Your SlideShare is downloading. ×
Cyber Thursday Webinar Log Management
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Cyber Thursday Webinar Log Management

214
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
214
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. “A Championship Team”
  • 2. Bad things WILL happen With Significant Consequence
  • 3. “Secretary of State Hillary Clinton recognized the great importance of cyber security when she made a speech that gave a stern warning to potential adversaries. During which she said, "Those who disrupt the free flow of information in our society or any other pose a threat to our economy, our government and our civil society." “With the continual rise in cyber crime, corporate secrets are harder to contain (as demonstrated by recent attacks against Google, Adobe and other major companies)” “America’s economic prosperity in the 21st century will depend on cyber security”
  • 4. Network Downtime From Attack has Companies Losing Revenue Dupont Insider Attack “Large organizations are losing an “DuPont Employee Walked Away With $400 average of 2.2 percent of their annual Million In Trade Secrets revenue -- or more than $30 million -- Company scientist downloaded 22,000 sensitive to network security attacks, according documents from Dupont databases and accessed to a study on network downtime by 16,000 others as he got ready to take a job with a analyst firm Infonetics Research.” competitor…” Trustees face £500,000 fine ($780,000) for data State of California Personnel breaches under new laws Databases Cracked At the end of January, the ICO said there had been more than 800 data security breaches in just over two years” (More then one breach per day)
  • 5. • • – • – • • • – – • • –
  • 6. “Chung was arrested on Sept. 11, 2006, after federal agents searching his home found more than 300,000 pages of sensitive documents relating to the space shuttle, Delta IV rocket, F-15 fighter, B-52 bomber, CH-46/47 Chinook helicopter and other aerospace and military technologies. Over an 18-year span, Chung “Individuals in the Chinese aviation industry began traveled to China many times to sending Chung "tasking" letters as early as 1979. deliver lectures on the Space Over the years, the letters directed Chung to collect Shuttle and other programs, specific technological information, including data and he allegedly met with related to the Space Shuttle and various military and Chinese government officials civilian aircraft. Chung allegedly responded in one there to discuss how to transfer letter indicating a desire to contribute to the U.S. data. "motherland." A search of Chung’s home in Orange, California, found a 1987 letter from a Chinese official instructing Chung to use Mak as a “safe” channel.
  • 7. #1 Scores for Compatibility 100 Most Innovative users 1st Place, Security Incident and Integration of IT initiatives and Event Management Leaders Quadrant, Gold Prize: Security Finalist, Security’s Key Security Information Information and Event Contributors and and Event Management Management Products Outstanding Products
  • 8. Compliance IT Operations
  • 9. • • • •
  • 10. • CANNOT simultaneously handle Security, Compliance, and IT Ops • CANNOT collect from everything • CANNOT analyze across structured and unstructured data • HAS tradeoff between fast collection, fast analysis and efficient storage • DOES NOT normalize events to make them easy to understand • DOES NOT offer audit-quality log collection • DOES NOT have pre-packaged content • DOES NOT offer flexible, economic and long term storage • DOES NOT have real-time alerts • CANNOT integrate bi-directionally with your SIEM solutions
  • 11. • • • •
  • 12. • Categorize and normalize data for everything that you have deployed
  • 13. • Gives complete visibility for fast detection and remediation of cyber attacks
  • 14. • • • • • • • • • • •
  • 15. Drill-down reports Personalized Dashboards 10.1.1.90 Real time Alerting 10.1.1.90 Intelligent Search 10.1.1.90 AND Snort Search Save search www.arcsight.com 31