SlideShare a Scribd company logo
Rapid7 & LogRythym Webcast:
Get Real-Time Cyber Threat
Protection with Risk Management
and SIEM
Dana Wolf
Director of
Products, Rapid7
Presenters
2
Seth Goldhammer
Director of Product
Management,
LogRhythym
Speed With Control
Dana Wolf, Director of Products
Meaningful progress in security?
4
5
Challenges to Forward Progress
Lack of relevant, right-time information
6
Lack of decision-making framework
7
Hard to get others to take action or change
8
IT Guy
You mean patch
ADOBE?
Fix CVE 456?
Under resourced and over stretched
9
10
Visibility through the chaos
11
The Rapid7 Solution: Speed with Control for You
12
Brain-dead Simple Remediation Time-Saving Automation
Rapid7’s Solution: Security Programs
13
Decision Making Frameworks
(Real Risk, Policy & Compliance)
Offensive Security
Infrastructure
Fingerprinting
Applications
Configuration,
Vulnerability
Content
Remediation Guidance
Security Program TrendingSecurity
Testing
Business
Context
SecurityPrograms
Threat &
Exploit
Information
Rapid7 & LogRhythm Joint solutions
Efficiency & Right-Time information in Monitoring
14
Rapid7 focused on assessing the risk in your organization
based on state of the environment
LogRhythm focused on monitoring activities in real-time
Content from Rapid7’s portfolio adds context to
LogRhythm’s monitoring analytics
• OS, Vulnerability, Services, Applications, etc.
• Exploits, Malware kits, etc.
Assessment & Monitoring
15
Let Us Get You Started
16
Get Real-Time Cyber Threat
Protection with Risk
Management and SIEM
LogRhythm
Rapid7
2012 Verizon Breach Report – Key Stats
• The number of compromised records across these incidents
skyrocketed
• “We will likely continue to see the perpetrators utilize such
vulnerabilities as the path of least resistance to gain
unauthorized entry”
• “92% of incidents were discovered by a third party” (Up 6%
from previous year)
• “Monitor and mine event logs” critical for large organizations
• “Anomaly detection is active in the conversation and growing
in importance.”
ent.heisler COMP=VENUS SORC=Security CATG=Logon/Logoff EVID=540
Logon ID: (0x0,0x9BDC1AFD) Logon Type: 3 Logon Process:
GUID: {0e9506c5-1c90-769c-d69f-933db4f52454} Caller User Name: - Caller
Source Network Address: - Source Port:
ryce.griswold COMP=VENUS SORC=Security CATG=Logon/Logoff EVID=540
OX Logon ID: (0x0,0x9BDC1B32) Logon Type: 3 Logon Process:
08 AM TYPE=SuccessAudit USER=SANDBOXanthony.mack COMP=VENUS SORC=Sec
cessful Network Logon:
anthony.mack Domain: SANDBOX Logon ID: (0x0,0x9BDC86
eros Authentication
Kerberos Workstation Name: Logon GUID: {4899467d-7bea-9b95-1da5-ff948b
- Caller
- Caller Process ID: - Transited Services: - Source Network Address: -
11 9:08 AM TYPE=SuccessAudit USER=SANDBOXanthony.mack COMP=VENUS SORC=
Successful Network Logon:
ame: anthony.mack Domain: SANDBOX Logon ID: (0x0,0x9BD
Kerberos Authentication
e: Kerberos Workstation Name: Logon GUID: {4899467d-7bea-9b95-1da5-ff9
0100101001100100111001100100100101010011100100101011001001001001001100101
0100101001100100111001100100100101010011100100101011001001001001001100101
0100101001100100111001100100100101010011100100101011001001001001001100101
0100101001100100111001100100100101010011100100101011001001001001001100101
0100101001100100111001100100100101010011100100101011001001001001001100101
0100101001100100111001100100100101010011100100101011001001001001001100101
0100101001100100111001100100100101010011100100101011001001001001001100101
0100101001100100111001100100100101010011100100101011001001001001001100101
100100100100100110010101001110101010110101010101001001001001001000011
100100100100100110010101001110101010110101010101001001001001001000011
100100100100100110010101001110101010110101010101001001001001001000011
100100100100100110010101001110101010110101010101001001001001001000011
100100100100100110010101001110101010110101010101001001001001001000011
100100100100100110010101001110101010110101010101001001001001001000011
100100100100100110010101001110
100100100100100110010101001110
Compromised Credentials
Suspicious Privileged User Activity
Reconnaissance Followed by Attack
Critical Service Failed
Brute Force Attack
Malicious Content Observed
Unauthorized Network Connection Opened
Zero Day Exploit Detected
Host Compromised
Medical Records Breached
Credit Card Data TransferredUnauthorized Access of ePHI
Understanding ‘Normal’
User
Identity
Access
Privilege
External Context
Threat Intelligence
IP Reputation
GeoLocation
Application
Access
Transactions
Error
Behavior
Host
Process
Access
File Activity
Resources
Internal Context
Business Value
Asset Classification
Risk Rating
Vulnerability
Network
Connection
Direction
Content
Volume
Manual discovery of what’s
normal network activity is
impractical due to the sheer
volume of data across multiple
types of dimensions.
An unmanageable volume of false positives
based on benign anomalies
Significant blind spots / false negatives
Need an automated technology
to learn behavioral attributes
across multiple dimensions
Normal
What is multi-dimensional?
• Multiple dimensions of behavior can be observed
• Multiple techniques through which behavior can be modeled
• Multiple behaviors can be modeled in a single rule
Why is this important
• We can align the behavior we want to model with the ideal analysis technique.
• We can reduce false positives by identifying multiple behavioral changes indicating
a highly corroborated event.
• We enable customers to see behavioral changes they’ve been blind to, enabling the
detection of a new class of events.
Multi-Dimensional Behavioral Analytics(MDBA)
Log
Manager
Log
Manager
LogRhythm Components
Network and Security Devices
Routers
Switches
Next Gen Firewalls
IDS/IPS
VPN
Flow
Hosts and Applications
Operating System
Applications
Databases
Others
Vulnerability Data
Physical Card Access
Point of Sale
Etc.
Log
Managers
LogRhythm System Monitor
File Integrity Monitoring
File Activity Monitoring
Database Activity Monitoring
Process Monitoring
Network Connection Monitoring
Event
Manager
Events
Advanced
Intelligence
Engine
All Log, Flow and
Event Data
Events
Intelligence
Alerts
SmartResponse™
• In memory processing of all log and flow data
• Correlation, pattern recognition, and behavioral analysis
• No blind spots – accurate recognition of compromised accounts and hosts, fraud, misuse,
data exfiltration, etc
Reports
Real-Time Big Data Security Analysis
1. Vulnerability data collected from Rapid7
Nexpose and Metasploit products
2. For every message, LogRhythm:
• Collects
• Classifies
• GeoTags
• Recognizes Events
• Assigns Risk Prioritization
• Stores log and event data for long term retention
• Applies behavioral analysis techniques
• Performs correlation across data sources
3. Triggers SmartResponse actions when applicable
Integration
Use Cases:
• Security Risk Assessment
• Sophisticated Intrusions
• Zero Day Confirmation
• Compliance Violations
Quick Investigations and Forensics
• Invaluable insight into internal behavior, potential risks and imminent threats
• Quick root cause analysis; Identify sources of attacks
• Recognize breach scope
• Appropriate presentation for key stake holders
Knowledge Experts in:
 Advanced threat detection & response
 Industry and governmental regulations
 Compliance automation and assurance
 Log and event taxonomies and normalization
 Advanced correlation and rules development
 Incident response
Providing Out-of-the-Box & Continuously Updated Embedded Expertise
 Layouts designed to present the right information to the right people at the right time
 Executive Views
 Compliance-specific Dashboards
 Role-based Analyst Screens
 Pre-defined forensic investigations accelerate root cause analysis and impact discovery
 Comprehensive library of ready-to-use analytic rule sets & alarms enables immediate use for the detection of threats, breaches and compliance
violations
 SmartResponse™ plug-ins accelerate response and reduce the impact of actionable events
Example Use Cases
Prioritizing Attack Data
Identify Zero Day
Attacks
Quick Remediation
Identifies
vulnerability state of
host
Correlates IDS and
Malware to detected
vulnerabilities
Alert on attacks to
known vulnerabilities
Recognizes
susceptible attacks
Scans for attack
behavior pattern
Alert on matches for
attempted attacks
Maintains library of
custom, accurate
remediation steps
Identifies highly
suspicious series of
anomalies
Triggers immediate scan
with associated, specific
remediation steps
Get Real-Time Cyber Threat Protection with Risk Management and SIEM

More Related Content

PPTX
Sophos EndUser Protection
PPTX
Security Information and Event Management (SIEM)
PPTX
Network Security
PPTX
Deep visibility to secure network access with aruba ClearPass Insight
PPTX
Netpluz Managed SOC - MSS Service
PPTX
Endpoint Protection
PDF
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Sophos EndUser Protection
Security Information and Event Management (SIEM)
Network Security
Deep visibility to secure network access with aruba ClearPass Insight
Netpluz Managed SOC - MSS Service
Endpoint Protection
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires

What's hot (20)

PPTX
The next generation of IT security
PDF
penetration testing
PPTX
Security operation center (SOC)
PDF
Network Architecture Review Checklist
PPT
Information security in todays world
PPT
Palo alto networks next generation firewalls
PDF
Introduction to Cybersecurity
PPT
Information Security
PDF
Forcepoint Dynamic Data Protection
PPTX
Cyber attacks and IT security management in 2025
PPTX
Authentication, authorization, accounting(aaa) slides
PPTX
What is a secure enterprise architecture roadmap?
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPTX
Introduction to information security
PPT
Network Security
PPT
Security audit
PPTX
IBM QRadar BB & Rules
PDF
Cyber Security Governance
PPTX
Fortinet Corporate Overview Deck.pptx
PPTX
The CIA triad.pptx
The next generation of IT security
penetration testing
Security operation center (SOC)
Network Architecture Review Checklist
Information security in todays world
Palo alto networks next generation firewalls
Introduction to Cybersecurity
Information Security
Forcepoint Dynamic Data Protection
Cyber attacks and IT security management in 2025
Authentication, authorization, accounting(aaa) slides
What is a secure enterprise architecture roadmap?
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Introduction to information security
Network Security
Security audit
IBM QRadar BB & Rules
Cyber Security Governance
Fortinet Corporate Overview Deck.pptx
The CIA triad.pptx
Ad

Viewers also liked (9)

PPTX
OpenSSL Heartbleed Vulnerability Explained & Tips for Protection
PPTX
How to Manage Your Security Control's Effectiveness
PDF
How to Sell Security to Your CIO
PPTX
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
PPTX
Penetration Testing Techniques - DREAD Methodology
PDF
Rapid7 NERC-CIP Compliance Guide
PDF
Introducing Data Loss Prevention 14
PPTX
Data Loss Prevention from Symantec
PPT
Integrating Physical And Logical Security
OpenSSL Heartbleed Vulnerability Explained & Tips for Protection
How to Manage Your Security Control's Effectiveness
How to Sell Security to Your CIO
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Penetration Testing Techniques - DREAD Methodology
Rapid7 NERC-CIP Compliance Guide
Introducing Data Loss Prevention 14
Data Loss Prevention from Symantec
Integrating Physical And Logical Security
Ad

Similar to Get Real-Time Cyber Threat Protection with Risk Management and SIEM (20)

PDF
LogRhythm Overview Data Sheet
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
PDF
Scalar Security Roadshow April 2015
PDF
Preventing The Next Data Breach Through Log Management
PDF
Threat Life Cycle Management
PPTX
Automation: Embracing the Future of SecOps
PPT
Information Security
PDF
IT security solutions
PPTX
Dncybersecurity
PPT
Core.co.enterprise.deck.06.16.10
PDF
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
PDF
Seattle Tech4Good meetup: Data Security and Privacy
PDF
8 Reasons to Choose Logrhythm
PPTX
Network Security of Data Protection
PDF
Security Automation and Orchestration
PPTX
Karunia Wijaya - Proactive Incident Handling
PPTX
Secure Iowa Oct 2016
PDF
Elastic SIEM (Endpoint Security)
PPT
Cyber crime with privention
LogRhythm Overview Data Sheet
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow April 2015
Preventing The Next Data Breach Through Log Management
Threat Life Cycle Management
Automation: Embracing the Future of SecOps
Information Security
IT security solutions
Dncybersecurity
Core.co.enterprise.deck.06.16.10
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
Seattle Tech4Good meetup: Data Security and Privacy
8 Reasons to Choose Logrhythm
Network Security of Data Protection
Security Automation and Orchestration
Karunia Wijaya - Proactive Incident Handling
Secure Iowa Oct 2016
Elastic SIEM (Endpoint Security)
Cyber crime with privention

More from Rapid7 (13)

PDF
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
PDF
Life's a Breach: Yahoo Gets Burned by SQL Injection
PDF
Rapid7 Report: Data Breaches in the Government Sector
PDF
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
PDF
Rapid7 CAG Compliance Guide
PDF
Rapid7 FISMA Compliance Guide
PDF
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
PDF
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
PDF
IT Security in Higher Education
PDF
Protecting Patient Health Information in the HITECH Era
PDF
The Dynamic Nature of Virtualization Security
PDF
What is Penetration Testing?
PDF
Combating Phishing Attacks
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
Life's a Breach: Yahoo Gets Burned by SQL Injection
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 CAG Compliance Guide
Rapid7 FISMA Compliance Guide
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
IT Security in Higher Education
Protecting Patient Health Information in the HITECH Era
The Dynamic Nature of Virtualization Security
What is Penetration Testing?
Combating Phishing Attacks

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Tartificialntelligence_presentation.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mushroom cultivation and it's methods.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Web App vs Mobile App What Should You Build First.pdf
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Heart disease approach using modified random forest and particle swarm optimi...
WOOl fibre morphology and structure.pdf for textiles
A comparative study of natural language inference in Swahili using monolingua...
DP Operators-handbook-extract for the Mautical Institute
cloud_computing_Infrastucture_as_cloud_p
Tartificialntelligence_presentation.pptx
A comparative analysis of optical character recognition models for extracting...
TLE Review Electricity (Electricity).pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Getting Started with Data Integration: FME Form 101
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Mushroom cultivation and it's methods.pdf

Get Real-Time Cyber Threat Protection with Risk Management and SIEM

  • 1. Rapid7 & LogRythym Webcast: Get Real-Time Cyber Threat Protection with Risk Management and SIEM
  • 2. Dana Wolf Director of Products, Rapid7 Presenters 2 Seth Goldhammer Director of Product Management, LogRhythym
  • 3. Speed With Control Dana Wolf, Director of Products
  • 6. Lack of relevant, right-time information 6
  • 8. Hard to get others to take action or change 8 IT Guy You mean patch ADOBE? Fix CVE 456?
  • 9. Under resourced and over stretched 9
  • 10. 10
  • 12. The Rapid7 Solution: Speed with Control for You 12 Brain-dead Simple Remediation Time-Saving Automation
  • 13. Rapid7’s Solution: Security Programs 13 Decision Making Frameworks (Real Risk, Policy & Compliance) Offensive Security Infrastructure Fingerprinting Applications Configuration, Vulnerability Content Remediation Guidance Security Program TrendingSecurity Testing Business Context SecurityPrograms Threat & Exploit Information
  • 14. Rapid7 & LogRhythm Joint solutions Efficiency & Right-Time information in Monitoring 14
  • 15. Rapid7 focused on assessing the risk in your organization based on state of the environment LogRhythm focused on monitoring activities in real-time Content from Rapid7’s portfolio adds context to LogRhythm’s monitoring analytics • OS, Vulnerability, Services, Applications, etc. • Exploits, Malware kits, etc. Assessment & Monitoring 15
  • 16. Let Us Get You Started 16
  • 17. Get Real-Time Cyber Threat Protection with Risk Management and SIEM LogRhythm Rapid7
  • 18. 2012 Verizon Breach Report – Key Stats • The number of compromised records across these incidents skyrocketed • “We will likely continue to see the perpetrators utilize such vulnerabilities as the path of least resistance to gain unauthorized entry” • “92% of incidents were discovered by a third party” (Up 6% from previous year) • “Monitor and mine event logs” critical for large organizations • “Anomaly detection is active in the conversation and growing in importance.”
  • 19. ent.heisler COMP=VENUS SORC=Security CATG=Logon/Logoff EVID=540 Logon ID: (0x0,0x9BDC1AFD) Logon Type: 3 Logon Process: GUID: {0e9506c5-1c90-769c-d69f-933db4f52454} Caller User Name: - Caller Source Network Address: - Source Port: ryce.griswold COMP=VENUS SORC=Security CATG=Logon/Logoff EVID=540 OX Logon ID: (0x0,0x9BDC1B32) Logon Type: 3 Logon Process: 08 AM TYPE=SuccessAudit USER=SANDBOXanthony.mack COMP=VENUS SORC=Sec cessful Network Logon: anthony.mack Domain: SANDBOX Logon ID: (0x0,0x9BDC86 eros Authentication Kerberos Workstation Name: Logon GUID: {4899467d-7bea-9b95-1da5-ff948b - Caller - Caller Process ID: - Transited Services: - Source Network Address: - 11 9:08 AM TYPE=SuccessAudit USER=SANDBOXanthony.mack COMP=VENUS SORC= Successful Network Logon: ame: anthony.mack Domain: SANDBOX Logon ID: (0x0,0x9BD Kerberos Authentication e: Kerberos Workstation Name: Logon GUID: {4899467d-7bea-9b95-1da5-ff9 0100101001100100111001100100100101010011100100101011001001001001001100101 0100101001100100111001100100100101010011100100101011001001001001001100101 0100101001100100111001100100100101010011100100101011001001001001001100101 0100101001100100111001100100100101010011100100101011001001001001001100101 0100101001100100111001100100100101010011100100101011001001001001001100101 0100101001100100111001100100100101010011100100101011001001001001001100101 0100101001100100111001100100100101010011100100101011001001001001001100101 0100101001100100111001100100100101010011100100101011001001001001001100101 100100100100100110010101001110101010110101010101001001001001001000011 100100100100100110010101001110101010110101010101001001001001001000011 100100100100100110010101001110101010110101010101001001001001001000011 100100100100100110010101001110101010110101010101001001001001001000011 100100100100100110010101001110101010110101010101001001001001001000011 100100100100100110010101001110101010110101010101001001001001001000011 100100100100100110010101001110 100100100100100110010101001110 Compromised Credentials Suspicious Privileged User Activity Reconnaissance Followed by Attack Critical Service Failed Brute Force Attack Malicious Content Observed Unauthorized Network Connection Opened Zero Day Exploit Detected Host Compromised Medical Records Breached Credit Card Data TransferredUnauthorized Access of ePHI
  • 20. Understanding ‘Normal’ User Identity Access Privilege External Context Threat Intelligence IP Reputation GeoLocation Application Access Transactions Error Behavior Host Process Access File Activity Resources Internal Context Business Value Asset Classification Risk Rating Vulnerability Network Connection Direction Content Volume Manual discovery of what’s normal network activity is impractical due to the sheer volume of data across multiple types of dimensions. An unmanageable volume of false positives based on benign anomalies Significant blind spots / false negatives Need an automated technology to learn behavioral attributes across multiple dimensions Normal
  • 21. What is multi-dimensional? • Multiple dimensions of behavior can be observed • Multiple techniques through which behavior can be modeled • Multiple behaviors can be modeled in a single rule Why is this important • We can align the behavior we want to model with the ideal analysis technique. • We can reduce false positives by identifying multiple behavioral changes indicating a highly corroborated event. • We enable customers to see behavioral changes they’ve been blind to, enabling the detection of a new class of events. Multi-Dimensional Behavioral Analytics(MDBA)
  • 22. Log Manager Log Manager LogRhythm Components Network and Security Devices Routers Switches Next Gen Firewalls IDS/IPS VPN Flow Hosts and Applications Operating System Applications Databases Others Vulnerability Data Physical Card Access Point of Sale Etc. Log Managers LogRhythm System Monitor File Integrity Monitoring File Activity Monitoring Database Activity Monitoring Process Monitoring Network Connection Monitoring Event Manager Events Advanced Intelligence Engine All Log, Flow and Event Data Events Intelligence Alerts SmartResponse™ • In memory processing of all log and flow data • Correlation, pattern recognition, and behavioral analysis • No blind spots – accurate recognition of compromised accounts and hosts, fraud, misuse, data exfiltration, etc Reports Real-Time Big Data Security Analysis
  • 23. 1. Vulnerability data collected from Rapid7 Nexpose and Metasploit products 2. For every message, LogRhythm: • Collects • Classifies • GeoTags • Recognizes Events • Assigns Risk Prioritization • Stores log and event data for long term retention • Applies behavioral analysis techniques • Performs correlation across data sources 3. Triggers SmartResponse actions when applicable Integration Use Cases: • Security Risk Assessment • Sophisticated Intrusions • Zero Day Confirmation • Compliance Violations
  • 24. Quick Investigations and Forensics • Invaluable insight into internal behavior, potential risks and imminent threats • Quick root cause analysis; Identify sources of attacks • Recognize breach scope • Appropriate presentation for key stake holders
  • 25. Knowledge Experts in:  Advanced threat detection & response  Industry and governmental regulations  Compliance automation and assurance  Log and event taxonomies and normalization  Advanced correlation and rules development  Incident response Providing Out-of-the-Box & Continuously Updated Embedded Expertise  Layouts designed to present the right information to the right people at the right time  Executive Views  Compliance-specific Dashboards  Role-based Analyst Screens  Pre-defined forensic investigations accelerate root cause analysis and impact discovery  Comprehensive library of ready-to-use analytic rule sets & alarms enables immediate use for the detection of threats, breaches and compliance violations  SmartResponse™ plug-ins accelerate response and reduce the impact of actionable events
  • 26. Example Use Cases Prioritizing Attack Data Identify Zero Day Attacks Quick Remediation Identifies vulnerability state of host Correlates IDS and Malware to detected vulnerabilities Alert on attacks to known vulnerabilities Recognizes susceptible attacks Scans for attack behavior pattern Alert on matches for attempted attacks Maintains library of custom, accurate remediation steps Identifies highly suspicious series of anomalies Triggers immediate scan with associated, specific remediation steps