SlideShare a Scribd company logo
1
Survey: Security Analytics and Intelligence
A look at the impact of security threats and the use of security analytics
and intelligence to mitigate those threats
© 2013, SolarWinds Worldwide, LLC. All rights reserved.
Conducted by SANS Institute
June/July 2013
2
Introduction
» SolarWinds, in conjunction
with SANS, recently
conducted a survey on
Security Analytics and
Intelligence with
participation from over
600 IT professionals
» This presentation provides
insight into IT budgets for
security, difficulties faced
in identifying attacks and
breaches, and more
2
The Agenda
• Participants: Whom did we
survey?
• Results: What did they say?
• Key Take Away: What does
the survey mean to you?
• Recommendations: What
can you do?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
3
Whom Did We Survey?
3
19.0%
17.2%
15.6%
8.7% 8.7% 8.2%
7.0%
5.9%
5.1%
2.9% 0.9% 0.9%
Government/Military
Financial
Services/Banking
Other
Education
HighTech
Health
care/Pharmaceutical
Telecommunications
Carrier/Service…
Manufacturing
Energy/Utilities
Retail
Engineering/Construc
tion
HostingService
Provider
Participants: Industry wise
SANS & SOLARWINDS IT SECURITY SURVEY 2013
45% of the survey
taker organizations
were from
Federal, BFSI and
Healthcare
4
IT Budget Spent on IT Security
• 45% of the survey takers were spending less than 20% of their IT budget on information security
management, compliance and response
• About 30% spent less than 10% on information security management, compliance and response
Unknown, 40.0%
Less than 5%, 21.3%
6% to 10%, 16.0%
11% to 20%, 7.9%
21% to 30%, 7.3%
31% to 40%, 2.0%
41% to 50%, 1.2%
51% to 60%, 0.9%
Greater than 60%, 1.7%
Other, 1.6%
SANS & SOLARWINDS IT SECURITY SURVEY 2013
5
Threat Detection and Response
SANS & SOLARWINDS IT SECURITY SURVEY 2013
6
Difficulty in Detecting Threats
33.4%
23.5%
21.1%
7.8%
5.7%
3.0% 2.8%
1.3% 1.3%
Noattacks(thatwe
knowabout)
2to5
Unknown
1
6to10
11to20
21to50
51to100
Morethan100
Difficulty in detecting threats
In the past two years,
45% of the respondent
companies had 1 or more
attacks that were difficult
to detect.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
7
Time Taken to Detect the Impact of the Attacks
• 30% of the organizations took up to a week to detect the impact
• 14% of them took about 1-3 months
Within the same
day
One week or less
A month or less
Three months or
less
Five months or less
10 months or less
More than 10
months
Unknown
SANS & SOLARWINDS IT SECURITY SURVEY 2013
8
Time Taken for Attack Remediation
• 35% of companies took up to a week to remediate after the initial knowledge of an attack
• About 11% of the companies took 1-3 months
Within the same
day
One week or less
A month or less
Three months or
less
Five months or less
10 months or less
More than 10
months
Unknown
SANS & SOLARWINDS IT SECURITY SURVEY 2013
9
Data Collection and Correlation
SANS & SOLARWINDS IT SECURITY SURVEY 2013
10
Top 3 Impediments to Discovering
and Following Up on Attacks
39%
21%
19%
Not collecting appropriate
security data
Not Identifying relevant event
context (Event correlation)
Lack of system awareness and
vulnerability awareness
SANS & SOLARWINDS IT SECURITY SURVEY 2013
11
Types of Operational and Security Data Collected
for Security Analytics
Top 3 Types of Data
Currently Collected:
• Log data from network
devices, servers and
applications
• Monitoring data from
firewalls, vulnerability
scanners, IDS/IPS
• Access data
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Log data from network (routers/switches) and
servers, applications and/or endpoints
Monitoring data provided through firewalls, network-
based vulnerability scanners, IDS/IPS, UTMs, etc.
Access data from applications and access control systems
Unstructured data-at-rest and RAM data from endpoints
(servers and end-user devices)
Security assessment data from endpoint (aka from
NAC/MDM scans), application and server monitoring tools
Assessment and exception data (not on the whitelist of
approved behaviors) taken from mobile/BYOD endpoints…
Monitoring and exception data pertaining to internal
virtual and cloud environments
Monitoring and exception data pertaining to public cloud
usage
Other
Unknown Don't plan to collect Plan to collect within 12 months Currently collect
Top 3 Within 12 Months:
• Security assessment data
from
endpoint, application and
server monitoring tools
• Monitoring and exception
data from internal virtual
and cloud environments
• Access data from
applications and access
control systems
12
How Satisfied are Organizations
with their Security Tools?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
13
Alarming Factor!!
59% of the organizations
don’t know whether they
are collecting security data
in real time or not.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
14
Correlation of Event Logs
• 30% of the organizations did not have any automated correlation of log data
• 45% of the organizations manually scripted searches based on hunches
• 39% of them had no third party intelligence tools
0% 10% 20% 30% 40% 50%
Other
Hadoop or other free or distributed data
analysis tools
Unstructured data analysis tools with NoSQL
and other methods.
Advanced intelligence/threat profiling
database
No automated correlation of logs, just
manual scanning for exceptions by experts
Manual and manually-scripted searches
based on evidence and hunches
Use of SIEM technologies and systems
Dedicated log management platform used for
IT security and operations
SANS & SOLARWINDS IT SECURITY SURVEY 2013
15
More on Correlation
38% of the
respondent
organizations did
not have log
correlation for
external threat
intelligence tools
And guess what???
44% of the organizations are doing only up to 25% of their inquiries to
detect threats in real time.
SANS & SOLARWINDS IT SECURITY SURVEY 2013
About 36% of the organizations
never had any automated
pattern recognition
16
Satisfaction with Current Analytics
and Intelligence Capabilities
• About 59% of the organizations are not satisfied with their library of appropriate
queries and reports
• 56% of the organizations are not satisfied with their relevant event context intelligence
• 56% of them have no visibility into actionable security events
1.25 1.30 1.35 1.40 1.45 1.50 1.55 1.60 1.65 1.70 1.75
Producing or having a library of appropriate…
Relevant event context (intelligence) to observe…
Training/intelligence expertise
Integration of other monitoring systems into…
Costs for tools, maintenance and personnel
Visibility into actionable security events across…
Ability to alert based on exceptions to what is…
Reduction of false positives and/or false negatives
Performance and response time issues
Other
Storage capacity and access of data in needed formats
SANS & SOLARWINDS IT SECURITY SURVEY 2013
17
Primary Use Cases for Evaluation of Security Tools
External malware
Advanced Persistent threats
Compliance monitoring
0%
5%
10%
15%
20%
25%
SANS & SOLARWINDS IT SECURITY SURVEY 2013
24% - External malware
13% - Advanced
persistent threats
11% - Compliance
monitoring
18
Top 3 Future Investments in Security
SANS & SOLARWINDS IT SECURITY SURVEY 2013
0%
10%
20%
30%
40%
50%
60%
70%
Securityinformationmanagement
tools/SIEMsystemswithbuilt-in
analyticscapabilities
Personnel/trainingtodetect
patterns(analytics)andmanage
systems
Vulnerabilitymanagement
Networkprotections
(UTM,IDS/IPS,etc.)
Endpointvisibility
Applicationprotectionsand
visibility
Intelligenceproductsorservices
Analyticsengines
Other
Top 3 Future Investments
in Security:
1. SIEM Tools
2. Training
3. Vulnerability
Management
19
For truly effective security and threat management, organizations
need to:
 Collect and correlate appropriate log and event data across all
relevant sources throughout the IT infrastructure
 Handle larger volumes of log data efficiently
 Establish a baseline of “normal” behavior in order to identify
anomalies
 Identify threats and attacks in real time
 Reduce the time between detection and response
 Implement the right tools for advanced analytics and intelligence
Key Takeaways
SANS & SOLARWINDS IT SECURITY SURVEY 2013
20
» Event correlation for event context and
actionable intelligence
» Real-time analysis for immediate threat
detection and mitigation
» Advanced IT search to simplify event
forensics and expedite root cause analysis
» Built-in reporting to streamline security
and compliance
How Can SIEM Solutions Help You?
SANS & SOLARWINDS IT SECURITY SURVEY 2013
65% of the
organizations
want to make
their security
investments on
SIEM systems
21
SolarWinds Log & Event Manager
 Log Collection, Analysis, and Real-Time
Correlation
 Collects log & event data from tens of
thousands of devices & performs true
real-time, in-memory correlation
 Powerful Active Response technology
enables you to quickly & automatically
take action against threats
 Advanced IT Search employs highly
effective data visualization tools –
word clouds, tree maps, & more
 Quickly generates compliance reports
for PCI DSS, GLBA, SOX, NERC
CIP, HIPAA, & more
 Built-in correlation rules, reports, &
responses for out-of-the-box visibility
and proactive threat protection
SANS & SOLARWINDS IT SECURITY SURVEY 2013
22
Thank You!
SANS & SOLARWINDS IT SECURITY SURVEY 2013

More Related Content

PPTX
SolarWinds Application Performance End User Survey (Australia)
PPTX
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
PPTX
SolarWinds Federal Cybersecurity Survey
PPTX
IT Alert Management Survey Results - February 2013
PPTX
SolarWinds Federal Cybersecurity Survey 2015
PPTX
North America IT Pros Survey: Network Complexity
PPTX
SolarWinds Application Performance End User Survey (Singapore)
PPTX
Australian IT Pros Survey: Network Complexity
SolarWinds Application Performance End User Survey (Australia)
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
SolarWinds Federal Cybersecurity Survey
IT Alert Management Survey Results - February 2013
SolarWinds Federal Cybersecurity Survey 2015
North America IT Pros Survey: Network Complexity
SolarWinds Application Performance End User Survey (Singapore)
Australian IT Pros Survey: Network Complexity

What's hot (20)

PPTX
Email Management Survey: North America
PPTX
New IT Survey: Public Sector
PPTX
SolarWinds Federal Cybersecurity Survey 2016
PPTX
Automation in Public Sector IT Systems
PPTX
IT Trends Report 2015: Business at the Speed of IT, Public Sector Results
PPTX
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
PPTX
SolarWinds Application Performance End User Survey (North America)
PPTX
Threat Detection as presented at the 2016 DGI Cyber security Conference
PPTX
SolarWinds Application Performance End User Survey (UK)
PPTX
Survey: Application Use & Challenges in Government IT Infrastructures
PPTX
New IT Survey: Australia
PPTX
UK IT Pros Survey: Network Complexity
PPTX
Survey: Maximizing the ROI of Network Management Solutions
PPTX
Systems Administrators UK Survey Results
PPTX
Solar winds appstack public sector
PPTX
SolarWinds Application Performance End User Survey (Denmark)
PPTX
New IT Survey: Germany
PPTX
Threat Intelligence + SIEM: A Force to be Reckoned With
PPTX
SolarWinds State of Government IT Management and Monitoring Survey
PPTX
New IT Survey: UK
Email Management Survey: North America
New IT Survey: Public Sector
SolarWinds Federal Cybersecurity Survey 2016
Automation in Public Sector IT Systems
IT Trends Report 2015: Business at the Speed of IT, Public Sector Results
SolarWinds IT Trends Report 2015: Business at the Speed of IT (North America)
SolarWinds Application Performance End User Survey (North America)
Threat Detection as presented at the 2016 DGI Cyber security Conference
SolarWinds Application Performance End User Survey (UK)
Survey: Application Use & Challenges in Government IT Infrastructures
New IT Survey: Australia
UK IT Pros Survey: Network Complexity
Survey: Maximizing the ROI of Network Management Solutions
Systems Administrators UK Survey Results
Solar winds appstack public sector
SolarWinds Application Performance End User Survey (Denmark)
New IT Survey: Germany
Threat Intelligence + SIEM: A Force to be Reckoned With
SolarWinds State of Government IT Management and Monitoring Survey
New IT Survey: UK
Ad

Viewers also liked (10)

PPTX
Netadmin and Sysadmin Survey Results - AUS
PPTX
Systems Administrators AUS Survey Results
PPTX
Netadmin and Sysadmin Survey Results - UK
PPTX
New IT Survey: Brazil
PPTX
IT Survey: UK and Germany SMEs
PPT
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
PPTX
New IT Survey: North America
PPTX
Systems Administrators Survey Results
PDF
Top 5 Reasons to Use Kiwi Syslog Server
PDF
Top 5 Reasons to Use Kiwi CatTools
Netadmin and Sysadmin Survey Results - AUS
Systems Administrators AUS Survey Results
Netadmin and Sysadmin Survey Results - UK
New IT Survey: Brazil
IT Survey: UK and Germany SMEs
How-To: Linux Performance Monitoring & Management for your Multi-Vendor Network
New IT Survey: North America
Systems Administrators Survey Results
Top 5 Reasons to Use Kiwi Syslog Server
Top 5 Reasons to Use Kiwi CatTools
Ad

Similar to Survey: Security Analytics and Intelligence (20)

PPTX
Security Analytics and Big Data: What You Need to Know
DOCX
SANS 2013 Critical Security Controls Survey Moving From A.docx
PDF
The state of incident response
PDF
What's behind a cyber attack
PDF
Sans cyber-threat-intelligence-survey-2015
PDF
rp-esg-tackling-attack-detection-incident-response
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PPTX
Idge dell reignite2014 qp #2
PPTX
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
PDF
security operations center by Manage Engigne
DOCX
Please read the instructions and source that provided, then decide.docx
PDF
Cybersecurity: Perceptions & Practices
PDF
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
PDF
Aujas incident management webinar deck 08162016
PDF
SANS 2013 Critical Security Controls Survey
PDF
Cybersecurity risk assessments help organizations identify.pdf
PDF
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
PDF
Security Incident Response Readiness Survey
PPTX
SOC Analysis
PDF
Legal Firms and the Struggle to Protect Sensitive Data
Security Analytics and Big Data: What You Need to Know
SANS 2013 Critical Security Controls Survey Moving From A.docx
The state of incident response
What's behind a cyber attack
Sans cyber-threat-intelligence-survey-2015
rp-esg-tackling-attack-detection-incident-response
Before the Breach: Using threat intelligence to stop attackers in their tracks
Idge dell reignite2014 qp #2
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
security operations center by Manage Engigne
Please read the instructions and source that provided, then decide.docx
Cybersecurity: Perceptions & Practices
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Aujas incident management webinar deck 08162016
SANS 2013 Critical Security Controls Survey
Cybersecurity risk assessments help organizations identify.pdf
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
Security Incident Response Readiness Survey
SOC Analysis
Legal Firms and the Struggle to Protect Sensitive Data

More from SolarWinds (20)

PPTX
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
PPTX
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
PPTX
Government Webinar: Alerting and Reporting in the Age of Observability
PPTX
Government and Education Webinar: Full Stack Observability
PPTX
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
PPTX
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
PPTX
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
PPTX
Government and Education Webinar: Simplify Your Database Performance Manageme...
PPTX
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
PPTX
Government and Education Webinar: Leverage Automation to Improve IT Operations
PPTX
Government and Education Webinar: Improving Application Performance
PPTX
Government and Education: IT Tools to Support Your Hybrid Workforce
PPTX
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
PPTX
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
PPTX
Government and Education Webinar: Zero-Trust Panel Discussion
PPTX
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
PPTX
Government and Education Webinar: SQL Server—Advanced Performance Tuning
PPTX
Government and Education Webinar: Recovering IP Addresses on Your Network
PPTX
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
PPTX
Government and Education Webinar: Conquering Remote Work IT Challenges
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
Government Webinar: Alerting and Reporting in the Age of Observability
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Improving Application Performance
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Conquering Remote Work IT Challenges

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Survey: Security Analytics and Intelligence

  • 1. 1 Survey: Security Analytics and Intelligence A look at the impact of security threats and the use of security analytics and intelligence to mitigate those threats © 2013, SolarWinds Worldwide, LLC. All rights reserved. Conducted by SANS Institute June/July 2013
  • 2. 2 Introduction » SolarWinds, in conjunction with SANS, recently conducted a survey on Security Analytics and Intelligence with participation from over 600 IT professionals » This presentation provides insight into IT budgets for security, difficulties faced in identifying attacks and breaches, and more 2 The Agenda • Participants: Whom did we survey? • Results: What did they say? • Key Take Away: What does the survey mean to you? • Recommendations: What can you do? SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 3. 3 Whom Did We Survey? 3 19.0% 17.2% 15.6% 8.7% 8.7% 8.2% 7.0% 5.9% 5.1% 2.9% 0.9% 0.9% Government/Military Financial Services/Banking Other Education HighTech Health care/Pharmaceutical Telecommunications Carrier/Service… Manufacturing Energy/Utilities Retail Engineering/Construc tion HostingService Provider Participants: Industry wise SANS & SOLARWINDS IT SECURITY SURVEY 2013 45% of the survey taker organizations were from Federal, BFSI and Healthcare
  • 4. 4 IT Budget Spent on IT Security • 45% of the survey takers were spending less than 20% of their IT budget on information security management, compliance and response • About 30% spent less than 10% on information security management, compliance and response Unknown, 40.0% Less than 5%, 21.3% 6% to 10%, 16.0% 11% to 20%, 7.9% 21% to 30%, 7.3% 31% to 40%, 2.0% 41% to 50%, 1.2% 51% to 60%, 0.9% Greater than 60%, 1.7% Other, 1.6% SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 5. 5 Threat Detection and Response SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 6. 6 Difficulty in Detecting Threats 33.4% 23.5% 21.1% 7.8% 5.7% 3.0% 2.8% 1.3% 1.3% Noattacks(thatwe knowabout) 2to5 Unknown 1 6to10 11to20 21to50 51to100 Morethan100 Difficulty in detecting threats In the past two years, 45% of the respondent companies had 1 or more attacks that were difficult to detect. SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 7. 7 Time Taken to Detect the Impact of the Attacks • 30% of the organizations took up to a week to detect the impact • 14% of them took about 1-3 months Within the same day One week or less A month or less Three months or less Five months or less 10 months or less More than 10 months Unknown SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 8. 8 Time Taken for Attack Remediation • 35% of companies took up to a week to remediate after the initial knowledge of an attack • About 11% of the companies took 1-3 months Within the same day One week or less A month or less Three months or less Five months or less 10 months or less More than 10 months Unknown SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 9. 9 Data Collection and Correlation SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 10. 10 Top 3 Impediments to Discovering and Following Up on Attacks 39% 21% 19% Not collecting appropriate security data Not Identifying relevant event context (Event correlation) Lack of system awareness and vulnerability awareness SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 11. 11 Types of Operational and Security Data Collected for Security Analytics Top 3 Types of Data Currently Collected: • Log data from network devices, servers and applications • Monitoring data from firewalls, vulnerability scanners, IDS/IPS • Access data 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Log data from network (routers/switches) and servers, applications and/or endpoints Monitoring data provided through firewalls, network- based vulnerability scanners, IDS/IPS, UTMs, etc. Access data from applications and access control systems Unstructured data-at-rest and RAM data from endpoints (servers and end-user devices) Security assessment data from endpoint (aka from NAC/MDM scans), application and server monitoring tools Assessment and exception data (not on the whitelist of approved behaviors) taken from mobile/BYOD endpoints… Monitoring and exception data pertaining to internal virtual and cloud environments Monitoring and exception data pertaining to public cloud usage Other Unknown Don't plan to collect Plan to collect within 12 months Currently collect Top 3 Within 12 Months: • Security assessment data from endpoint, application and server monitoring tools • Monitoring and exception data from internal virtual and cloud environments • Access data from applications and access control systems
  • 12. 12 How Satisfied are Organizations with their Security Tools? SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 13. 13 Alarming Factor!! 59% of the organizations don’t know whether they are collecting security data in real time or not. SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 14. 14 Correlation of Event Logs • 30% of the organizations did not have any automated correlation of log data • 45% of the organizations manually scripted searches based on hunches • 39% of them had no third party intelligence tools 0% 10% 20% 30% 40% 50% Other Hadoop or other free or distributed data analysis tools Unstructured data analysis tools with NoSQL and other methods. Advanced intelligence/threat profiling database No automated correlation of logs, just manual scanning for exceptions by experts Manual and manually-scripted searches based on evidence and hunches Use of SIEM technologies and systems Dedicated log management platform used for IT security and operations SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 15. 15 More on Correlation 38% of the respondent organizations did not have log correlation for external threat intelligence tools And guess what??? 44% of the organizations are doing only up to 25% of their inquiries to detect threats in real time. SANS & SOLARWINDS IT SECURITY SURVEY 2013 About 36% of the organizations never had any automated pattern recognition
  • 16. 16 Satisfaction with Current Analytics and Intelligence Capabilities • About 59% of the organizations are not satisfied with their library of appropriate queries and reports • 56% of the organizations are not satisfied with their relevant event context intelligence • 56% of them have no visibility into actionable security events 1.25 1.30 1.35 1.40 1.45 1.50 1.55 1.60 1.65 1.70 1.75 Producing or having a library of appropriate… Relevant event context (intelligence) to observe… Training/intelligence expertise Integration of other monitoring systems into… Costs for tools, maintenance and personnel Visibility into actionable security events across… Ability to alert based on exceptions to what is… Reduction of false positives and/or false negatives Performance and response time issues Other Storage capacity and access of data in needed formats SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 17. 17 Primary Use Cases for Evaluation of Security Tools External malware Advanced Persistent threats Compliance monitoring 0% 5% 10% 15% 20% 25% SANS & SOLARWINDS IT SECURITY SURVEY 2013 24% - External malware 13% - Advanced persistent threats 11% - Compliance monitoring
  • 18. 18 Top 3 Future Investments in Security SANS & SOLARWINDS IT SECURITY SURVEY 2013 0% 10% 20% 30% 40% 50% 60% 70% Securityinformationmanagement tools/SIEMsystemswithbuilt-in analyticscapabilities Personnel/trainingtodetect patterns(analytics)andmanage systems Vulnerabilitymanagement Networkprotections (UTM,IDS/IPS,etc.) Endpointvisibility Applicationprotectionsand visibility Intelligenceproductsorservices Analyticsengines Other Top 3 Future Investments in Security: 1. SIEM Tools 2. Training 3. Vulnerability Management
  • 19. 19 For truly effective security and threat management, organizations need to:  Collect and correlate appropriate log and event data across all relevant sources throughout the IT infrastructure  Handle larger volumes of log data efficiently  Establish a baseline of “normal” behavior in order to identify anomalies  Identify threats and attacks in real time  Reduce the time between detection and response  Implement the right tools for advanced analytics and intelligence Key Takeaways SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 20. 20 » Event correlation for event context and actionable intelligence » Real-time analysis for immediate threat detection and mitigation » Advanced IT search to simplify event forensics and expedite root cause analysis » Built-in reporting to streamline security and compliance How Can SIEM Solutions Help You? SANS & SOLARWINDS IT SECURITY SURVEY 2013 65% of the organizations want to make their security investments on SIEM systems
  • 21. 21 SolarWinds Log & Event Manager  Log Collection, Analysis, and Real-Time Correlation  Collects log & event data from tens of thousands of devices & performs true real-time, in-memory correlation  Powerful Active Response technology enables you to quickly & automatically take action against threats  Advanced IT Search employs highly effective data visualization tools – word clouds, tree maps, & more  Quickly generates compliance reports for PCI DSS, GLBA, SOX, NERC CIP, HIPAA, & more  Built-in correlation rules, reports, & responses for out-of-the-box visibility and proactive threat protection SANS & SOLARWINDS IT SECURITY SURVEY 2013
  • 22. 22 Thank You! SANS & SOLARWINDS IT SECURITY SURVEY 2013