SlideShare a Scribd company logo
7
Most read
12
Most read
22
Most read
McAfee Enterprise Security
Manager (ESM)
Security Information & Event Management (SIEM)
Iftikhar Ali Iqbal, CISSP, CCSP, CISM
https://www.linkedin.com/in/iftikhariqbal/
Valid till Jan 2020
2
AGENDA
Target
Partners &
RTM
1
2
3
Company Overview
Security Operations
Enterprise Security Manager (ESM)
4 Use Cases / Scenarios
OVERVIEW
Company and Portfolio
4
SOLUTIONS
SERVICES
OPEN
ARCHITECTURE
BRIEF
McAfee – the device-to-cloud
cybersecurity company – is one of the
largest pureplay cybersecurity companies
in the world, with 30+ years of market
leadership and 1,550+ patents worldwide.
CASB Connect
OpenDXL
MCAFEE: OVERVIEW
5
Portfolio Strategy
An Integrated And Open Security System
Threat Defense Lifecycle
Together, Is Far More Powerful Than Sum Of The Parts
SECURITY
OPERATIONS
DEVICE CLOUD
MANAGEMENT
THREAT INTELLIGENCE
ANALYTICS
AUTOMATION / ORCHESTRATION
INFRASTRUCTURE
MCAFEE: STRATEGY
6
SIEM:
Broad Data
Collection
Advanced
Analytics:
Risk scoring, anomaly
detection
SIEM:
Long-term
Compliance, archive &
forensics
SIEM:
Real-time correlation &
detection
SIEM:
Short-term
Search & hunting
Sandboxing:
Malware Analysis
EDR:
Endpoint telemetry,
process trace
SIEM
View all alerts,
coordinate action
Investigator:
Automated analysis,
guided investigation
EDR:
Response
Collaboration with 3rd party solutions
SIA Partner and Open
Solutions
Advanced Analytics Investigate and Act
Collect, Enrich, and Share
Data at any Scale
Turn Data into Insight
Data Platform
Expert-guided Investigation for Confident
Action
ATDESMESM
MAR/M
EDR
MAR
/MEDRSIA MVISION EDR
MCAFEE: SECURITY OPERATIONS
7
Time to
Identify
Time to
Investigate
Time to
Contain
Mean Time to Respond
(MTTR)
Mean Time to Detect
(MTTD)
3-15 Months
Dwell Time
SECOPS: CHALLENGE
ENTERPRISE SECURITY MANAGER (ESM)
Security Information & Event Management (SIEM)
9
Real Time Advanced Analytics
Threat and Risk Prioritization
INTELLIGENT
INTEGRATED
ACTIONABLE
Comprehensive Security
Broad Data Collection, Including Cloud Support
Security Connected Integrations
Active and Customizable Dashboards
High Performance Data Management Engine
Ease of Operation
!
ESM: STRATEGIC OVERVIEW
10
ESM: ESSENTIALS
CORRELATION
• Event Normalization
• Receiver & Advanced Correlation
• Real-Time & Historical ‘Modes’
• Rule & Risk ’Engines’
MANAGEMENT
• Dashboard Views
• Threat Management & Intelligence
• Content Packs (Use-Case Driven)
• Policies & Rules
ALARMS
• Visual and Auditory
• Text and Email
• Case Management
• Remote Commands
• Watchlist
DATA SOURCES
• Security Events
• Network Flow Data
• Multi-Vendor
• Various Types
• Multi Method
11
ESM: COMPONENTS
McAfee Enterprise Security Manager
McAfee Enterprise Log Manager
McAfee Application
Data Monitor
McAfee Database Security
McAfee Advanced Correlation Engine
McAfee Event Receivers
Adaptive Risk Analysis and
Historical Correlation
Integrated SIEM & Log
Management
Rich Application and
Database Context
Scalable Collection and
Distributed Correlation
TIE/DXL SIA PartnersePO GTINSM
Connected SolutionsIntegration and
Operational Efficiency
McAfee solutions empower organizations with visibility across systems, networks, and
data, helping counter threats and mitigate risks.
Physical & Virtual
Appliances
ATDMAR
12
Data Sources
Enterprise Security Manager
Application Data Monitor
Event Receiver
Advanced Correlation Engine
(Real Time)
Enterprise Log Manager
TIP
FW
SEG
DNS SEC
IPS
APT
CASB
Global
Threat Intelligence
Datacenter Security
for Databases
Advanced Correlation Engine
(Historical)
ESM: ARCHITECTURE
Enterprise Log Search
13
ePolicy Orchestrator
ICAP
SMTP
DLP Monitor
DLP Discover
DLP Prevent Web
DLP Prevent Email
DLP Prevent Mobile
Mobile Device Management
Secure Web Gateway
Egress Switch
MVISION Cloud
API
Threat Intelligence Exchange +
Data Exchange Layer +
Active Response Server
Web Gateway
(Pooled)
Load Balancer
McAfee Labs
Global Threat Intelligence (GTI)
Active Response – Cloud Storage
Agent Handlers
Next-Gen Endpoint Protection
Endpoint Security
Adaptive Threat Protection
Active Response
Data Loss Prevention
Device Control
DLP Endpoint
Data Classification
Web Proxy
Client Proxy
Physical Servers Virtual Servers
McAfee Agent
Next-Gen Server Protection
Endpoint Security for Servers
Adaptive Threat Protection
Active Response
Data Loss Prevention
DLP Endpoint
Data Classification
Web Proxy
Client Proxy
HEADQUARTERS – MAIN DATA CENTER
McAfee Agent
Endpoints
Next-Gen Endpoint Protection
Endpoint Security
Adaptive Threat Protection
Active Response
Device Control
Client Proxy
McAfee Agent
Endpoints
SITE # 1
Next-Gen Endpoint Protection
Endpoint Security
Adaptive Threat Protection
Active Response
Device Control
Client Proxy
McAfee Agent
Endpoints
SITE # 2
Active Directory
Rights Management Services (RMS)
Data Classification
Enterprise Security Manager
TIP FWSEG DNS SECIPSAPT CASB
ApplicationData Monitor
Event Receiver
Advanced CorrelationEngine
Enterprise Log Manager
`
DataSources
KafkaServiceBus
Security Operations Center (SOC)
14
ESM: INTEGRATIONS
OpenDXL
ePolicy Orchestrator
Advanced Threat Defense
(Malware Analysis)
Threat Intelligence Exchange
Active Response
MVISION EDR
USE CASES & SCENARIOS
16
ESM: USE CASES
SCENARIOS MANAGEMENT MCAFEE
SOLUTIONS
THIRD
PARTY
COMPLIANCE
BASEL II
EU 8th Directive
FISMA
GLBA
CPG 13
HIPAA
ISO 27002
NERC
PCI Compliance
SOX
.
.
.
Aruba
Cofense
Interset
PhishMe
ThreatConnect
Vormetric
.
.
.
Application Control
Change Control
Application Data Monitor
Database Activity
Database Event Monitor
General
Host Intrusion Prevention
Network Security Platform
Threat Intelligence
Web Gateway
.
.
.
Executive
Case Management
Hardware Health
.
.
.
User Behavior Analytics
Suspicious Activity
Exfiltration
Reconnaissance
Asset, Threat & Risk
Authentication
Doman Name Service (DNS)
Database
Denial-of-Service (DoS)
Domain Policy
Exploit
Firewall
Malware . . .
AlarmsViews ReportsCorrelation Rules WatchlistsData Sources
(Product)
17
ESM: USE CASES – User Behavioral Analytics (UBA)
• McAfee Advance Correlation Engine (ACE)
• McAfee Global Threat Intelligence
• Microsoft Windows Data Sources
DATA SOURCES / PRODUCTS
• Source User
• Risk Suspicious Geo Events
• User Behavior Events
VIEWS
• Security Groups
• Accounts Not Requiring a Password
• Accounts with Expired Password
• Computer Accounts
• Default Usernames
• .
• .
• .
WATCHLISTS
• Domain Policy x 10 Rules
• GTI x 2 Rules
• UBA x 13 Rules
• Windows Authentication x 8 Rules
CORRELATION RULES
Source User 1 Week
REPORTS
New User Logon Detected
ALARMS
18
McAfee Endpoint
Security
ESM
2
DXL Fabric
3
MAR
ESM: SCENARIO – ENDPOINT INCIDENT
Identify malware activity early in the kill chain
Security
Analyst
2 ESM correlation rule alerts security analysts to possible
attack using fileless techniques
4 Analyst performs validation with ELS and logs from
web gateway
Scenario Overview
5
Analyst performs scoping with Active Response
7 Analyst uses ESM to update Cyber Defense
Countermeasures via OpenDXL
8
1 ENS logs Powershell and Blocks MimiKatz
installation
Incident Identification
Incident Investigation
Analysts pivots around events and declares
incidents
6
Incident Containment
Endpoint, Server, Cloud DNS and Network
countermeasures are updated automatically via
OpenDXL
1
Analyst performs validation with Active Response and
ATD
4 5 6
7
8 8
Perimeter
Firewall
Data Center
Firewall
McAfee vIPS
Cloud Protection
8 8
McAfee Server Security
ATDELS
8
DNS Security
19
Time to
Detect
Time to
Investigate
Time to
Contain
Security
Effectiveness
Goals
Process
Efficiency
Goals
AVG 50% Process Automation with MTTR of under 10 Minutes
2 Analysts in this Use Case accessed 3 consoles only
Detection – ENS, ATP
Process Automation – 50%
Analysts – 1
Consoles - 1
Investigation – ESM, ELS, MAR and ATD
Process Automation – 25%
Analysts – 1
Consoles - 3
Containment – ESM, DXL, Third Party
Process Automation – 70%
Analysts – 1
Consoles - 1
ESM: SCENARIO - ENDPOINT RESULTS
20
Modern, scalable platform
for Sec Ops
Security focus from
day one
Deep, high-quality
integrations
Modular scale-out data platform makes costs predictable
Open source Kafka message bus removes data sharing tax
Out-of-the-box use cases and analytics that require less configuration and
professional support
Innovative advanced analytics for detection and investigation assistance
Tight integrations with other McAfee products
Expansive dashboarding, automation, and orchestration with 130 SIA
partners via DXL and direct capabilities
ESM: KEY POINTS
21
SECURITY OPERATIONS: OPEN & INTEGRATED
Local Threat
Intelligence
Reputation-based Protection
File and Certificates
STIX support
Collaborative Ecosystem
Data Exchange Layer
Global Threat
Intelligence (GTI)
Sec. Info. & Event Mgmt.
Integrated Log Management
Scalable Collection
Distributed Correlation
Adaptive Risk Analysis
Historical Correlation
Rich Application Context
Rich Database Context
Various Integrations
Integrations
Local Threat Intelligence
Advanced Threat Protection
Intrusion Prevention System
Endpoint Detection & Response
Security Orchestration
User & Entity Behavior
Machine Learning
User and Devices
McAfee SIEM & Non-McAfee
Remediation Actions
Incident Response
Evidence Collection
Investigation Guides
Coaching
SIEM Ingestion
THANK YOU

More Related Content

PPTX
McAfee SIEM solution
PPTX
EDR vs SIEM - The fight is on
PPTX
SIEM - Your Complete IT Security Arsenal
PDF
Forcepoint Dynamic Data Protection
PPTX
SIEM Primer:
PDF
IBM Security Strategy Overview
DOCX
Symantec Data Loss Prevention - Technical Proposal (General)
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
McAfee SIEM solution
EDR vs SIEM - The fight is on
SIEM - Your Complete IT Security Arsenal
Forcepoint Dynamic Data Protection
SIEM Primer:
IBM Security Strategy Overview
Symantec Data Loss Prevention - Technical Proposal (General)
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...

What's hot (20)

PPTX
Security Information and Event Management (SIEM)
PPTX
Beginner's Guide to SIEM
PPTX
Siem ppt
PPSX
Next-Gen security operation center
PDF
SIEM Architecture
PDF
IPS (intrusion prevention system)
PPTX
unified threat management by Nisha Menon K
PPTX
Dragos S4x20: How to Build an OT Security Operations Center
PPTX
SOAR and SIEM.pptx
PPTX
SOC Architecture Workshop - Part 1
PPTX
What is SIEM
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Cloud Security
PPTX
Operating Systems: Computer Security
PPTX
Azure Security Overview
PDF
IBM QRadar Security Intelligence Overview
PDF
Q radar architecture deep dive
PDF
Cloud Security: A New Perspective
PPTX
Understanding Privileged Access Management (PAM)
PPTX
Owasp top 10 vulnerabilities
Security Information and Event Management (SIEM)
Beginner's Guide to SIEM
Siem ppt
Next-Gen security operation center
SIEM Architecture
IPS (intrusion prevention system)
unified threat management by Nisha Menon K
Dragos S4x20: How to Build an OT Security Operations Center
SOAR and SIEM.pptx
SOC Architecture Workshop - Part 1
What is SIEM
From SIEM to SOC: Crossing the Cybersecurity Chasm
Cloud Security
Operating Systems: Computer Security
Azure Security Overview
IBM QRadar Security Intelligence Overview
Q radar architecture deep dive
Cloud Security: A New Perspective
Understanding Privileged Access Management (PAM)
Owasp top 10 vulnerabilities
Ad

Similar to McAfee - Enterprise Security Manager (ESM) - SIEM (20)

PDF
MID_SIEM_Boubker_EN
PDF
From SIEM to SA: The Path Forward
 
PPTX
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
PPTX
241_ATD_TUE_1430_EagleRockEnergy_final
PDF
4aa5 3404
PPTX
Esteban Próspero
PDF
ds-threat-intelligence-exchange
PDF
Complete Endpoint protection
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PDF
SIEM evaluator guide for soc analyst
PPTX
Automation: Embracing the Future of SecOps
PDF
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
PDF
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
PPTX
Threat Detection and Response Solutions
PDF
Data Security in Healthcare
PPTX
pr-host-intrusion-prevention-customer-presentation (5).pptx
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PPTX
Axxera Ppt
PPTX
Trellix ATD pr-advanced-threat-defense.pptx
PDF
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
MID_SIEM_Boubker_EN
From SIEM to SA: The Path Forward
 
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
241_ATD_TUE_1430_EagleRockEnergy_final
4aa5 3404
Esteban Próspero
ds-threat-intelligence-exchange
Complete Endpoint protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
SIEM evaluator guide for soc analyst
Automation: Embracing the Future of SecOps
Security Operation Center : Le Centre des Opérations de Sécurité est une div...
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
Threat Detection and Response Solutions
Data Security in Healthcare
pr-host-intrusion-prevention-customer-presentation (5).pptx
Security Outsourcing - Couples Counseling - Atif Ghauri
Axxera Ppt
Trellix ATD pr-advanced-threat-defense.pptx
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ad

More from Iftikhar Ali Iqbal (15)

PDF
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
PDF
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
DOCX
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
PDF
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
PPTX
McAfee - McAfee Application Control (MAC) - Whitelisting
PPTX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
PPTX
McAfee - Portfolio Overview
PPTX
Technology Overview - Validation & ID Protection (VIP)
PPTX
Technology Overview - Symantec IT Management Suite (ITMS)
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
Technology Overview - Symantec Endpoint Protection (SEP)
DOCX
Symantec Endpoint Encryption - Proof Of Concept Document
DOCX
Symantec Messaging Gateway - Technical Proposal (General)
PDF
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
PPTX
Symantec Portfolio - Sales Play
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Proposal
McAfee - McAfee Application Control (MAC) - Whitelisting
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - Portfolio Overview
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Endpoint Protection (SEP)
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Messaging Gateway - Technical Proposal (General)
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Portfolio - Sales Play

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Modernizing your data center with Dell and AMD
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
Modernizing your data center with Dell and AMD
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.

McAfee - Enterprise Security Manager (ESM) - SIEM

  • 1. McAfee Enterprise Security Manager (ESM) Security Information & Event Management (SIEM) Iftikhar Ali Iqbal, CISSP, CCSP, CISM https://www.linkedin.com/in/iftikhariqbal/ Valid till Jan 2020
  • 2. 2 AGENDA Target Partners & RTM 1 2 3 Company Overview Security Operations Enterprise Security Manager (ESM) 4 Use Cases / Scenarios
  • 4. 4 SOLUTIONS SERVICES OPEN ARCHITECTURE BRIEF McAfee – the device-to-cloud cybersecurity company – is one of the largest pureplay cybersecurity companies in the world, with 30+ years of market leadership and 1,550+ patents worldwide. CASB Connect OpenDXL MCAFEE: OVERVIEW
  • 5. 5 Portfolio Strategy An Integrated And Open Security System Threat Defense Lifecycle Together, Is Far More Powerful Than Sum Of The Parts SECURITY OPERATIONS DEVICE CLOUD MANAGEMENT THREAT INTELLIGENCE ANALYTICS AUTOMATION / ORCHESTRATION INFRASTRUCTURE MCAFEE: STRATEGY
  • 6. 6 SIEM: Broad Data Collection Advanced Analytics: Risk scoring, anomaly detection SIEM: Long-term Compliance, archive & forensics SIEM: Real-time correlation & detection SIEM: Short-term Search & hunting Sandboxing: Malware Analysis EDR: Endpoint telemetry, process trace SIEM View all alerts, coordinate action Investigator: Automated analysis, guided investigation EDR: Response Collaboration with 3rd party solutions SIA Partner and Open Solutions Advanced Analytics Investigate and Act Collect, Enrich, and Share Data at any Scale Turn Data into Insight Data Platform Expert-guided Investigation for Confident Action ATDESMESM MAR/M EDR MAR /MEDRSIA MVISION EDR MCAFEE: SECURITY OPERATIONS
  • 7. 7 Time to Identify Time to Investigate Time to Contain Mean Time to Respond (MTTR) Mean Time to Detect (MTTD) 3-15 Months Dwell Time SECOPS: CHALLENGE
  • 8. ENTERPRISE SECURITY MANAGER (ESM) Security Information & Event Management (SIEM)
  • 9. 9 Real Time Advanced Analytics Threat and Risk Prioritization INTELLIGENT INTEGRATED ACTIONABLE Comprehensive Security Broad Data Collection, Including Cloud Support Security Connected Integrations Active and Customizable Dashboards High Performance Data Management Engine Ease of Operation ! ESM: STRATEGIC OVERVIEW
  • 10. 10 ESM: ESSENTIALS CORRELATION • Event Normalization • Receiver & Advanced Correlation • Real-Time & Historical ‘Modes’ • Rule & Risk ’Engines’ MANAGEMENT • Dashboard Views • Threat Management & Intelligence • Content Packs (Use-Case Driven) • Policies & Rules ALARMS • Visual and Auditory • Text and Email • Case Management • Remote Commands • Watchlist DATA SOURCES • Security Events • Network Flow Data • Multi-Vendor • Various Types • Multi Method
  • 11. 11 ESM: COMPONENTS McAfee Enterprise Security Manager McAfee Enterprise Log Manager McAfee Application Data Monitor McAfee Database Security McAfee Advanced Correlation Engine McAfee Event Receivers Adaptive Risk Analysis and Historical Correlation Integrated SIEM & Log Management Rich Application and Database Context Scalable Collection and Distributed Correlation TIE/DXL SIA PartnersePO GTINSM Connected SolutionsIntegration and Operational Efficiency McAfee solutions empower organizations with visibility across systems, networks, and data, helping counter threats and mitigate risks. Physical & Virtual Appliances ATDMAR
  • 12. 12 Data Sources Enterprise Security Manager Application Data Monitor Event Receiver Advanced Correlation Engine (Real Time) Enterprise Log Manager TIP FW SEG DNS SEC IPS APT CASB Global Threat Intelligence Datacenter Security for Databases Advanced Correlation Engine (Historical) ESM: ARCHITECTURE Enterprise Log Search
  • 13. 13 ePolicy Orchestrator ICAP SMTP DLP Monitor DLP Discover DLP Prevent Web DLP Prevent Email DLP Prevent Mobile Mobile Device Management Secure Web Gateway Egress Switch MVISION Cloud API Threat Intelligence Exchange + Data Exchange Layer + Active Response Server Web Gateway (Pooled) Load Balancer McAfee Labs Global Threat Intelligence (GTI) Active Response – Cloud Storage Agent Handlers Next-Gen Endpoint Protection Endpoint Security Adaptive Threat Protection Active Response Data Loss Prevention Device Control DLP Endpoint Data Classification Web Proxy Client Proxy Physical Servers Virtual Servers McAfee Agent Next-Gen Server Protection Endpoint Security for Servers Adaptive Threat Protection Active Response Data Loss Prevention DLP Endpoint Data Classification Web Proxy Client Proxy HEADQUARTERS – MAIN DATA CENTER McAfee Agent Endpoints Next-Gen Endpoint Protection Endpoint Security Adaptive Threat Protection Active Response Device Control Client Proxy McAfee Agent Endpoints SITE # 1 Next-Gen Endpoint Protection Endpoint Security Adaptive Threat Protection Active Response Device Control Client Proxy McAfee Agent Endpoints SITE # 2 Active Directory Rights Management Services (RMS) Data Classification Enterprise Security Manager TIP FWSEG DNS SECIPSAPT CASB ApplicationData Monitor Event Receiver Advanced CorrelationEngine Enterprise Log Manager ` DataSources KafkaServiceBus Security Operations Center (SOC)
  • 14. 14 ESM: INTEGRATIONS OpenDXL ePolicy Orchestrator Advanced Threat Defense (Malware Analysis) Threat Intelligence Exchange Active Response MVISION EDR
  • 15. USE CASES & SCENARIOS
  • 16. 16 ESM: USE CASES SCENARIOS MANAGEMENT MCAFEE SOLUTIONS THIRD PARTY COMPLIANCE BASEL II EU 8th Directive FISMA GLBA CPG 13 HIPAA ISO 27002 NERC PCI Compliance SOX . . . Aruba Cofense Interset PhishMe ThreatConnect Vormetric . . . Application Control Change Control Application Data Monitor Database Activity Database Event Monitor General Host Intrusion Prevention Network Security Platform Threat Intelligence Web Gateway . . . Executive Case Management Hardware Health . . . User Behavior Analytics Suspicious Activity Exfiltration Reconnaissance Asset, Threat & Risk Authentication Doman Name Service (DNS) Database Denial-of-Service (DoS) Domain Policy Exploit Firewall Malware . . . AlarmsViews ReportsCorrelation Rules WatchlistsData Sources (Product)
  • 17. 17 ESM: USE CASES – User Behavioral Analytics (UBA) • McAfee Advance Correlation Engine (ACE) • McAfee Global Threat Intelligence • Microsoft Windows Data Sources DATA SOURCES / PRODUCTS • Source User • Risk Suspicious Geo Events • User Behavior Events VIEWS • Security Groups • Accounts Not Requiring a Password • Accounts with Expired Password • Computer Accounts • Default Usernames • . • . • . WATCHLISTS • Domain Policy x 10 Rules • GTI x 2 Rules • UBA x 13 Rules • Windows Authentication x 8 Rules CORRELATION RULES Source User 1 Week REPORTS New User Logon Detected ALARMS
  • 18. 18 McAfee Endpoint Security ESM 2 DXL Fabric 3 MAR ESM: SCENARIO – ENDPOINT INCIDENT Identify malware activity early in the kill chain Security Analyst 2 ESM correlation rule alerts security analysts to possible attack using fileless techniques 4 Analyst performs validation with ELS and logs from web gateway Scenario Overview 5 Analyst performs scoping with Active Response 7 Analyst uses ESM to update Cyber Defense Countermeasures via OpenDXL 8 1 ENS logs Powershell and Blocks MimiKatz installation Incident Identification Incident Investigation Analysts pivots around events and declares incidents 6 Incident Containment Endpoint, Server, Cloud DNS and Network countermeasures are updated automatically via OpenDXL 1 Analyst performs validation with Active Response and ATD 4 5 6 7 8 8 Perimeter Firewall Data Center Firewall McAfee vIPS Cloud Protection 8 8 McAfee Server Security ATDELS 8 DNS Security
  • 19. 19 Time to Detect Time to Investigate Time to Contain Security Effectiveness Goals Process Efficiency Goals AVG 50% Process Automation with MTTR of under 10 Minutes 2 Analysts in this Use Case accessed 3 consoles only Detection – ENS, ATP Process Automation – 50% Analysts – 1 Consoles - 1 Investigation – ESM, ELS, MAR and ATD Process Automation – 25% Analysts – 1 Consoles - 3 Containment – ESM, DXL, Third Party Process Automation – 70% Analysts – 1 Consoles - 1 ESM: SCENARIO - ENDPOINT RESULTS
  • 20. 20 Modern, scalable platform for Sec Ops Security focus from day one Deep, high-quality integrations Modular scale-out data platform makes costs predictable Open source Kafka message bus removes data sharing tax Out-of-the-box use cases and analytics that require less configuration and professional support Innovative advanced analytics for detection and investigation assistance Tight integrations with other McAfee products Expansive dashboarding, automation, and orchestration with 130 SIA partners via DXL and direct capabilities ESM: KEY POINTS
  • 21. 21 SECURITY OPERATIONS: OPEN & INTEGRATED Local Threat Intelligence Reputation-based Protection File and Certificates STIX support Collaborative Ecosystem Data Exchange Layer Global Threat Intelligence (GTI) Sec. Info. & Event Mgmt. Integrated Log Management Scalable Collection Distributed Correlation Adaptive Risk Analysis Historical Correlation Rich Application Context Rich Database Context Various Integrations Integrations Local Threat Intelligence Advanced Threat Protection Intrusion Prevention System Endpoint Detection & Response Security Orchestration User & Entity Behavior Machine Learning User and Devices McAfee SIEM & Non-McAfee Remediation Actions Incident Response Evidence Collection Investigation Guides Coaching SIEM Ingestion