Security intelligence: solving the puzzle for actionable insight
Fran HowarthSenior analyst, security
Bloor Research
telling the right storyConfidential © Bloor Research 2014
http://www.logrhythm.com/resources/resource-library/analyst-reports.aspx
telling the right storyConfidential © Bloor Research 2014
The situation today
“It is not if, but when and how often”
$
$ $ $
$
Targeted Sophisticated Well-resourced
telling the right storyConfidential © Bloor Research 2014
Today’s security imperative
Prevention
Detection
Response
telling the right storyConfidential © Bloor Research 2014
Prevention alone is not enough
Prevention
Detection
Response
telling the right storyConfidential © Bloor Research 2014
Impact of malicious breaches
telling the right storyConfidential © Bloor Research 2014
Detection is the new imperative
Prevention
Detection
Response
telling the right storyConfidential © Bloor Research 2014
Malicious breaches take time to discover
telling the right storyConfidential © Bloor Research 2014
From detection to containment
telling the right storyConfidential © Bloor Research 2014
Where remediation falls short
Prevention
Detection
Response
telling the right storyConfidential © Bloor Research 2014
Time taken to resolve a breach
telling the right storyConfidential © Bloor Research 2014
The role of security intelligence platforms
telling the right storyConfidential © Bloor Research 2014
Most cost-effective security tools
telling the right storyConfidential © Bloor Research 2014
Core capabilities
Log management and analysis
Advanced analytics
Continuous monitoring
Automated remediation
Forensics
Actionableintelligence
telling the right storyConfidential © Bloor Research 2014
Sample use cases
Advanced threat management
Compliance management
Continuous monitoring
Forensic investigation
Fraud detection
Insider threat detection
Monitoring of remote facilities
Network behaviour anomaly detection
Support for multiple locations
Web application defence