enterprise performance monitoring neteye 4 · logstash kibana ip dns file threat intelligence crm-...

17
1 … more than software © Würth Phoenix Enterprise performance monitoring Neteye 4 Unified Monitoring und Security Information und Event Management

Upload: others

Post on 02-Aug-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

1… more than software© Würth Phoenix

Enterprise performance monitoring Neteye 4 Unified Monitoring und Security Information und Event Management

Page 2: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

NTOP and Würth Phoenix are long term partner (over 10 years)

Network monitoring and visibility

Integrate ntopng enterprise in NetEye 4

Vision NetEye 4 SIEM

2… more than software© Würth Phoenix

Page 3: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

3… more than software© Würth Phoenix

Page 4: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

4

Security market

… more than software© Würth Phoenix

Page 5: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

5

SIEM defintion

… more than software© Würth Phoenix

• The term Security Information Event Management (SIEM), coined by Mark Nicolett and Amrit Williams of Gartner in 2005.

• Describes the product capabilities of • gathering, analyzing and presenting information from network and security devices• identity and access management applications• vulnerability management and policy compliance tools• operating system, database and application logs…and external threat data.

• SIEM is a term for software and products services combining security information management (SIM) and security event manager (SEM).

• The acronyms SEM, SIM and SIEM have been sometimes used interchangeably.• The segment of security management that deals with real-time monitoring, correlation of events, notifications and console views is

commonly known as Security Event Management (SEM). • The second area provides long-term storage, analysis and reporting of log data and is known as Security Information

Management (SIM).

Page 6: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

6

datasources

… more than software© Würth Phoenix

Domain Data sources Timing Collector

Network Pcap, netflow, ipfix, DPI

Real time packet processing nProbe, n2disk, Packetbeats, Logstash

Host Syslog, system state Real time, Asynchronous Safed, Auditbeats, Logstash, Winlogbeats

Database JDBC, File export Real time, Asynchronous Safed, Logstash

Application Logs Real time, Event based Beats, Logstash

Cloud Logs, API Real-time, Event based Beats, Logstash

Container Logs, eBPF Real time packet processing nProbe, Logstash

Page 7: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

7

Cloud

… more than software© Würth Phoenix

On Premise(Internal Service)

Functions

Applications

Data

Runtime

Middleware

Container

Orchestrator

O/S

Virtualization

Servers

Storage

Networking

Infrastructure(as a Service)

Functions

Applications

Data

Runtime

Middleware

Container

Orchestrator

O/S

Virtualization

Servers

Storage

Networking

Container(as a Service)

Functions

Applications

Data

Runtime

Middleware

Container

Orchestrator

O/S

Virtualization

Servers

Storage

Networking

Platform(as a Service)

Functions

Applications

Data

Runtime

Middleware

Container

Orchestrator

O/S

Virtualization

Servers

Storage

Networking

Function(as a Service)

Functions

Applications

Data

Runtime

Middleware

Container

Orchestrator

O/S

Virtualization

Servers

Storage

Networking

Software (as a Service)

Functions

Applications

Data

Runtime

Middleware

Container

Orchestrator

O/S

Virtualization

Servers

Storage

Networking

Page 8: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

8

SIEM FLOW

… more than software© Würth Phoenix

Data Collection

Extract

Normalize

Enrich

ContextDashboards Reporting

Correlation

Alerts

IP DNS FILE

Threat Intelligence

IP DNS FILE

Threat Intelligence

Page 9: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

9

SIEM Add context

… more than software© Würth Phoenix

•Add geo-location information

•Get information from DNS, Thread Intelligence

•Get User details (Department, Policy)

Examples of context

•Access from foreign locations

•Suspect data transfer (location, volume,…)

•Suspect network activities

Add context aids in identifying

Page 10: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

10

SIEM Add context

… more than software© Würth Phoenix

Jun 20 09:55:21 hwsys2 sshd[263]: Granted Access for root from 10.62.5.201 port 55462 ssh2

What else happened at this time? Near this time?What time zone in this time?

What is this service?What other messages did it produce?What other systems does it run on?

What the system IP address? Other Names/fqdn? Locations?Who is the owner? Administrator? Customer?

What else happened on it?

Who is this user? Where is he coming from?What is the real name? His organization unit?

His role/priviliges?

What is this service? Where elese does it shows logs?

What is this port? What is a common service on it?Where elese it is mentioned in logs?

DNS Name? Othe names? Whois and organization owner? Geo locations?Organization locations? Whos is the owner? And uts admin?

What else happened on it?Where is thes source?External information ?

What is the number? In this message documented anywhere>?

Page 11: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

11

Log Manager Solution Design

… more than software© Würth Phoenix

Tornado

Web Proxies EDR / EPP

IDS /IPS / NMS

Logstash

Kibana

IP DNS FILE

Threat Intelligence

CRM- SFA

Beats

FILEBEAT

PACKETBEAT

WINGLOGBEAT

AUDITBEAT

SAFED

Alerting Notification

Elasticsearch

Master Nodes (3)

Data Nodes (2+)

ML Nodes (2+)

Alerting

nBox(nProbe)

NetFlow

IPFIX

Digital signed files for

revision and integrity

Workers (2+)

Page 12: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

12

Log Manager insight input – filters - output

… more than software© Würth Phoenix

Logstash

Inputs

Beats

JDBC

TCP

UDP

HTTP

Filters

Extract Fields

Geo Enrich

Lookup Enrich

DNS Lookups

Pattern Matching

ArcSight Codec

Persistent Disk Based

Queues

Outputs

Elasticsearch

Kafka

RabbitMQRDBMS

Centralized

Configuration Management

Kafka

Redis

Messaging

Queue

Elasticsearch

Beats

Safed

nBox(nProbe)

Page 13: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

13

Log Management: Log-in/Log-out access auditing

… more than software© Würth Phoenix

Page 14: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

14

Why SIEM projects often fails ?

… more than software© Würth Phoenix

•No defined scope

Lack of Planning

•Incoherent log management data collection

•High volume of irrelevant data can overload the system

Faulty Deployment Strategies

•Lack of management oversight

•Assume plug and play

Operational

“Security is a process, not a product”

Page 15: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

15

VISION neteye SIEM

… more than software© Würth Phoenix

Log collection

Log Analysis

Event Correlation

Log Forensic

IT Compliance

Application Log Monitoring

Object Access Auditing

Container Log Monitoring

Real-time Alerting

User Activity Monitoring

Dashboard

Reporting

File Integrity Monitoring

System & Device Log monitoring

Object Access Auditing

Cloud awareness

Compliance

Security Operations

SIEM

Page 16: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

16… more than software© Würth Phoenix

Unified monitoringAvailability

SERVICE LEVEL MANAGEMENT

IT operation analyticsAPM

End2End

Unified Monitoring

Business Service Monitoring

Distributed Monitoring

Iot – IIoT Monitoring

Asset Management

Visual Synthetic Monitoring Alyvix

IT Operation Analytics

GDPR – SecurityLog management

siem

Service & SupportService management

ticketing

Log Management

SIEM

EriZone - Service Management

User Experience

Application Performance Management

on premises –Hybrid – Multi Cloud - SaaS

EriZone - CMDB

EriZone - ITIL

Web Service Monitoring

Anomaly Detection

NetEye HelpDesk

Forecasting - Prediction

Machine Learning

Log Analytics

Machine Learning

monitoring – Visibility - observability

Page 17: Enterprise performance monitoring Neteye 4 · Logstash Kibana IP DNS FILE Threat Intelligence CRM- SFA Beats FILEBEAT PACKETBEAT WINGLOGBEAT AUDITBEAT SAFED Alerting Notification

© Würth Phoenix

THANK YOU!

www.wuerth-phoenix.com

17… more than software