SlideShare a Scribd company logo
Jeff Olen, Senior Product Manager, AlienVault
Kate MacLean, Senior Product Marketing Manager, Cisco
Sacha Dawes, Principal Product Marketing Manager
Felipe Legorreta, Sales Engineer
How to Solve your Top IT
Security Reporting Challenges
with AlienVault
• Managing your Cybersecurity Risk
• The Necessity, Benefits, and Challenges of IT Security Reporting
• Simplify IT Security Reporting with AlienVault USM Anywhere
• USM Anywhere Live Demo
• Ask Us Questions!
Agenda
3
Managing Your Cybersecurity Risk
Identify
Protect
Detect
Respond
Learn &
Adapt
Report
• Identify what and who is in your
environment, and what vulnerabilities exist
• Protect the confidentiality, integrity, and
availability of your information and
systems
• Detect threats and anomalies
• Respond to incidents
• Learn about intrusions and adapt your
protections
• Report that your security controls are in
place, are working, and watch for
anomalies
• Regular/Continuous review of security
controls
› Identify trends and anomalies
• Executive / Management reporting
› Demonstrate security posture and effectiveness
• Audit Success
› Demonstrate controls are in place and operational
IT Security Reporting is Necessary Assess
RemediateRespond
• Many regulations seek monitoring and report out
against common control objectives, including:
› Asset inventories
› Detected vulnerabilities
› Detected malware & threats
› Failed logon attempts
• Security Frameworks are increasingly being used
as a basis for security and compliance programs
› Ex: NIST CSF has multiple mappings to other
security frameworks such as CIS Controls, NIST
800-53, COBIT, ISO 27001, and more
› Implementation and report out of controls supports
continuous compliance practices
Security Reporting Supports Compliance & Security Best
Practices
Source: LinkedIn Information Security – Threat Monitoring, Detection & Response (2017)
• Requires analysis of events from multiple sources
and solutions
• Different vendor solutions typically have custom log
formats
• Built-in vendor reports typically only provide insight
into that solution
• Even where APIs are available to gather logs,
typically requires programming expertise
IT Security Reporting is Hard
How many staff and different tools are required to
successfully create your IT security reports?
• Aggregating logs into a centralized
location is a necessary first step
• Enables log collection and normalization
from multiple sources
• Precursor for activities including event
correlation
• Facilitates and simplifies reporting for all
your environments, not just by solution
IT Security Reporting Success Requires Log
Management
A Unified Approach to Threat Detection, Incident Response & Compliance Management
Simplify IT Security Reporting with AlienVault USM Anywhere
Unified Security Management (USM) Platform
AlienVault combines five essential security monitoring capabilities for your
cloud and on-premises environments, and cloud applications, in a unified
platform for today’s resource-constrained organizations.
Supports Continuous Security Monitoring
USM Anywhere constantly monitors your environment with capabilities that
support continuous security monitoring of your environments. Combined with
continuously updated threat intelligence, USM Anywhere provides optimal
threat detection, incident response, and compliance management.
Simplifies and Reduces the Cost of Compliance
Security automation and orchestration enables different point solutions to
work together, helping your teams manage incidents more efficiently. Built-in
and customizable views and reports simplify review and compliance reporting.
10
Combines Five Security Essentials
Vulnerability Assessment
Know where the vulnerabilities are to avoid easy
exploitation and compromise
Incident Response
Enable discovered threats to be quickly
contained and/or mitigated
Threat Detection
Know when anomalies and suspicious activities
happen in your environment
SIEM, Log Management & Reporting
Aggregate, retain and enable analysis of security event data from
across your network into a HIPAA, PCI DSS & SOC 2 certified
solution
Asset Discovery
Know who and what is connected to your cloud and
on-premises environments at all times
Unified Security Management from a
single cloud-based pane of glass
11
Complete Cloud and On-Premises Monitoring
Cloud Sensors On-Premises Sensors
Monitor cloud environments
and applications
Monitor on-premises virtual
and physical environments
Continuously Updated Threat Intelligence
Threat Intelligence Powered by
AlienVault Labs Security Research
• AlienVault researches emerging threats–so
you don’t have to
• Continuous Threat Intelligence updates built
into your USM Anywhere include:
• Correlation directives
• IDS signatures
• Vulnerability audits
• Asset discovery signatures
• IP reputation data
• Data source plugins & AlienApps
• Incident response guidance
Supplemented by the AlienVault
Open Threat Exchange™ (OTX)
• FREE access to over 14 million threat
indicators contributed daily
• Collaborate with 65,000+ global participants
to investigate emerging threats in the wild
• Subscribe to threat research updates from
other OTX contributors
• Leverage the latest OTX threat intelligence
directly in your AlienVault USM environment
Cloud InfrastructureProductivity Apps IT VirtualizationIT OperationsIT Security
A Growing “Galaxy” of AlienApps
Respond
Automate and orchestrate your
threat responses for efficiency
Monitor
AlienApps collect and enrich
data from your environment
Detect
USM Anywhere uses that data
to detect threats and alerts you
Security Automation & Orchestration
Simplifies and Reduces the Cost of Compliance
• Built-In Reports for PCI & HIPAA
› Malware, Vulnerabilities, Failed Logons, and more
• Reports Covering Key NIST Cybersecurity
Framework (NIST CSF) Functions
› Asset Management, Risk Management, Access
Control, Audit/Log Records Review, Anomalies &
Events, Security Continuous Monitoring, Detection
Processes, and Analysis
• Reports to Review Common Events
› Events by Types of Data Source
› Events by Data Source
• Customizable Views with Hundreds of Available
Fields
Fast, Repeatable Reporting for Compliance & Security Best Practice
Built-In & Customizable Reports
17
How USM Anywhere Works
Hyper-V
VMware
AlienVault Threat
Intelligence
URLs
Malware
Samples
File
Hashes
Domains
IP Addresses
PUBLIC CLOUD
ON-PREMISES
CLOUD APPS
IT’S DEMO TIME!
19
Centrally Monitor
All Your
Environments
Orchestrate & Automate
Your Incident Response
Leverage Integrated
Threat Intelligence
Save Time & Money
with Unified
Essentials
Deploy Fast in the
Cloud or in Your Data
Center
Five Reasons You’ll Love the AlienVault Approach
Questions?
Test Drive USM Anywhere in our Interactive, Online Demo:
Get instant access, no download, no install
https://www.alienvault.com/products/usm-anywhere/demo
Try it for Free in your Environment :
Start detecting threats in less than an hour
https://www.alienvault.com/products/usm-anywhere/free-trial
Review Pricing and Get a Quote:
Multiple tiers available, low annual subscription pricing
https://www.alienvault.com/products/usm-anywhere/pricing

More Related Content

PPTX
Beginner's Guide to SIEM
PPTX
Improve threat detection with hids and alien vault usm
PDF
Open Source IDS Tools: A Beginner's Guide
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Simplify PCI DSS Compliance with AlienVault USM
PPTX
Incident response live demo slides final
Beginner's Guide to SIEM
Improve threat detection with hids and alien vault usm
Open Source IDS Tools: A Beginner's Guide
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Improve Situational Awareness for Federal Government with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
Incident response live demo slides final

What's hot (20)

PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPTX
Creating Correlation Rules in AlienVault
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPTX
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
PDF
Vulnerability threat and attack
PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PDF
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PDF
Modern vs. Traditional SIEM
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PDF
IBM Security QFlow & Vflow
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
PDF
Symantec Cyber Security Services: Security Simulation
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
PDF
Cis controls v8_guide (1)
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Creating Correlation Rules in AlienVault
AWS Security Best Practices for Effective Threat Detection & Response
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Automating Critical Security Controls for Threat Remediation and Compliance
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Vulnerability threat and attack
Improve Security Visibility with AlienVault USM Correlation Directives
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Improve Threat Detection with OSSEC and AlienVault USM
Modern vs. Traditional SIEM
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
IBM Security QFlow & Vflow
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Symantec Cyber Security Services: Security Simulation
DTS Solution - Building a SOC (Security Operations Center)
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Cis controls v8_guide (1)
Ad

Similar to How to Solve Your Top IT Security Reporting Challenges with AlienVault (20)

PDF
Incident Response Whitepaper - AlienVault
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
How to Simplify Audit Compliance with Unified Security Management
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
Alienvault threat alerts in spiceworks
PPTX
How Malware Works
PPTX
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
PPTX
How to Detect a Cryptolocker Infection with AlienVault USM
PPTX
SpiceWorks Webinar: Whose logs, what logs, why logs
PPTX
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
PPTX
Karunia Wijaya - Proactive Incident Handling
PPTX
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PPTX
Six Steps to SIEM Success
PDF
G05.2013 Security Information and Event Management
PPTX
Spice world 2014 hacker smackdown
PPTX
How to Investigate Threat Alerts in Spiceworks!
PDF
Bit defender ebook_secmonitor_print
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PDF
Security operations center 5 security controls
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Incident Response Whitepaper - AlienVault
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
How to Simplify Audit Compliance with Unified Security Management
Security Operations Center (SOC) Essentials for the SME
Alienvault threat alerts in spiceworks
How Malware Works
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
How to Detect a Cryptolocker Infection with AlienVault USM
SpiceWorks Webinar: Whose logs, what logs, why logs
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
Karunia Wijaya - Proactive Incident Handling
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
Six Steps to SIEM Success
G05.2013 Security Information and Event Management
Spice world 2014 hacker smackdown
How to Investigate Threat Alerts in Spiceworks!
Bit defender ebook_secmonitor_print
Vulnerability Management: What You Need to Know to Prioritize Risk
Security operations center 5 security controls
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Ad

More from AlienVault (13)

PDF
Malware Invaders - Is Your OS at Risk?
PDF
Insider Threat Detection Recommendations
PPTX
Malware detection how to spot infections early with alien vault usm
PDF
PCI DSS Implementation: A Five Step Guide
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PDF
Alien vault sans cyber threat intelligence
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
PPTX
Demo how to detect ransomware with alien vault usm_gg
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Malware Invaders - Is Your OS at Risk?
Insider Threat Detection Recommendations
Malware detection how to spot infections early with alien vault usm
PCI DSS Implementation: A Five Step Guide
The State of Incident Response - INFOGRAPHIC
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Best Practices for Configuring Your OSSIM Installation
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Alien vault sans cyber threat intelligence
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
Demo how to detect ransomware with alien vault usm_gg
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf

How to Solve Your Top IT Security Reporting Challenges with AlienVault

  • 1. Jeff Olen, Senior Product Manager, AlienVault Kate MacLean, Senior Product Marketing Manager, Cisco Sacha Dawes, Principal Product Marketing Manager Felipe Legorreta, Sales Engineer How to Solve your Top IT Security Reporting Challenges with AlienVault
  • 2. • Managing your Cybersecurity Risk • The Necessity, Benefits, and Challenges of IT Security Reporting • Simplify IT Security Reporting with AlienVault USM Anywhere • USM Anywhere Live Demo • Ask Us Questions! Agenda
  • 3. 3 Managing Your Cybersecurity Risk Identify Protect Detect Respond Learn & Adapt Report • Identify what and who is in your environment, and what vulnerabilities exist • Protect the confidentiality, integrity, and availability of your information and systems • Detect threats and anomalies • Respond to incidents • Learn about intrusions and adapt your protections • Report that your security controls are in place, are working, and watch for anomalies
  • 4. • Regular/Continuous review of security controls › Identify trends and anomalies • Executive / Management reporting › Demonstrate security posture and effectiveness • Audit Success › Demonstrate controls are in place and operational IT Security Reporting is Necessary Assess RemediateRespond
  • 5. • Many regulations seek monitoring and report out against common control objectives, including: › Asset inventories › Detected vulnerabilities › Detected malware & threats › Failed logon attempts • Security Frameworks are increasingly being used as a basis for security and compliance programs › Ex: NIST CSF has multiple mappings to other security frameworks such as CIS Controls, NIST 800-53, COBIT, ISO 27001, and more › Implementation and report out of controls supports continuous compliance practices Security Reporting Supports Compliance & Security Best Practices
  • 6. Source: LinkedIn Information Security – Threat Monitoring, Detection & Response (2017)
  • 7. • Requires analysis of events from multiple sources and solutions • Different vendor solutions typically have custom log formats • Built-in vendor reports typically only provide insight into that solution • Even where APIs are available to gather logs, typically requires programming expertise IT Security Reporting is Hard How many staff and different tools are required to successfully create your IT security reports?
  • 8. • Aggregating logs into a centralized location is a necessary first step • Enables log collection and normalization from multiple sources • Precursor for activities including event correlation • Facilitates and simplifies reporting for all your environments, not just by solution IT Security Reporting Success Requires Log Management
  • 9. A Unified Approach to Threat Detection, Incident Response & Compliance Management Simplify IT Security Reporting with AlienVault USM Anywhere Unified Security Management (USM) Platform AlienVault combines five essential security monitoring capabilities for your cloud and on-premises environments, and cloud applications, in a unified platform for today’s resource-constrained organizations. Supports Continuous Security Monitoring USM Anywhere constantly monitors your environment with capabilities that support continuous security monitoring of your environments. Combined with continuously updated threat intelligence, USM Anywhere provides optimal threat detection, incident response, and compliance management. Simplifies and Reduces the Cost of Compliance Security automation and orchestration enables different point solutions to work together, helping your teams manage incidents more efficiently. Built-in and customizable views and reports simplify review and compliance reporting.
  • 10. 10 Combines Five Security Essentials Vulnerability Assessment Know where the vulnerabilities are to avoid easy exploitation and compromise Incident Response Enable discovered threats to be quickly contained and/or mitigated Threat Detection Know when anomalies and suspicious activities happen in your environment SIEM, Log Management & Reporting Aggregate, retain and enable analysis of security event data from across your network into a HIPAA, PCI DSS & SOC 2 certified solution Asset Discovery Know who and what is connected to your cloud and on-premises environments at all times Unified Security Management from a single cloud-based pane of glass
  • 11. 11 Complete Cloud and On-Premises Monitoring Cloud Sensors On-Premises Sensors Monitor cloud environments and applications Monitor on-premises virtual and physical environments
  • 12. Continuously Updated Threat Intelligence Threat Intelligence Powered by AlienVault Labs Security Research • AlienVault researches emerging threats–so you don’t have to • Continuous Threat Intelligence updates built into your USM Anywhere include: • Correlation directives • IDS signatures • Vulnerability audits • Asset discovery signatures • IP reputation data • Data source plugins & AlienApps • Incident response guidance Supplemented by the AlienVault Open Threat Exchange™ (OTX) • FREE access to over 14 million threat indicators contributed daily • Collaborate with 65,000+ global participants to investigate emerging threats in the wild • Subscribe to threat research updates from other OTX contributors • Leverage the latest OTX threat intelligence directly in your AlienVault USM environment
  • 13. Cloud InfrastructureProductivity Apps IT VirtualizationIT OperationsIT Security A Growing “Galaxy” of AlienApps Respond Automate and orchestrate your threat responses for efficiency Monitor AlienApps collect and enrich data from your environment Detect USM Anywhere uses that data to detect threats and alerts you Security Automation & Orchestration Simplifies and Reduces the Cost of Compliance
  • 14. • Built-In Reports for PCI & HIPAA › Malware, Vulnerabilities, Failed Logons, and more • Reports Covering Key NIST Cybersecurity Framework (NIST CSF) Functions › Asset Management, Risk Management, Access Control, Audit/Log Records Review, Anomalies & Events, Security Continuous Monitoring, Detection Processes, and Analysis • Reports to Review Common Events › Events by Types of Data Source › Events by Data Source • Customizable Views with Hundreds of Available Fields Fast, Repeatable Reporting for Compliance & Security Best Practice Built-In & Customizable Reports
  • 15. 17 How USM Anywhere Works Hyper-V VMware AlienVault Threat Intelligence URLs Malware Samples File Hashes Domains IP Addresses PUBLIC CLOUD ON-PREMISES CLOUD APPS
  • 17. 19 Centrally Monitor All Your Environments Orchestrate & Automate Your Incident Response Leverage Integrated Threat Intelligence Save Time & Money with Unified Essentials Deploy Fast in the Cloud or in Your Data Center Five Reasons You’ll Love the AlienVault Approach
  • 18. Questions? Test Drive USM Anywhere in our Interactive, Online Demo: Get instant access, no download, no install https://www.alienvault.com/products/usm-anywhere/demo Try it for Free in your Environment : Start detecting threats in less than an hour https://www.alienvault.com/products/usm-anywhere/free-trial Review Pricing and Get a Quote: Multiple tiers available, low annual subscription pricing https://www.alienvault.com/products/usm-anywhere/pricing