SlideShare a Scribd company logo
RSA-Pivotal Security Big Data
Reference Architecture

RSA & Pivotal combine to help security teams
detect threats quicker and speed up response
ESSENTIALS
RSA and Pivotal are combining to
help customers get:
•

Better visibility into what’s
happening in their
environments

•

Actionable intelligence from
a diverse set of internal and
external sources

Despite significant investment in information security, attackers appear to have the
upper hand. According to the Verizon Data Breach Investigations report (2013), 97
percent of breaches led to data compromise within “days” or less, whereas 78 percent
of breaches took “weeks” or more to discover.
•

Attackers are becoming more organized and better funded. But while
attacks have become dynamic, defenses have remained static. Today’s

More contextual analytics to
help them prioritize issues

•

ATTACKERS STILL HAVE THE UPPER HAND

attacks are designed to exploit the weaknesses of our user-centric, hyperconnected infrastructures.
•

IT-enabled organizations continue to grow more complex.

Organizations now demand much more open and agile systems, creating
incredible new opportunities for collaboration, communication, and innovation.
This also results in new vulnerabilities that cyber criminals, “hacktivist” groups,
and nation states have learned to exploit.
•

There are often not enough skilled security professionals to help
organizations protect themselves effectively. The 2013 (ISC)2 Global
Information Security Workforce Study found that 56% of its respondents
believe that there is a security workforce shortage

To reverse the tide and protect their organizations better, security teams need a few
things. They need:
•

Better visibility into what’s happening in their environments, from their
networks, to their servers to their applications and endpoints.

•

More contextual analytics of what’s going on to help them prioritize issues
more effectively and concentrate more resources on those issues that are
more likely to impact their business

•

Actionable intelligence from diverse sources, both internal and external, to
tell the system what to look for in a more automated way, and help them
respond quicker

•

An architecture that scales to support the business as it grows and evolves

RSA and Pivotal have worked together to create an architecture that truly helps
security teams to fulfill these needs, and help speed up attack detection and response
times, and reducing the impact of attacks on organizations. Moreover this approach
creates a platform that can be used for a myriad of other use case across IT
operations and the enterprise.
SOLUTION OVERVIEW
VISIBILITY IS THE FOUNDATION FOR
SUPERIOR ANALYTICS
RSA and Pivotal provide unparalleled visibility into user and system activity across the
IT environment. RSA Security Analytics provides a collection infrastructure that can
provides full visibility into
•

Network Activity by performing full packet capture, session
reconstruction and analysis of packet data

•

Log Data by collecting log and event data from devices and applications
that support business and IT activity.

Collection occurs through the deployment of “decoder” devices topographically close
of the systems generating the data, either through a span port or tap (in the case of
packets) or through common system protocols including syslog, SNMP, ODBC or
proprietary protocols.
RSA Security Analytics also integrates with systems that collect contextual information
like
•

Asset data – this includes the collection of technical configuration data, as
well as business context like what business processes the system supports,
or the criticality of the system

•

Vulnerability data – data which can add additional context to an
investigation (e.g. when the system was last scanned and what
vulnerabilities were present) or to help prioritize response to attacks on
vulnerable systems

•

Identity data – additional contextual information about the user, their
location, their job function and the privileges they have.

RSA Security Analytics enriches the log and network data it captures with this
contextual information to aid in the “downstream” processing of that data, either in
the detection or investigation of threats

Fig 1. Security Analytics High Level Architecture
ANALYTICS THROUGHOUT THE INFORMATION
LIFECYCLE STREAMLINE DETECTION AND
INVESTIGATION
RSA and Pivotal combine to provide numerous types of analytics, needed to spot threats
at different times in the information lifecycle. The three main types of analytics provided
are:
•

Capture time analytics – to identify interesting characteristics of data right at
the time of capture. This includes:
o

Basic characteristics – e.g. source IP, destination IP, username, log
action, etc.

o

Interesting characteristics – e.g. such use of encryption, executable
files, administrative users, administrative commands

o

Indicators of compromise – e.g. known bad IPs, known bad protocols,
watchlist users

Security Analytics creates “metadata” out of these interesting characteristics
that can be used for further analytics or to facilitate investigations
•

Streaming analytics – to analyze metadata in real time to spot concurrent
sessions or actions happening over a short time window that might be an
indicator of a threat. This metadata could be log-based, network-based or from
another contextual source. Examples include:
o

Basic SIEM-like correlation rules: like 5 failed logons followed by a
successful logon

o

Compound indicators of compromise: like a user downloading suspect
JavaScript at around the same time as an encrypted session to a
blacklisted country

o

Hybrid log & network rules: like malformed traffic bound for a host at
around the same time as encrypted traffic to a blacklisted country

Streaming analytics can be based on combinations of events or deviations from
a “baseline” normal count of a piece of metadata. Streaming analytics
appliances need not be deployed right at the point of data collection, but can be
deployed in parallel throughout the environment for enhanced scalability.
•

Batch analytics – to identify “low and slow” type attacks, and patterns that
occur over extended periods of time. Batch analytics is performed by the RSA
Security Analytics Warehouse, which has Pivotal HD at its core. Pivotal uses
proven Hadoop and other Big Data technologies, and the Pivotal Data Science
Labs team to enable different analytic techniques including:
o

Rules based pattern matching

o

Cluster analysis

o

Anomaly detection

o

Machine learning

Batch analytics and these advanced methods facilitate use cases such as
malicious domain detection, beaconing host detection, and anomalous user
behavior detection.
In addition, RSA Security Analytics provides a log archiving capability to allow
organizations to satisfy retention and reporting requirements, but store the data in a
cost-effective manner
ANALYTIC METHODS COMBINE TO FACILITATE
ADVANCED SOC ACTIONS
Threat analysts need a combination of capture time, stream and batch analytics to
detect and investigate a full range of threats. Each of these methods combine to
support a number of workstreams common in a security operations center, like:
•

Visualizing heat maps of issues across an organization by business unit or
profile

•

Profiling systems or devices for indicators of risk

•

Prioritizing alerts when a particular critical business asset or user exhibits
multiple suspicious characteristics over a week-long period

•

Providing investigative context after an alert gets triggered to determine
the cause or impact of an issue, e.g. if the user downloaded an executable
prior to the alert, or the IP accessed a critical asset after triggering the
alert

In addition, using Pivotal and Hadoop, and the Pivotal Data Science Labs team offers
the potential to add additional capabilities like:
•

Predictive modeling – using visibility and context to predict where issues
are likely to occur

•

Analyst feedback loops – allowing analysts to provide feedback whether
they think a particular alert warrants follow-up, and allowing the system to
learn that for future alerts

DISTRIBUTED ARCHITECTURE ALLOWS FOR
ENTERPRISE SCALABILITY AND DEPLOYMENT
Many systems have claimed to offer this functionality, but have failed. This is because
older architecture using old database technologies and proprietary data stores don’t
work. More analytical compute power than ever is needed to analyze the data, but this
needs to be provided cost effectively.
Pivotal and RSA have teamed up to create a Security Analytics platform that provides
an architecture that deploys components throughout the environment in order to
provide superior scalability and deployability, and the ability to deploy the platform in
a modular way to suit an organization’s unique use cases.
•

Collection and Capture-Time Analytics get deployed close to where the
activity occurs. This allows the system to scale across locations more
effectively. This also minimizes the impact on WAN connections, since the
system can be configured to transfer only metadata, not raw data across
these connections.

•

Streaming Analytics and Archiving get deployed centrally or in a
federated way. Architects can decide to deploy the system in a more
central way, or in a federated way. This gives maximum flexibility to take
into account compliance regulations around cross-border data transfer
requirements or network constraints.

•

Batch Analytics gets deployed in a Hadoop cluster that takes advantage
of the resilient nature of a Hadoop distributed computing environment

•

SOCs operate where the best talent resides. With this architecture, the
Security Operations Center can access the data and perform analytics from
anywhere across the organization.

A sample multi-location architecture diagram is included below.
Fig 2. Sample deployment for Security Analytics and Pivotal

PIVOTAL EXPANDS USES OF COLLECTED DATA
ACROSS IT AND ENTERPRISE USE CASES
The combined Pivotal and RSA platform allows IT organizations to gain greater value
from the data collected through the use of the collected data for non-security use
cases. The open architecture gives IT organizations flexibility to leverage Hadoop
tools, or Pivotal tools like HAWQ and Spring XD to develop applications and analytics
for adjacent use cases like:
•

Capacity planning

•

Mean-time-to-repair analysis

•

Downtime impact analysis

•

Shadow IT detection

Moreover, outside of security and IT operations, there are a myriad of options for
incorporating security into a wider Enterprise Data Lake allowing the data to be used
for uses such as customer experience monitoring and billing. This allows customers to
gain much wider benefit across their organization from their investment in Pivotal and
RSA.
BENEFITS OF RSA-PIVOTAL APPROACH
The joint RSA-Pivotal offering provides customers with:
•

Reduced risk of compromise by using the latest analytic and detection
techniques and threat intelligence to aid in the detection, investigation and
response to security incidents

•

Reduced deployment risk and quicker time to value through proven,
validated architecture for collection, analytics of data that produces
actionable intelligence at enterprise scale

•

Less reliance on Data Science expertise to leverage cutting edge analytic
techniques

•

Take better advantage of existing security expertise by adding analytic
firepower

•

Enterprise-wide benefits as collected data integrates with the Enterprise
data lake

CONTACT US
To learn more about how EMC
products, services, and solutions can
help solve your business and IT
challenges, contact your local
representative or authorized reseller—
or visit us at www.emc.com.

EMC2, EMC, the EMC logo, RSA are registered trademarks or trademarks of EMC Corporation in
the United States and other countries. VMware is a registered trademark or trademark of
VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC Corporation.
All rights reserved. Published in the USA. 02/14 Solution Overview H12878
EMC believes the information in this document is accurate as of its publication date. The
information is subject to change without notice.

More Related Content

PPTX
Enterprise Security and User Behavior Analytics
PPTX
SplunkLive! Customer Presentation – HCA
PPTX
User and entity behavior analytics: building an effective solution
PPTX
November 2013 HUG: Cyber Security with Hadoop
PDF
Novetta Cyber Analytics Product Brochure Final_Web_4.20.2015
PDF
Sqrrl Enterprise: Big Data Security Analytics Use Case
PDF
Enterprise Security featuring UBA
Enterprise Security and User Behavior Analytics
SplunkLive! Customer Presentation – HCA
User and entity behavior analytics: building an effective solution
November 2013 HUG: Cyber Security with Hadoop
Novetta Cyber Analytics Product Brochure Final_Web_4.20.2015
Sqrrl Enterprise: Big Data Security Analytics Use Case
Enterprise Security featuring UBA

What's hot (20)

PPTX
Getting Started with Splunk Enterprise Hands-On
PDF
HP ArcSight Demonstrating ROI For a SIEM Solution
PPTX
Document fingerprinting in Microsoft 365 Compliance
PPTX
Hands-On Security Breakout Session- Disrupting the Kill Chain
PPTX
Splunk Ninjas: New Features and Search Dojo
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
PPTX
Operational Security Intelligence Breakout Session
PPTX
Splunk Discovery: Warsaw 2018 - Getting Data In
PPTX
Using Splunk for Information Security
PDF
Splunk Enterprise for InfoSec Hands-On Breakout Session
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
Splunking configfiles 20211208_daniel_wilson
PDF
ExtraHop Splunk datasheet
PDF
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
PDF
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
PDF
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
PPTX
SplunkLive! Munich 2018: Data Onboarding Overview
PPTX
Getting Started with Splunk Breakout Session
PPTX
Clinical and Business Analytics - HIMSS 2015
PDF
End-to-End Security Analytics with the Elastic Stack
Getting Started with Splunk Enterprise Hands-On
HP ArcSight Demonstrating ROI For a SIEM Solution
Document fingerprinting in Microsoft 365 Compliance
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk Ninjas: New Features and Search Dojo
Applying Auto-Data Classification Techniques for Large Data Sets
Operational Security Intelligence Breakout Session
Splunk Discovery: Warsaw 2018 - Getting Data In
Using Splunk for Information Security
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk for Enterprise Security featuring User Behavior Analytics
Splunking configfiles 20211208_daniel_wilson
ExtraHop Splunk datasheet
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
SplunkLive! Munich 2018: Data Onboarding Overview
Getting Started with Splunk Breakout Session
Clinical and Business Analytics - HIMSS 2015
End-to-End Security Analytics with the Elastic Stack
Ad

Viewers also liked (15)

PPTX
летние мастер-классы в сидо
PPTX
Power View from the Data Visualisation Perspective
PPTX
5 tips for_getting_a_job_interview_next_week ppt
PDF
The Evolution of IP Storage and Its Impact on the Network
 
PPTX
Block political vs physical maps
PDF
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
 
PDF
Transforming Expectations for Treat-Intelligence Sharing
 
PDF
รวมไอเดียแบบบ้านชั้นเดียว
PPTX
psychology of old age
PDF
Insaat kursu-fatih
PPS
Underground city of_derinkuyu
PPTX
Tues treaty of versailles
PDF
Formulario agenda telefonica
PPTX
Make your presentations stick (3)
PDF
Changing the Security Monitoring Status Quo
 
летние мастер-классы в сидо
Power View from the Data Visualisation Perspective
5 tips for_getting_a_job_interview_next_week ppt
The Evolution of IP Storage and Its Impact on the Network
 
Block political vs physical maps
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
 
Transforming Expectations for Treat-Intelligence Sharing
 
รวมไอเดียแบบบ้านชั้นเดียว
psychology of old age
Insaat kursu-fatih
Underground city of_derinkuyu
Tues treaty of versailles
Formulario agenda telefonica
Make your presentations stick (3)
Changing the Security Monitoring Status Quo
 
Ad

Similar to RSA-Pivotal Security Big Data Reference Architecture (20)

PDF
Big data Propels SIEM into the era of Security Analytics
 
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PDF
The Role Of Data Analytics In Cybersecurity
PPTX
Be the Hunter
PDF
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PDF
Visualization in the Age of Big Data
PDF
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
PDF
Technical track chris calvert-1 30 pm-issa conference-calvert
PDF
The Golden Rules - Detecting more with RSA Security Analytics
PPTX
Security Analytics and Big Data: What You Need to Know
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PDF
Building an Intelligence-Driven Security Operations Center
 
PPTX
Splunk for Security Breakout Session
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
Splunk for Security
PDF
Getting Real About Security Management and “Big Data”
 
PPTX
RSA 2016 Security Analytics Presentation
Big data Propels SIEM into the era of Security Analytics
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
The Role Of Data Analytics In Cybersecurity
Be the Hunter
Finding the needle in the haystack: how Nestle is leveraging big data to defe...
Big Data Analytics for Cyber Security: A Quick Overview
Visualization in the Age of Big Data
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
Technical track chris calvert-1 30 pm-issa conference-calvert
The Golden Rules - Detecting more with RSA Security Analytics
Security Analytics and Big Data: What You Need to Know
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Building an Intelligence-Driven Security Operations Center
 
Splunk for Security Breakout Session
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk for Security
Getting Real About Security Management and “Big Data”
 
RSA 2016 Security Analytics Presentation

More from EMC (20)

PPTX
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
PDF
Cloud Foundry Summit Berlin Keynote
 
PPTX
EMC GLOBAL DATA PROTECTION INDEX
 
PDF
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
PDF
Citrix ready-webinar-xtremio
 
PDF
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
PPTX
EMC with Mirantis Openstack
 
PPTX
Modern infrastructure for business data lake
 
PDF
Force Cyber Criminals to Shop Elsewhere
 
PDF
Pivotal : Moments in Container History
 
PDF
Data Lake Protection - A Technical Review
 
PDF
Mobile E-commerce: Friend or Foe
 
PDF
Virtualization Myths Infographic
 
PDF
Intelligence-Driven GRC for Security
 
PDF
The Trust Paradox: Access Management and Trust in an Insecure Age
 
PDF
EMC Technology Day - SRM University 2015
 
PDF
EMC Academic Summit 2015
 
PDF
Data Science and Big Data Analytics Book from EMC Education Services
 
PDF
Using EMC Symmetrix Storage in VMware vSphere Environments
 
PDF
Using EMC VNX storage with VMware vSphereTechBook
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

RSA-Pivotal Security Big Data Reference Architecture

  • 1. RSA-Pivotal Security Big Data Reference Architecture RSA & Pivotal combine to help security teams detect threats quicker and speed up response ESSENTIALS RSA and Pivotal are combining to help customers get: • Better visibility into what’s happening in their environments • Actionable intelligence from a diverse set of internal and external sources Despite significant investment in information security, attackers appear to have the upper hand. According to the Verizon Data Breach Investigations report (2013), 97 percent of breaches led to data compromise within “days” or less, whereas 78 percent of breaches took “weeks” or more to discover. • Attackers are becoming more organized and better funded. But while attacks have become dynamic, defenses have remained static. Today’s More contextual analytics to help them prioritize issues • ATTACKERS STILL HAVE THE UPPER HAND attacks are designed to exploit the weaknesses of our user-centric, hyperconnected infrastructures. • IT-enabled organizations continue to grow more complex. Organizations now demand much more open and agile systems, creating incredible new opportunities for collaboration, communication, and innovation. This also results in new vulnerabilities that cyber criminals, “hacktivist” groups, and nation states have learned to exploit. • There are often not enough skilled security professionals to help organizations protect themselves effectively. The 2013 (ISC)2 Global Information Security Workforce Study found that 56% of its respondents believe that there is a security workforce shortage To reverse the tide and protect their organizations better, security teams need a few things. They need: • Better visibility into what’s happening in their environments, from their networks, to their servers to their applications and endpoints. • More contextual analytics of what’s going on to help them prioritize issues more effectively and concentrate more resources on those issues that are more likely to impact their business • Actionable intelligence from diverse sources, both internal and external, to tell the system what to look for in a more automated way, and help them respond quicker • An architecture that scales to support the business as it grows and evolves RSA and Pivotal have worked together to create an architecture that truly helps security teams to fulfill these needs, and help speed up attack detection and response times, and reducing the impact of attacks on organizations. Moreover this approach creates a platform that can be used for a myriad of other use case across IT operations and the enterprise. SOLUTION OVERVIEW
  • 2. VISIBILITY IS THE FOUNDATION FOR SUPERIOR ANALYTICS RSA and Pivotal provide unparalleled visibility into user and system activity across the IT environment. RSA Security Analytics provides a collection infrastructure that can provides full visibility into • Network Activity by performing full packet capture, session reconstruction and analysis of packet data • Log Data by collecting log and event data from devices and applications that support business and IT activity. Collection occurs through the deployment of “decoder” devices topographically close of the systems generating the data, either through a span port or tap (in the case of packets) or through common system protocols including syslog, SNMP, ODBC or proprietary protocols. RSA Security Analytics also integrates with systems that collect contextual information like • Asset data – this includes the collection of technical configuration data, as well as business context like what business processes the system supports, or the criticality of the system • Vulnerability data – data which can add additional context to an investigation (e.g. when the system was last scanned and what vulnerabilities were present) or to help prioritize response to attacks on vulnerable systems • Identity data – additional contextual information about the user, their location, their job function and the privileges they have. RSA Security Analytics enriches the log and network data it captures with this contextual information to aid in the “downstream” processing of that data, either in the detection or investigation of threats Fig 1. Security Analytics High Level Architecture
  • 3. ANALYTICS THROUGHOUT THE INFORMATION LIFECYCLE STREAMLINE DETECTION AND INVESTIGATION RSA and Pivotal combine to provide numerous types of analytics, needed to spot threats at different times in the information lifecycle. The three main types of analytics provided are: • Capture time analytics – to identify interesting characteristics of data right at the time of capture. This includes: o Basic characteristics – e.g. source IP, destination IP, username, log action, etc. o Interesting characteristics – e.g. such use of encryption, executable files, administrative users, administrative commands o Indicators of compromise – e.g. known bad IPs, known bad protocols, watchlist users Security Analytics creates “metadata” out of these interesting characteristics that can be used for further analytics or to facilitate investigations • Streaming analytics – to analyze metadata in real time to spot concurrent sessions or actions happening over a short time window that might be an indicator of a threat. This metadata could be log-based, network-based or from another contextual source. Examples include: o Basic SIEM-like correlation rules: like 5 failed logons followed by a successful logon o Compound indicators of compromise: like a user downloading suspect JavaScript at around the same time as an encrypted session to a blacklisted country o Hybrid log & network rules: like malformed traffic bound for a host at around the same time as encrypted traffic to a blacklisted country Streaming analytics can be based on combinations of events or deviations from a “baseline” normal count of a piece of metadata. Streaming analytics appliances need not be deployed right at the point of data collection, but can be deployed in parallel throughout the environment for enhanced scalability. • Batch analytics – to identify “low and slow” type attacks, and patterns that occur over extended periods of time. Batch analytics is performed by the RSA Security Analytics Warehouse, which has Pivotal HD at its core. Pivotal uses proven Hadoop and other Big Data technologies, and the Pivotal Data Science Labs team to enable different analytic techniques including: o Rules based pattern matching o Cluster analysis o Anomaly detection o Machine learning Batch analytics and these advanced methods facilitate use cases such as malicious domain detection, beaconing host detection, and anomalous user behavior detection. In addition, RSA Security Analytics provides a log archiving capability to allow organizations to satisfy retention and reporting requirements, but store the data in a cost-effective manner
  • 4. ANALYTIC METHODS COMBINE TO FACILITATE ADVANCED SOC ACTIONS Threat analysts need a combination of capture time, stream and batch analytics to detect and investigate a full range of threats. Each of these methods combine to support a number of workstreams common in a security operations center, like: • Visualizing heat maps of issues across an organization by business unit or profile • Profiling systems or devices for indicators of risk • Prioritizing alerts when a particular critical business asset or user exhibits multiple suspicious characteristics over a week-long period • Providing investigative context after an alert gets triggered to determine the cause or impact of an issue, e.g. if the user downloaded an executable prior to the alert, or the IP accessed a critical asset after triggering the alert In addition, using Pivotal and Hadoop, and the Pivotal Data Science Labs team offers the potential to add additional capabilities like: • Predictive modeling – using visibility and context to predict where issues are likely to occur • Analyst feedback loops – allowing analysts to provide feedback whether they think a particular alert warrants follow-up, and allowing the system to learn that for future alerts DISTRIBUTED ARCHITECTURE ALLOWS FOR ENTERPRISE SCALABILITY AND DEPLOYMENT Many systems have claimed to offer this functionality, but have failed. This is because older architecture using old database technologies and proprietary data stores don’t work. More analytical compute power than ever is needed to analyze the data, but this needs to be provided cost effectively. Pivotal and RSA have teamed up to create a Security Analytics platform that provides an architecture that deploys components throughout the environment in order to provide superior scalability and deployability, and the ability to deploy the platform in a modular way to suit an organization’s unique use cases. • Collection and Capture-Time Analytics get deployed close to where the activity occurs. This allows the system to scale across locations more effectively. This also minimizes the impact on WAN connections, since the system can be configured to transfer only metadata, not raw data across these connections. • Streaming Analytics and Archiving get deployed centrally or in a federated way. Architects can decide to deploy the system in a more central way, or in a federated way. This gives maximum flexibility to take into account compliance regulations around cross-border data transfer requirements or network constraints. • Batch Analytics gets deployed in a Hadoop cluster that takes advantage of the resilient nature of a Hadoop distributed computing environment • SOCs operate where the best talent resides. With this architecture, the Security Operations Center can access the data and perform analytics from anywhere across the organization. A sample multi-location architecture diagram is included below.
  • 5. Fig 2. Sample deployment for Security Analytics and Pivotal PIVOTAL EXPANDS USES OF COLLECTED DATA ACROSS IT AND ENTERPRISE USE CASES The combined Pivotal and RSA platform allows IT organizations to gain greater value from the data collected through the use of the collected data for non-security use cases. The open architecture gives IT organizations flexibility to leverage Hadoop tools, or Pivotal tools like HAWQ and Spring XD to develop applications and analytics for adjacent use cases like: • Capacity planning • Mean-time-to-repair analysis • Downtime impact analysis • Shadow IT detection Moreover, outside of security and IT operations, there are a myriad of options for incorporating security into a wider Enterprise Data Lake allowing the data to be used for uses such as customer experience monitoring and billing. This allows customers to gain much wider benefit across their organization from their investment in Pivotal and RSA.
  • 6. BENEFITS OF RSA-PIVOTAL APPROACH The joint RSA-Pivotal offering provides customers with: • Reduced risk of compromise by using the latest analytic and detection techniques and threat intelligence to aid in the detection, investigation and response to security incidents • Reduced deployment risk and quicker time to value through proven, validated architecture for collection, analytics of data that produces actionable intelligence at enterprise scale • Less reliance on Data Science expertise to leverage cutting edge analytic techniques • Take better advantage of existing security expertise by adding analytic firepower • Enterprise-wide benefits as collected data integrates with the Enterprise data lake CONTACT US To learn more about how EMC products, services, and solutions can help solve your business and IT challenges, contact your local representative or authorized reseller— or visit us at www.emc.com. EMC2, EMC, the EMC logo, RSA are registered trademarks or trademarks of EMC Corporation in the United States and other countries. VMware is a registered trademark or trademark of VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC Corporation. All rights reserved. Published in the USA. 02/14 Solution Overview H12878 EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice.