SlideShare a Scribd company logo
2nd Floor, Spline Arcade,
Hi-tech city, Hyderabad-500081.
email: contact@infomagnum.com
LOG ANALYTICS
A SOLUTION TO IDENTIFY YOUR THREATS…
Log’s are stepping stones to success.
AGENDA
 Introduction to InfoMagnum Security Service
 Logging everything
 Features and possibilities
 Process and implementation
 Q&A
LOGGING EVERYTHING
We Support below Devices and Applications
Devices:
- Cisco ISR, ASA, and PIX series
- ISS Proventia
- Fortinet
- Checkpoint VPN-1 Pro and VPN-Edge Series, Firewall-1 Express
- Juniper NetScreen
Applications:
- Windows, Linux, HPUX, AIX logs
- Apache, mySQL, ftp, and more.
REASONS TO STEPIN
• Detect/Prevent Unauthorized Access and insider Abuse
• Meet Regulatory Requirement
• Forensic Analysis and Correlation
• Ensure Regulatory Compliance
• Track Suspicious Behavior
• IT Troubleshooting and Network Operation
• Monitor User Activity
• Best Practices/Frameworks such as COBIT, ISO, ITIL, etc.
• Measure Application Performance
• Achieve ROI or Cost Reduction in System Maintenance
BASIC FEATURES
• Organizational Intelligence.
• Enables analysts to rapidly generate actionable intelligence from massive amounts of
continuous Syslog data.
• Intuitive processes for visualizing data minimizes the time between data acquisition
and analysis.
• Analysts’ Advantage
• Reduces the amount of time and effort to analyze in pointing problems in sets
automatically.
• Increase the IQ of analysts without subject matter expertise.
• Provides simple visualizations for different facets of the same data, thereby replacing
clutter and information overload.
• Data Center foot printing and problem identification.
• System Problem diagnostics and failure detection.
• Cyber Threat Intelligence using system logged IP’s, url’s, dns and more atomics.
TECHNOLOGY
Powered Technologies
• Syslog-NG
• Python - ETL
• Indexing Elasticsearch or infuxDB
• Algorithms – Many (Clustering, SVM, Regression)
• AngularJS or Kibana.
• Cyber Security threat intel.
• Rediss
Anomaly detection methods
a. Supervised :
• Finger Printing Datacenter : identifying performance crises.
• Failure Diagnostics – using decision
b. Unsupervised:
• Problem Identification and detection with minimal SME,
Next version features:
• Predictions and alerting will be implemented along with this services.
DIFFERENTIATORS
STREAMING PROCESS
• Syslog Platform
• Device identification and topology review of logged data
• Extraction of logs from syslog server to process pipeline server
• Transformation at process pipeline server
• Replacing/Pairing/Identify Invariants
• Templatization
• Parsing and pattern detection
• Indexing parsed ETL for further analysis and machine learning
• Applying periodic and correlation scripts to indexed data and
calibration/correction the results before indexing
• Representing graphs for the mentioned features
USE CASES
CHALLENGES
• Lots of workload
• Real-time performance
monitoring metrics from many
sources
• Easy to identify bottlenecks
• Easy to identify and co-relate
any bottlenecks caused for
further system performance
tuning
• Real-time centralized logs from
many sources
• Real-time suspicious & intrusion
logs
• Lots of Users
• Many Sources of Logs
CHALLENGE #1 LOG ANALYSIS
1. The Firewall did it?
 Did the Firewall Block something it shouldn’t have?
 Got Bypassed !!!
2. What did the Intruder do?
IDS, IPS, AX, etc.. Events
3. Phished, who clicked it?
4. What happened to the device 3Months ago?
CPU NETWORK MEMORY DISK PROCESS
EVENTS
Integrative
Scalable
Administrative
Secure
CHALLENGE #2 PERFORMANCE ANALYSIS
HEAP MEM THREADS BUFFER CACHE NON HEAP
METRICS
THANK YOU
Queries
arun@infomagnum.com
contactus@infomagnum.com
www.infomagnum.com

More Related Content

PDF
Monitoring
PDF
DBOps
PPTX
Dashboards, widgets, business views & 3D-data centre
PDF
SplunkLive! Customer Presentation - Hurricane Labs
PDF
Putting the Sec into DevOps
PPTX
Leading American Entertainment Company implements OpManager
PPTX
5 ways you can strengthen and secure your network infrastructure with Firewal...
PPTX
5 benefits of OpManager
Monitoring
DBOps
Dashboards, widgets, business views & 3D-data centre
SplunkLive! Customer Presentation - Hurricane Labs
Putting the Sec into DevOps
Leading American Entertainment Company implements OpManager
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 benefits of OpManager

What's hot (20)

PPTX
Network fault management and IT automation training
PDF
Qradar as a SOC core
PPTX
Opmanager technical overview
PPTX
Free Netflow analyzer training - diagnosing_and_troubleshooting
PPTX
5 Ways NCM Can Save You From A Disaster
PPTX
World's Largest Space Research Organization Implements OpManager Plus
PDF
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solution
PDF
Top-Down Approach to Monitoring
PPTX
Ransomware Attack: Best Practices to proactively prevent contain and respond
PPTX
Server and application monitoring webinars [Applications Manager] - Part 3
PPTX
New OpManager v12
PDF
Security Change Management: Agility vs. Control
PPTX
Automating for NERC CIP-007-5-R1
PPTX
Protect & Defend Your Critical Infrastructure
PPTX
Global Airline giant's application performance monitoring solution!
PDF
6. Kepware_IIoT_Solution
PPTX
Managing SCADA Operations and Security with Splunk Enterprise
PPTX
Server and application monitoring webinars [Applications Manager] - Part 2
PDF
5 things you didn't know you could do with security policy management
PPTX
Applications Performance Monitoring with Applications Manager part 1
Network fault management and IT automation training
Qradar as a SOC core
Opmanager technical overview
Free Netflow analyzer training - diagnosing_and_troubleshooting
5 Ways NCM Can Save You From A Disaster
World's Largest Space Research Organization Implements OpManager Plus
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solution
Top-Down Approach to Monitoring
Ransomware Attack: Best Practices to proactively prevent contain and respond
Server and application monitoring webinars [Applications Manager] - Part 3
New OpManager v12
Security Change Management: Agility vs. Control
Automating for NERC CIP-007-5-R1
Protect & Defend Your Critical Infrastructure
Global Airline giant's application performance monitoring solution!
6. Kepware_IIoT_Solution
Managing SCADA Operations and Security with Splunk Enterprise
Server and application monitoring webinars [Applications Manager] - Part 2
5 things you didn't know you could do with security policy management
Applications Performance Monitoring with Applications Manager part 1
Ad

Similar to Threat intelligence solution (20)

PPT
Making Logs Sexy Again: Can We Finally Lose The Regexes?
PDF
Enterprise Security in Mainframe-Connected Environments
PDF
360-Degree View of IT Infrastructure with IT Operations Analytics
PDF
PPT
Logs for Information Assurance and Forensics @ USMA
PPTX
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
PDF
Incident response before:after breach
PPTX
Firewall Analyzer - Middle East Workshop
PPTX
How to Leverage Log Data for Effective Threat Detection
DOC
Logging "BrainBox" Short Article
PPTX
Security Risk Advisors - BSides PGH 2018 - Red Team SIEM
PPTX
Log maintenance network securiy
PPTX
ManageEngine Firewall Analyzer training
PPTX
IT Security: Eliminating threats with effective network & log analysis
PPTX
Log Standards & Future Trends by Dr. Anton Chuvakin
PDF
Logsign Forest Enterprise Solution Overview
PDF
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
PDF
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
PPTX
Power of logs: practices for network security
ODP
Unlock Security Insight from Machine Data
Making Logs Sexy Again: Can We Finally Lose The Regexes?
Enterprise Security in Mainframe-Connected Environments
360-Degree View of IT Infrastructure with IT Operations Analytics
Logs for Information Assurance and Forensics @ USMA
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton C...
Incident response before:after breach
Firewall Analyzer - Middle East Workshop
How to Leverage Log Data for Effective Threat Detection
Logging "BrainBox" Short Article
Security Risk Advisors - BSides PGH 2018 - Red Team SIEM
Log maintenance network securiy
ManageEngine Firewall Analyzer training
IT Security: Eliminating threats with effective network & log analysis
Log Standards & Future Trends by Dr. Anton Chuvakin
Logsign Forest Enterprise Solution Overview
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
Power of logs: practices for network security
Unlock Security Insight from Machine Data
Ad

Recently uploaded (20)

PDF
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
PDF
Chapter 1 - Introduction to management.pdf
PPTX
Process-and-Ethics-in-Research-1.potatoi
PDF
Pollitrace pitch deck- Ai powered multiple species
PPTX
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
PPT
Chap8. Product & Service Strategy and branding
PDF
Budora Case Study: Building Trust in Canada’s Online Cannabis Market
PDF
Why Has Vertical Farming Recently Become More Economical.pdf
PPTX
Daily stand up meeting on the various business
PPTX
Peerless Plumbing Company-Fort Worth.pptx
PDF
Driving Innovation & Growth, Scalable Startup IT Services That Deliver Result...
PPT
chap9.New Product Development product lifecycle.ppt
PDF
Business Risk Assessment and Due Diligence Report: Zacharia Ali and Associate...
PDF
4. Finance for non-financial managers.08.08.2025.pdf
PDF
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
PDF
Why DevOps Teams Are Dropping Spreadsheets for Real-Time Cloud Hygiene.pdf
PPTX
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
PPTX
ENTREPRENEURSHIP..PPT.pptx..1234567891011
PDF
Meme Coin Empire- Launch, Scale & Earn $500K-Month_3.pdf
PPT
Organizational Culture and Management.ppt
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
Chapter 1 - Introduction to management.pdf
Process-and-Ethics-in-Research-1.potatoi
Pollitrace pitch deck- Ai powered multiple species
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
Chap8. Product & Service Strategy and branding
Budora Case Study: Building Trust in Canada’s Online Cannabis Market
Why Has Vertical Farming Recently Become More Economical.pdf
Daily stand up meeting on the various business
Peerless Plumbing Company-Fort Worth.pptx
Driving Innovation & Growth, Scalable Startup IT Services That Deliver Result...
chap9.New Product Development product lifecycle.ppt
Business Risk Assessment and Due Diligence Report: Zacharia Ali and Associate...
4. Finance for non-financial managers.08.08.2025.pdf
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
Why DevOps Teams Are Dropping Spreadsheets for Real-Time Cloud Hygiene.pdf
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
ENTREPRENEURSHIP..PPT.pptx..1234567891011
Meme Coin Empire- Launch, Scale & Earn $500K-Month_3.pdf
Organizational Culture and Management.ppt

Threat intelligence solution

  • 1. 2nd Floor, Spline Arcade, Hi-tech city, Hyderabad-500081. email: contact@infomagnum.com
  • 2. LOG ANALYTICS A SOLUTION TO IDENTIFY YOUR THREATS… Log’s are stepping stones to success.
  • 3. AGENDA  Introduction to InfoMagnum Security Service  Logging everything  Features and possibilities  Process and implementation  Q&A
  • 4. LOGGING EVERYTHING We Support below Devices and Applications Devices: - Cisco ISR, ASA, and PIX series - ISS Proventia - Fortinet - Checkpoint VPN-1 Pro and VPN-Edge Series, Firewall-1 Express - Juniper NetScreen Applications: - Windows, Linux, HPUX, AIX logs - Apache, mySQL, ftp, and more.
  • 5. REASONS TO STEPIN • Detect/Prevent Unauthorized Access and insider Abuse • Meet Regulatory Requirement • Forensic Analysis and Correlation • Ensure Regulatory Compliance • Track Suspicious Behavior • IT Troubleshooting and Network Operation • Monitor User Activity • Best Practices/Frameworks such as COBIT, ISO, ITIL, etc. • Measure Application Performance • Achieve ROI or Cost Reduction in System Maintenance
  • 6. BASIC FEATURES • Organizational Intelligence. • Enables analysts to rapidly generate actionable intelligence from massive amounts of continuous Syslog data. • Intuitive processes for visualizing data minimizes the time between data acquisition and analysis. • Analysts’ Advantage • Reduces the amount of time and effort to analyze in pointing problems in sets automatically. • Increase the IQ of analysts without subject matter expertise. • Provides simple visualizations for different facets of the same data, thereby replacing clutter and information overload. • Data Center foot printing and problem identification. • System Problem diagnostics and failure detection. • Cyber Threat Intelligence using system logged IP’s, url’s, dns and more atomics.
  • 7. TECHNOLOGY Powered Technologies • Syslog-NG • Python - ETL • Indexing Elasticsearch or infuxDB • Algorithms – Many (Clustering, SVM, Regression) • AngularJS or Kibana. • Cyber Security threat intel. • Rediss
  • 8. Anomaly detection methods a. Supervised : • Finger Printing Datacenter : identifying performance crises. • Failure Diagnostics – using decision b. Unsupervised: • Problem Identification and detection with minimal SME, Next version features: • Predictions and alerting will be implemented along with this services. DIFFERENTIATORS
  • 9. STREAMING PROCESS • Syslog Platform • Device identification and topology review of logged data • Extraction of logs from syslog server to process pipeline server • Transformation at process pipeline server • Replacing/Pairing/Identify Invariants • Templatization • Parsing and pattern detection • Indexing parsed ETL for further analysis and machine learning • Applying periodic and correlation scripts to indexed data and calibration/correction the results before indexing • Representing graphs for the mentioned features
  • 11. CHALLENGES • Lots of workload • Real-time performance monitoring metrics from many sources • Easy to identify bottlenecks • Easy to identify and co-relate any bottlenecks caused for further system performance tuning • Real-time centralized logs from many sources • Real-time suspicious & intrusion logs • Lots of Users • Many Sources of Logs
  • 12. CHALLENGE #1 LOG ANALYSIS 1. The Firewall did it?  Did the Firewall Block something it shouldn’t have?  Got Bypassed !!! 2. What did the Intruder do? IDS, IPS, AX, etc.. Events 3. Phished, who clicked it? 4. What happened to the device 3Months ago? CPU NETWORK MEMORY DISK PROCESS EVENTS Integrative Scalable Administrative Secure
  • 13. CHALLENGE #2 PERFORMANCE ANALYSIS HEAP MEM THREADS BUFFER CACHE NON HEAP METRICS