+ All Categories
Home > Documents > RSA NetWitness Capabilities - Dell EMC · PDF file• Supports CEF, SNMP, syslog, SMTP data...

RSA NetWitness Capabilities - Dell EMC · PDF file• Supports CEF, SNMP, syslog, SMTP data...

Date post: 22-Mar-2018
Category:
Upload: vudang
View: 221 times
Download: 4 times
Share this document with a friend
28
1 © Copyright 2012 EMC Corporation. All rights reserved. RSA NetWitness Capabilities [Regional Sales Manager] [March, 2012]
Transcript

1 © Copyright 2012 EMC Corporation. All rights reserved.

RSA NetWitness Capabilities [Regional Sales Manager] [March, 2012]

2 © Copyright 2012 EMC Corporation. All rights reserved.

The Threat Landscape

• Security Today:

– Perimeter-focused

– Network layer

– Signature-based

• Threat Actors:

– Criminals

– Nation state

– Insiders

– Hacktivists

• Security must evolve to address this risk gap

• Security must be information centric and deliver net new intelligence

• Security must be agile…

• Threat Vectors:

– Zero day exploits

– Malware

– Internal fraud

– Espionage

– Application-layer

– APT

3 © Copyright 2012 EMC Corporation. All rights reserved.

Attack Begins

System Intrusion

Attacker Surveillance

Cover-up Complete

Access Probe

Leap Frog Attacks

Complete

Target Analysis

TIME

Attack Set-up

Discovery/ Persistence

Maintain foothold

Cover-up Starts

Anatomy of an attack

Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/HILF.pdf)

4 © Copyright 2012 EMC Corporation. All rights reserved.

TIME

Attack Forecast

Physical Security

Containment & Eradication

System Reaction

Damage Identification

Recovery

Defender Discovery

Monitoring & Controls

Impact Analysis

Response

Threat Analysis

Attack Identified

Incident Reporting

Anatomy of a response

Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/HILF.pdf)

5 © Copyright 2012 EMC Corporation. All rights reserved.

Attack Begins

System Intrusion

Attacker Surveillance

Cover-up Complete

Access Probe

Leap Frog Attacks

Complete

Target Analysis

TIME

Attack Set-up

Discovery/ Persistence

Maintain foothold

Cover-up Starts

Attack Forecast

Physical Security

Containment & Eradication

System Reaction

Damage Identification

Recovery

Defender Discovery

Monitoring & Controls

Impact Analysis

Response

Threat Analysis

Attack Identified

Incident Reporting

Need to collapse free time

Reducing Attacker Free Time

ATTACKER FREE TIME

TIME

Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/HILF.pdf)

6 © Copyright 2012 EMC Corporation. All rights reserved.

A revolutionary approach to enterprise

network monitoring

A platform for pervasive visibility into content and behavior

Providing precise and actionable

intelligence

RSA NetWitness Is…

Know Everything. Answer Anything.

7 © Copyright 2012 EMC Corporation. All rights reserved.

Know Everything…Answer Anything » Why are packed or obfuscated executables being used on our systems?

» What critical threats are my Anti-Virus and IPS missing?

» I am worried about targeted malware and APTs -- how can I fingerprint and analyze these activities in my environment?

» We need to better understand and manage the risks associated with insider threats – I want visibility into end-user activity and to be alerted on certain types of behavior?

» On our high value assets, how can we have certainty that our security controls are functioning exactly as implemented?

» How can I detect new variants of Zeus or other 0day malware on my network?

» We need to examine critical incidents as if we had an HD video camera recording it all…

Invest in Certainty. Invest in Agility.

8 © Copyright 2012 EMC Corporation. All rights reserved.

Understanding the NetWitness Network Monitoring Platform

Network traffic

Logs

Fusion of Threat Intelligence

Normalized Data, Application Layer Context

9 © Copyright 2012 EMC Corporation. All rights reserved.

Underpinning the Platform

Live

10 © Copyright 2012 EMC Corporation. All rights reserved.

NetWitness for Logs (f.k.a. Panorama)

Seamless Fusion of Log Event and Packet Data

• Leveraging the RSA NetWitness platform enables fast, actionable log analytics with industry leading ingestion rates

• Unique approach by co-mingling log and network data in a single point of analysis

• Interactive data-driven analysis of over 150 different log formats

• Mature global threat intelligence fused with log data for better context of threats

• Award-winning, patented, free-form analysis

11 © Copyright 2012 EMC Corporation. All rights reserved.

Threat Intelligence Delivery System

Live • Automate insight into advanced threats • Leverages global security community to

correlate and illuminate the most pertinent information

• Fuses intelligence with your network data in real-time

• Solutions to problem-sets: – Advanced threats – Malware – BOTNets – Policy/Audit – Enterprise Monitoring – Fraud – User Attribution – Risk prioritization

• Prioritized and detailed reporting

12 © Copyright 2012 EMC Corporation. All rights reserved.

Automated Analysis, Reporting and Alerting

Informer • Flexible dashboard, chart and summary displays for unified view of threat vectors

• Automated answers to any question: • Network Security • Security / HR • Legal / R&D / Compliance • I/T Operations

• HTML, CSV and PDF report formats included

• Supports CEF, SNMP, syslog, SMTP data

push for full integration in SIEM

13 © Copyright 2012 EMC Corporation. All rights reserved.

Getting Answers to the Toughest New Questions

• Interactive data-driven session analysis of layer 2-7 content

• Award-winning, patented, port agnostic session analysis

• Infinite free-form analysis paths and content /context investigation points

• Data presented as the user experienced (Web, Voice, Files, Emails, Chats, etc.)

• Supports massive data-sets

– Instantly navigate terabytes of data - analysis that once took days, now takes minutes

• Freeware version used by over 50,000 security experts worldwide

Investigator

14 © Copyright 2012 EMC Corporation. All rights reserved.

Automated Malware Analysis and Prioritization

Spectrum • Identify the widest spectrum of

malware-based attacks • Gain insight into attacks missed by

both traditional and modern approaches to malware protection

• Analyze attacks by utilizing a wide spectrum of investigation techniques

• Combine four distinct investigation techniques

• Automatically answer thousands of questions about the behavior of files

• Increase the speed and accuracy of

investigations

15 © Copyright 2012 EMC Corporation. All rights reserved.

A New Way to Look at Information

• Revolutionary visual interface to content on the network

– Extracts and interactively presents images, files, objects, audio, and voice for analysis

– Supports multi-touch, drilling, timeline and automatic “play” browsing

– Rapid review and triage of content

Visualize

16 © Copyright 2012 EMC Corporation. All rights reserved.

How Do You Cope With New Threats? Spear phishing attack

against your organization –

bypasses all your defenses

End-user behavior, lack of visibility, and

network realities create a gap

17 © Copyright 2012 EMC Corporation. All rights reserved.

Zero-Day : Your A/V security has failed

• You can’t rely only upon preventative tools

• Only 1 of 42 AV vendors identified the file as malicious on 03.05.2010 (virustotal.com)

• AV disabled by overwriting the host file, vendor updates routed to 127.0.0.1

• Result: if AV didn’t pick up the malware initially, it never will

Let’s take a look at how your world looks

with NetWitness…

18 © Copyright 2012 EMC Corporation. All rights reserved.

Malware Prioritization and Workflow with Spectrum

18

Spectrum automates the analysis of all network traffic to prioritize potentially malicious files unlike any other product.

Four agile scoring methods

report.zip and its contents prioritized, A/V fails

19 © Copyright 2012 EMC Corporation. All rights reserved.

Informer – Your Automated Analyst

Informer takes another angle on the problem, using the same NetWitness infrastructure to produce unique security reports and alerts – in this case intersecting multiple content-based indicators to escalate a potential incident

PDF Report

-Abnormal EXE structure -Global Security Intelligence -Crafted header -Foreign Country

20 © Copyright 2012 EMC Corporation. All rights reserved.

Precise Detail and Context with Investigator™

Investigator provides precise detail about the suspect event – in this case specific, concerning and compounding network behavior involving multiple characteristics

Threat Indicators & Intelligence

Validated Executable Fingerprint

Foreign Country

21 © Copyright 2012 EMC Corporation. All rights reserved.

Precise Detail and Context with Investigator

Investigator answers anything about the related activities of the targeted computer to obtain a complete frame of reference.

Service Breakdown

Action Profile

Target IP Address

OS & Browser Type

AD User

22 © Copyright 2012 EMC Corporation. All rights reserved.

Deeper Visibility and Layers of Discovery

FTP Traffic to a server in Belarus,

86.57.246.177

High volume (red) beacon traffic to server in China,

115.100.250.105

Through both native capabilities and data fusion NetWitness provides the analyst the most indications and warnings, e.g.: time and geographic rendering shows C&C beaconing to China and FTP traffic to Belarus.

23 © Copyright 2012 EMC Corporation. All rights reserved.

Unparalleled Analytics and Precision

The C&C beaconing to China pinpoints to a ZeuS infestation, on the target host.

Repeating download of .bin ZeuS configuration

file from China

24 © Copyright 2012 EMC Corporation. All rights reserved.

Every New Question Yields An Accurate Answer

Target computer activity shows data leakage -- FTP upload of several documents. Export, view, or VISUALIZE for all content context.

Files exfiltrated over FTP

25 © Copyright 2012 EMC Corporation. All rights reserved.

Visualize – Interact with Your Information

Dynamically interact with graphically rendered file objects observed on your network – in this case, obtain a rapid understanding the content of the stolen documents over FTP.

Files destined to Belarus

Zoom to read and review

26 © Copyright 2012 EMC Corporation. All rights reserved.

Exposing Patient Zero / Finding Root Cause

Visibility into other communications from the C&C server shows the 1st stage of the attack

Files pulled from the C&C server… is

report.zip anywhere else?

C&C server has multiple domain

aliases

27 © Copyright 2012 EMC Corporation. All rights reserved.

Demonstration Recap

• The Issue – You need to know what is happening on your network and get answers about anything at any

time

• Series of Unfortunate Events – User receives a well crafted spear-phish that bypasses all process and technology defenses – User downloads and executes a zip file from a site in China – Once executed, the victim’s machine becomes a member of a ZeuS botnet. – The ZeuS botnet begins beaconing to establish command and control with the botnet operator – Botnet operator commands the new zombie to download and execute second-stage malware – This second-stage malware successfully FTPs documents from the victim computer to a server

in Belarus.

• Only NetWitness can: – Provide pervasive network visibility into the content of all network traffic and context of all

network behavior – Deliver precise and actionable real-time intelligence that fuses your organization’s information

with the knowledge of the global security community – Get you answers to any security question on a single enterprise network monitoring platform

28 © Copyright 2012 EMC Corporation. All rights reserved.


Recommended