800 53 deep dive 20210813
Stay out of headlines for non compliance or data breach
Information Security It's All About Compliance
Security Industry Overview
Ad

Recently uploaded (20)

PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Introduction to Effective Communication.pptx
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPTX
Tour Presentation Educational Activity.pptx
PPTX
Self management and self evaluation presentation
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPTX
nose tajweed for the arabic alphabets for the responsive
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PDF
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Impressionism_PostImpressionism_Presentation.pptx
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
PPTX
Human Mind & its character Characteristics
PPTX
Learning-Plan-5-Policies-and-Practices.pptx
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Introduction to Effective Communication.pptx
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
Tour Presentation Educational Activity.pptx
Self management and self evaluation presentation
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
nose tajweed for the arabic alphabets for the responsive
Intro to ISO 9001 2015.pptx wareness raising
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
The Effect of Human Resource Management Practice on Organizational Performanc...
Why Top Brands Trust Enuncia Global for Language Solutions.pdf
_ISO_Presentation_ISO 9001 and 45001.pptx
Impressionism_PostImpressionism_Presentation.pptx
oil_refinery_presentation_v1 sllfmfls.pdf
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
AcademyNaturalLanguageProcessing-EN-ILT-M02-Introduction.pptx
Human Mind & its character Characteristics
Learning-Plan-5-Policies-and-Practices.pptx

GDPR Part 5: Better Together Quest & Cyberquest

  • 2. SECURITY AND COMPLIANCE IMPACT 2 2 88% 63,437 80% 64% Of data braches are caused by human error and system problems 365 days Organizations need to be compliant and maintain internal policies 75% Of organizations have to adhere to more than one compliance or departmental requirement 1 in 5 Customers would stop doing business with a bank, credit card co. or retailer after a security breach 62% Of organizations are unaware of security breaches and non-compliance for months 930 Million The number of data breaches since 2005 Of threats come from privilege insiders Threats across organizations in 2014 Of Cyber-espionage is done through internal systems www.qeast.ro
  • 3. TECHNICAL CHALLENGES 3 3 Event logs Point products IT Data Analytics Security • Retention requirements for compliance are long • Noisy, cryptic, incomplete data • Vulnerable to manipulation • Storage is expensive • Lack of integration • Too many data silos • Too many GUIs • Security gaps • No comprehensive view of “who has access” and “who did what” • Inability to take action on suspicious user activity and patterns. • Difficult to search & maintain massive amounts of data • Data resides on disparate, heterogeneous networks www.qeast.ro
  • 4. 5 IT AUDITING & COMPLIANCE MISTAKES ORGANIZATIONS MAKE Lack of visibility into who is doing what in application silos. Underestimating user & organizational impact. Inconsistent or absence of a GRC strategy. Inadequate data protection. 1 2 3 4 Failure to plan and manage external and internal audits.5 www.qeast.ro
  • 5. WHAT IF YOU COULD… 1 With one view answer: who has access, how was it obtained, and how was it used – all in real time? 2 Complete investigations with full-text search of critical IT data and its relation to users and events? 3 Report on user activity for internal investigations and compliance? 4 Be alerted on violations, malicious activity and suspicious trends as they happen? 5 Automate and secure collection of log data from disparate platforms without needing expertise? 6 Save expensive storage space and maintain compliance by storing event logs in a compressed, encrypted format? 7 Troubleshoot and pinpoint problems should an incident occur for operational visibility? 8 Improve insight and communication across teams with flexible reporting? 9 Eliminate information security silos with integration for SIEM solutions? 10 Leverage security and auditing solutions already in place? www.qeast.ro
  • 6. GAIN IT INSIGHTS WITH ON-THE-FLY INVESTIGATIONS 6 6 Correlate disparate IT data Review incidents quickly Investigate Dynamically www.qeast.ro
  • 7. AUTOMATE, ARCHIVE AND SECURE EVENT LOGS 7 7 Real time log collection Archive, normalize and categorize Secure events before they’re sent www.qeast.ro
  • 8. IMPROVE IT DATA ANALYTICS 8 8 Single pane of glass SIEM integration Diverse systems support www.qeast.ro
  • 9. COVERING THE SIX COMPLIANCE “W” 9 9 Who made the change? When the change was made? Why the change was made? (Comment) Where the change was made from? What object was changed (before and after)? Workstation where the request originated? www.qeast.ro
  • 10. DEDICATED AUDIT FOR CRITICAL PLATFORMS 10 10  AD, LDAP,Exchange,SharePoint,SQLServer, WindowsNTFS  Windowslogons,Defender, AuthenticationServices, Safeguard  Registry,services  Localusersandgroups  SkypeforBusiness  WindowsAzure,Office365,OneDrive  VMwarevCenter  NetApp,EMC, FluidFS, CloudStorage www.qeast.ro
  • 11. ACTIVE DIRECTORY AUDIT: ADMINISTRATIVE ACTIONS 11 11 www.qeast.ro
  • 12. ACTIVE DIRECTORY AUDIT: USER ACTIONS 12 12 www.qeast.ro
  • 13. ACTIVE DIRECTORY AUDIT: CRITICAL OBJECTS PROTECTION 13 13 www.qeast.ro
  • 14. MICROSOFT EXCHANGE AUDIT: OWNER AND NON-OWNER ACTIVITY 14 14 www.qeast.ro
  • 15. WINDOWS NTFS AUDIT: USER ACTIONS 15 15 www.qeast.ro
  • 16. WINDOWS NTFS AUDIT: CUSTOM TEMPLATES 16 16 www.qeast.ro
  • 17. SQL SERVER AUDIT: SUPPORT FOR ANY VERSION 17 17 www.qeast.ro
  • 18. SQL SERVER AUDIT: DETAILED EVENTS 18 18 Captures the analyzed query www.qeast.ro
  • 19. SQL SERVER AUDIT: BEST PRACTICES TEMPLATE 19 19 • Add DB User • Add Login • Add Login to server role • Add Member to DB role • Add Role • Change Database Owner • Change Member in DB Role • Create database • Delete database • Delete DB user • Delete Login • Delete Login from Server role • Delete member from DB role • Delete Role • Grant database access to DB user • Revoke database access from DB user 397 SQL events included in the template www.qeast.ro
  • 20. SHAREPOINT AUDIT: CUSTOM TEMPLATES 20 20 www.qeast.ro
  • 21. SHAREPOINT AUDIT: CUSTOM TEMPLATES 21 21 www.qeast.ro
  • 22. SHAREPOINT AUDIT: DETAILED USER ACTIVITY 22 22 www.qeast.ro
  • 23. VMWARE AUDIT: ADD-ON TO ALL LICENSING OPTIONS 23 23 www.qeast.ro
  • 24. IN 2016 SECURITYCURRENT.COM RELEASED A RESEARCH 25 CISOs identified the biggest security challenges for the new year  The ability to detect and manage an incident  Securing personally identifiable information records from cyber attacks  Building a pervasive security culture at employee level  Conversion of the traditional end-point protection into technologies that can counteract ransomware  Reduce breach detection times and close all digital doors  Transform the role of the CISO from business solution providers to leaders and protectors  Manage cyberthreats in the IoT world  Accelerate the adoption of simple things: asset inventory, implement strong admin and user authentication, device encryption, backup etc.  Elevate the “state of IT security” and communicate the right information to leadership  Focus on compliance standards implementation 24 http://www.securitycurrent.com/en/ciso_journal/ac_ciso_journal/cisos- identify-the-biggest-security-challenges-as-they-enter-the-new-year www.qeast.ro
  • 25. REAL LIFE APPLICATION OF THOSE CONCERNS 25 Capture ATP Intrusion Prevention Intrusion Detection www.qeast.ro
  • 26. THE BIGGEST SECURITY CHALLENGE IN THE WORLD TODAY 26 “...a wealth of information creates a poverty of attention...” ― Herbert A. Simon “In the Information Age, the first step to sanity is FILTERING. Filter the information: extract for knowledge.” ― Marc Stiegler Where is the knowledge we have lost in information? ― T. S. Eliot www.qeast.ro
  • 27. THE BIGGEST SECURITY CHALLENGE IN THE WORLD TODAY 27 IDC predicts that, by 2020, organizations that analyze all relevant data and deliver actionable information will achieve extra $430 billion in productivity gains over their less analytically oriented peers. Fast, accurate security insights that lead to better business decisions It’s hard to deliver business value when you’re dealing with data that’s: • Poor quality or incomplete • Stale • Siloed in dozens of unconnected applications • Drawn from external sources that you don't control www.qeast.ro
  • 28. THIS IS WHY WE CREATED CYBERQUEST A high performance investigation and analytics tool with contextual, industry-specific dashboards: all in one place, in real time, to enhance the value of your existing security setup One Single View over All Events High-speed event search Real-time Alerts Enabling immediate measures Industry-specific Dashboards Rapid decision making among infinite data logs Predefined Scheduled Reports For compliance and reduced internal effort Fast Deployment 30 minutes - 4 hours, depending on the customer’s complexity www.qeast.ro
  • 29. SECURITY ANALYTICS PLATFORM  Precise identification of security incidents through innovative multi-SIEM/multi-platform data correlation  Real-time / schedule based connectivity to classical SIEM systems for data feeds  Embedded reports to validate control efficiency and effectiveness for frameworks and standards: ISO 27001, COBIT, FISMA, HIPPA, PCI/DSS, SOX  And more… www.qeast.ro
  • 30. HIGH LEVEL CAPABILITIES  Pre-configured connectors for a wide number of industry standard platforms: operating systems, ODBC databases, communications platforms, network devices, firewalls, IDS/IPS and database security solutions, SIEMs  JavaScript based event log parsing  NetFlow integration  Report packs for multiple technologies and compliance standards  Advanced Event Browser  Unlimited data storage that is compressed, encrypted and digitally signed  Unlimited number of nodes and scalability for all components (data collection, data parsing, data storage)  Full Cisco support and Unified Event Bus  Full support for Quest Change Auditor, One Identity Safeguard and SonicWall firewalls  Biometric security data integration www.qeast.ro
  • 31. ONGOING DEVELOPMENT AND INTEGRATION  Over 100 supported technologies from the initial 12  Focus on security analytics and business insights  Scaled up from 25,000 EPS to over 200,000  Scaled up from 2TB of repository data to over 20TB and queries response from tens of minutes to <5 minutes  Added built-in compliance for COSO and FIEL and reshaping the existing report packs  Added case management module  New modules for internal security evaluation and response: identity theft (biometrics and identity solutions integration, internal fraud)  New dedicated connectors for unified communications and distinct security platforms  New data collection, data parsing and data storage processors  New user interface for extended visibility into business processes  GDPR compliance dashboards and reports Version 2.5 is already in production since May 2018 www.qeast.ro
  • 32. ENTERPRISE SECURITY: END-TO-END AUDIT AND COMPLIANCE Graphical anomaly analyzer starting from one single exception event Correlation between tens of millions of events in seconds User-defined alerts for the most specific event requirements Intensive industry-specific expertise for high visibility and compliance Integration with physical security systems and correlation of data logs with real life events Based on synthesized results displayed into graphical intuitive charts www.qeast.ro
  • 33. ANAF INTEGRITY DIVISION Criminal investigations over ANAF applications ANAF’s Integrity Division was created as an internal team of police officers with the single purpose of gathering and investigating proofs of criminal activity performed by ANAF’s personnel, as part of standard prosecuting procedure. The biggest challenge was to have the ability of search and correlate information produced by more 160 financial applications developed in the past 20 years, and used by more than 25,000 employees, in order to provide the required evidences of criminal activity. They needed a solution that could extract data from all 160 applications, using more than 100 distinct connectors, and counting hundreds of thousands of records each day. The data had to be kept online for 6 months, and archived for the next 5 years. As an extra, the requirements were valid for all data that is currently in ANAF’s silos, some dating back to 2003. Execution time: 5 months. We qualified Smart Investigator together with the Internal Fraud module and Quest Compliance Suite and were able to meet all demands in the proper time, including the tight budget, due to the product’s easiness in creation of new connectors, new dashboards and new reports, but also by taking benefit of the good analytics capabilities that allowed for the proper correlation and display of extremely heterogeneous data. The extreme compression abilities and no-sql search capabilities allowed for maximization of the minimal requirements, and at this moment the solution is able to keep online 1 years of data, while archiving for 10 years. Extracting and making available data from archives takes less than 24 hours, in case of need. Reports can be produced in minutes, and investigations can be performed in near real-time across all online silos, no matter the level of depth. 33 www.qeast.ro
  • 34. ANAF INTEGRITY DIVISION INVESTIGATION 34 www.qeast.ro
  • 35. VODAFONE ROMANIA Internal audit, security analytics and fraud management Vodafone has a long history in using Q-East Software solutions for managing its compliance over systems and custom applications. The company uses a global SIEM provider to monitor the external security level, and a local deployment for internal audits. In the past years, the Security Department also implemented several other security platforms over network, databases and applications. The main challenge came when the Business decided to unify operational activity over all security applications, and correlate with insights from SIEM and internal audit in order to have the big compliance picture. As an extra, they reshaped the fraud management platform and decided to implement a unified solution that can handle all of the above. All data needed to be enhanced with information from custom applications. Smart Investigator was the solution of choice following an internal PoC that took over 6 months, with more than 100 customizations being implemented to address custom loads. Customer benefits: • Multi-SIEM/multi-platform data correlation using unique algoritms • Fast search over millions of aggregated events in seconds • Over 100k eps processed in real-time from security platforms • Real-time, no-impact connectivity to SIEM and security applications • Synthetic results presented in diagrams designed to support the decision process • Built-in reports customized to support ISO 27001, COBIT, PCI DSS and SOX compliance over all integrated platforms • User-defined alerts for any new request 35 www.qeast.ro
  • 36. VODAFONE ROMANIA INTERNAL FRAUD ANALYTICS 36 Data aggregation from custom applications and fraud identification Setting summary alerts based on identified fraud cases Alerting based on defined scenario and adding fraudulent events Pinpoint the fraud responsible www.qeast.ro

Editor's Notes

  • #2: Thank you for you time today. As I will demonstrate, I believe your time is critical to you and your organization. I’d like to introduce you to our organization, talk about how we help thousands of customers like you, and learn more about how we can help you with your specific challenges.
  • #3: Even privileged users need to be audited! Source: 2014 Verizon data breach investigation report Random HIPAA audits being conducted this fall for healthcare and audits in January 2015 for organizations that deal with healthcare in some way PCI 3.0 is mandated and enforced in January 2015. Top 2014 data breaches -JPMorgan -Ebay -Michaels Stores -Variable Annunity Life Insurance -Specs -St. Joseph Health System
  • #5: NOTE to Presenter: GRC = Governance, risk management and compliance
  • #7: Correlate disparate IT data from numerous systems and devices into an interactive search engine for real-time search, analysis and reporting. Pass audits, review security incidents in less time and with more confidence. Receive real-time alerts on unauthorized and suspicious user activity. Start investigations into users, groups, shares, files or events and quickly pivot into other views as new details emerge for a more complete investigation
  • #8: Real time — Automate the collection of event logs across servers, network devices and workstations for immediate availability. Archive — Archive and normalize data. Conduct full-text search on long-term event log data for compliance and security purposes in a highly compressed and indexed online repository, saving storage costs and time spent searching for events. Secure — Create a cached location on each remote server where logs can be duplicated as they are created, preventing a rogue user or administrator from tampering with the audit log evidence.
  • #9: Single pane of glass Search data from Dell Enterprise Reporter and Change Auditor to improve security, compliance and operations while eliminating information silos from other tools SIEM integration Forwards log data collected from Windows servers and network devices to a SIEM solution of your choice. Diverse systems support Get a unified and normalized view (who, what, when, where, workstation) into event log data from Windows, Unix/Linux, network devices, custom text logs and more.
  • #26: This is your typical or atypical organization 20 years ago, all going smooth (1) Suddenly threats are starting to come in, cyber-security becomes a buzz-word, and depending on the profile of your organization, you have to deal with various concerns – all related to security (2) First you choose a good firewall – let’s say CheckPoint (3) Then you study that a best practice is to have sandwiched perimeter protection from two different vendors – and you choose SonicWall because of the 2 mil. sensors worldwide GRID for zero-day protection… (4) … and because it also has APT (5) Despite these, email security becomes a concern because email servers cannot filter spam and phishing by themselves. You choose either leading solution on the market (6) Your empoyees access applications on the web and viceversa – relations to partners, forms filling etc. IDS and IPS become a must (7) Your organization has employees and computers… (8) … that need to be managed and protected – you choose from the distinguished representants here, Kace and Kaspersky (9) You also have a datacenter with servers, databases and applications… (10) … that need to be managed and protected – you choose Ivanti, Cisco, F5 and Quest VROOM (for end to end application performance management and data protection) (11) This datacenter also needs to be secured to outside access, at database and web application layer – F5 and Imperva win the bid (12) Fortinet proves is the best scalable choice to link your HQ, employees and datacenters with a third layer firewall (13) How about the Board of Directors? (14) They want insight from the applications. Informatica. Buzz-words MDM and ILM (15) Your organization uses also the cloud, and they need both a MDM sync betweenon-premise data stores and cloud – let’s say Salesforce (16) Board of directors decides security is a huge impact on business. You need to give them a SIEM tool for cloud and on-premise business layer – If Ivanti was a choice for management, QRadar follows (17) Have you heard of GDPR? Yes it’s near. (18) Make sure data privacy is implemented in your organization… Blancco and Symantec DLP (19) Business processes are tuned up – OneIdentity (20) But you also need to prove compliance – Quest Compliance and ArcSight. Yes, another SIEM tool
  • #29: Mai multe capabilitati: Identificarea precise si usoara a incidentelor prin corelare Multi/Siem, Multi/Platforma Conectivitate in timp real sau pe baza de schedule pe sisteme clasice de SIEM Rapoarte de conformitate cu standarde specifice si uzuale: ISO 27001 COBIT FISMA HIPPA PCI/DSS SOX Pentru: Analiza de loguri Detectie de intruziuni Alertare de fraude in aplicatii Corelare date multi/siem Corelare date din zona de network cu aplicatii/infrastructura.
  • #31: Mai multe capabilitati: Identificarea precise si usoara a incidentelor prin corelare Multi/Siem, Multi/Platforma Conectivitate in timp real sau pe baza de schedule pe sisteme clasice de SIEM Rapoarte de conformitate cu standarde specifice si uzuale: ISO 27001, COBIT, FISMA, HIPPA, PCI/DSS, SOX Pentru: Analiza de loguri Detectie de intruziuni Alertare de fraude in aplicatii Corelare date multi/siem Corelare date din zona de network cu aplicatii/infrastructura.
  • #32: NOTE to Presenter: Close to 1mil EUR contracted values since September 2016!!!!
  • #33: 32