Presentation is loading. Please wait.

Presentation is loading. Please wait.

Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.

Similar presentations


Presentation on theme: "Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business."— Presentation transcript:

1 Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business

2

3

4 TRADITIONAL APPROACHES ARE NOT ENOUGH… Impossible to pre-define all rulesConstant fear of breachesActivities without context

5 HUMANS ARE THE NEW PERIMETER ”Professionals target people. And any solutions will have to target the people problem, not the math problem”

6 CONTEXTUAL SECURITY INTELLIGENCE Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI Immediate reaction Real-time knowledge of all actions Recognition of the unusual Norm and pattern recognition and learning

7 BENEFIT AREAS OF CSI Intervention in the kill chain Breach Prevention Behavior Intelligence Efficient forensics Security Operations Initiation of new policies Compliance ROI Breach & account risk detection Risk Assessment Risk Compliance Breach Operations Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI

8 BREACH PREVENTION Breach Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Unusual behavior patterns ●Insider threats and hijacked accounts ●APT Kill Chain

9 SECURITY OPERATIONS Operations Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Response & forensics capabilities ●Real-time notificatin & alerting ●Automated security reactions & intervention

10 RISK ASSESSMENT Risk Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Account and global risk estimation ●Identifying policy violations ●Gap between privileges and actual behavior

11 COMPLIANCE Compliance Discover Anomalies Investigate & Respond Monitor Activities Profile Users CSI ●Audit and review ●Integration with existing systems ●Prioritize and highlight critical areas

12  Instant access to data  Centralized data collection  Data delivery for analytics  Filtering and normalization Vast amount of data Access and monitoring CONTEXTUAL SECURITY INTELLIGENCE SUITE 12 Enriched Data Platform  Manage all access points  Transparent monitoring  Visualize commited actions  Movie-like replay & search  Machine learning of activities  Anomaly Detection  Real-time intervention  Risk scoring and alerting The User Perspective Behavioural Analytics The Problem The Solution CSI.DATA CSI.USER CSI.RISK Not asked and not known

13 ARCHITECTURE - SIMPLIFIED

14 PREVENTION BY MONITORING LET’S EXAMINE A HUMAN ATTACK! 1234567 8 Initial intrusion Time-frame for preventionForensics Outbound connection Expand accessStrengthen foothold Exfiltrate data 9 Cover tracks

15 CONTEXTUAL SECURITY INTELLIGENCE SUITE IN ACTION Privileged User User Profiles Login Time Login Location Host login Commands Keystrokes Mouse Applications Peer groups Privileged User Behavior Analytics Log Activity Log Activity Session Activity Session Activity

16 CONTEXTUAL SECURITY INTELLIGENCE SUITE IN ACTION Privileged Imposter User Profiles Login Time Login Location Host login Commands Keystrokes Mouse Applications Peer groups Privileged User Behavior Analytics Log Activity Log Activity Session Activity Session Activity Discover Security Operations Center

17 CONTEXTUAL SECURITY INTELLIGENCE SUITE IN ACTION Privileged Imposter User Profiles Login Time Login Location Host login Commands Keystrokes Mouse Applications Peer groups Privileged User Behavior Analytics Log Activity Log Activity Session Activity Session Activity Discover Security Operations Center Investigate Respond

18 HIGHLY VISUAL INTERFACE IT IS THE REAL-TIME DASHBOARD

19

20 HOW IS CSI DIFFERENT? Traditional security approachContextual security approach Manually definedSelf learning Enforcing controlReal-time knowledge & interaction Security damages continuityMore Security with more freedom ROI only when accatckedImmediate visibility of ROI Partial visionFull knowledge of all actions

21 London Tower 42, 25 Old Broad Street, London EC2N 1HN Paris 105, rue Jules Guesde, 92300 Levallois Perret New York 40 Wall St. 28th Floor, NYC, NY 10005 Munich Stefan-George-Ring 29. D-81929 München 200+ employees > 50% y/y growth over year 100+ resellers 600 Customers Budapest Alíz street 2. H-1117 Budapest

22 ERIC.PARIETTI@BALABIT.COM Follow us!

23 THANK YOU Follow us!


Download ppt "Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business."

Similar presentations


Ads by Google