SlideShare a Scribd company logo
1 of 25
Download to read offline
1
Discover Fluency
www.fluencysecurity.com
Copyright 2003-2016
Fluency
2
Next Generation Incident Response – Real Time Network
Visibility
Next Generation Incident Response utilizing Big Data Analytics.
Fluency’s speed provides the capabilities of ingesting network
flow data as well as multiple log feeds from disparate security
solutions. Fluency analyzes, fuses, cross correlates flow & log
data. Fluency then further validates the alerts against reputation
& validation engines.
Three Things
3
Records all attributes & events performing real time analytics.
No other product can do this at high bandwidth speeds.
Captures all files being transported via http & reviews with all
known AV products.
Incorporates Flow Analytics to determine events that did not
trigger detection.
Fluency does better than any security offering in the
marketplace
Single View, Multiple Perspectives
4
Provide an integrated view organized by flow
Third Party analysis of
artifacts
Blue Coat MAA and
VirusTotal
Meta provides insight
indirect to the event
itself
Fluency Metadata sensor
Derived data provides
insight from interaction
Deployed IPS, IDS,
Firewalls and Web Filters
Validation Metadata Derived Data
Vision
5
Presenting Alerts by Flows is Natural
Same Approach Always
‣ High End-High Load Implementation Current Fluency deployment
includes 1 of 13 root DNS servers. Requirements include 10Gbps access points. Fluency’s
F-10 offering meets the requirements of over 30,000 EPS & 6,000,000,000 events per day.
‣ SMB/Remote Office Implementation Fluency’s F-250 provides a
250Mbps inline bypass network interface; no tap needed. ESET Antivirus is built into the
system scanning transmitted files. Provides the full flow capability of the high-end offerings
at a lower investment.
6
Fluency provides offerings from 100Mbps to 10Gbps
F-250 F-1 F-5 F-10
250 Mbps 1 Gbps 5 Gbps 10 Gbps
Fluency
7
Architecture
Fluency is deployed in a combination of Sensors & Big Data
Analytic Servers
The Sensors collect Metadata Network Flows (MetaFlows), Full
Packet Capture plus events from other devices
• Monitors the Network
Big Data Analytic Servers find gaps & direct response to provide
the means to remove issues
• Patent Pending Big Data Backend
Increase of detected security
incidents in 2015 (PWC Study)
Organizations don’t have
sufficient security resources
to review dramatic > in
number of alerts
8
Numbers from multiple studies
Invest in Response tools that
incorporate Big Data analytics &
cross correlation, radically reducing
staffing requirements & the number
of alerts needing review to a
manageable number
Fluency Answers
$7,700,000 Avg.
Financial Cost
per Breach
Issue SolutionImpact
Emphasis Today is Detection;
Sound Security Posture Requires Focus On Response
137% Increase
WHY
9
Security is broken.
Today the focus is on
detection. The real need is
how to execute a response
consistently, comprehensively
& continuously.
HOW
Fluency Big Data
Provides the ability to handle
vast amounts of data. To do this,
data without relationships.
Instead of joining data, Fluency
performs recursive calls.
Alert Lifecycle in an Incident
10
Key events detect an aspect of an attack
Alert is a message with attributes (client address, server address,
server host name, user name …)
Tag
Attributes of an attack can be marked malicious, such as server address
and server host name
Scope
Determine other addresses associated with the server host name
Track
Watch to see if these attributes appear on other communications
regardless of the original alert message
Recover
Resolving Issues
11
Focusing on Detection, Hinders Response
Validate Scope Track
Provide
Supporting Data
Perspectives that
Confirm Detection
is Correct
Determine if
Associated
Attributes are
Malicious. Pivot
on new scope till
no new malicious
attributes
Determine assets
to freeze &
recover, while
preventing flow
from threats
Continually watch
threats & their
attributes to insure
that there are no
new related flows
Scope, Categorize & Pivot
12
Tasks an analyst does repeatedly
Scope: Determine all attributes & artifacts associated
with a negative attribute
Categorize: Determine if associated attribute is negative
Pivot: Review the scope of any negative attribute
Search Speed limits the number of pivots
Key Events
File Capture to Analysis Process Built In
!
!
!
Tags
Antivirus
Alerts
?Perspective
Vision
14
Provides the means to
merge the alerts
detected & not detected
by deployed solutions to
Fluency's perspective.
Fluency provides a
holistic/comprehensive
picture, not the
snapshot organizations
see today.
15
The Power of Search
If Google took 3 minutes to perform a search; would anyone use it? NO. One
should expect the same from their Incident Response process. Fluency’s patent
pending Big Data Analytics technology provides the ability to search
billions of events in sub-seconds.
Data Volumes
16
Metadata Firewall
EventData
AlertData
Metadata is 3X larger than Firewall logs
1 Gbps line
210M Separate Events 70M 1.2M 10K
SanKey
17
Seeing the Flow of Data
Alerts
Centralized View of Alerts
18
300
5
0 Gb Customer sees only
the prevention alerts,
resulting in false
belief all secure
Fluency Results
19
622
130
10 Gb Fluency clearly sees:
• Threats
• Infected Machines
• Malicious traffic
20
Fluency
21
Fluency RSA SA McAfee Nitro Lancope Blue Coat Fidelis FireEye ArcSight
NGIR Components
Full Packet Capture     
Metaflow Capture  Netflow  Netflow
File Extraction      
Big Database  Arc Logger
Real-time Search 
Full Field Indexing  
Integrated Components
Threat Feeds   Internal Internal Internal 
Reputation Feeds   Internal Internal Internal 
Validation Engines    Sophos 
Workflow       
Automated Response Mar ‘16      
Cloud Option 
Multi-tenant 
Next Generation Incident Response (NGIR)
Fluency is at the forefront of this developing market segment utilizing patent pending Big
Data Analytics & incorporating Full Packet Capture
What Customers are Saying
22
Fluency’s integration into the Cisco ASA platform has
enhanced American Fidelity Assurance Company’s
investment in our deployed Cisco ASA environment and
improved our security posture. Specifically, Fluency
added additional value by being able to identify, track,
and mitigate security issues in a timely and efficient
manner.
“
”— David Maberry
Chief Risk Officer
Fluency
• Accomplishes the fusion of events of the server & the customer’s 10Gbps access point in
an environment with requirements of over 30,000 EPS & 6,000,000,000 events a day.
• Reduced number of alerts needing analysis from 450,000,000 to 16 per day.
• Discovered 12 actionable incidents that affected 14 devices in 14 days that existing
security systems (IPS, Anti-Virus, Etc.) did not detect.
• Detected an internal host communicating with 696 IP’s located in 46 different countries,
that triggered 6 alerts that other security solutions deployed in the environment trusted.
• Discovered > 620 infected machines & 130 C&C systems with more than 10GB of data
leaving per day. All deployed solutions showed the attack was prevented. Fluency
exposed there was a breach & provided timely resolution.
Next Generation Incident Response – Realized Value from Customers/POVs
23
Industry Buzz - Click on each to learn more
24
04/20/15
07/15/15 08/03/15
25
contact: fluency@lumenate.com

More Related Content

What's hot

User and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsUser and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsInterset
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics Interset
 
A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015Scott Van Valkenburgh
 
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)Security Bootcamp
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSPriyanka Aash
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsPriyanka Aash
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopYahoo Developer Network
 
Splunk for security
Splunk for securitySplunk for security
Splunk for securityGreg Hanchin
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for CybersecurityVMware Tanzu
 
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider ThreatsWEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider ThreatsInterset
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centerVenkat Projects
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]Interset
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 

What's hot (15)

User and Entity Behavioral Analytics
User and Entity Behavioral AnalyticsUser and Entity Behavioral Analytics
User and Entity Behavioral Analytics
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
 
A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015A_New_Perspective_Whitepaper_05122015
A_New_Perspective_Whitepaper_05122015
 
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with Hadoop
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider ThreatsWEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
 
cb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digitalcb-EDR-V7_a4_Digital
cb-EDR-V7_a4_Digital
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 

Viewers also liked (19)

QualBlogPresentation
QualBlogPresentationQualBlogPresentation
QualBlogPresentation
 
eng c
eng ceng c
eng c
 
Tenses
TensesTenses
Tenses
 
MAYER, James 2015
MAYER, James 2015MAYER, James 2015
MAYER, James 2015
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Influenta factorilor de_mediu_asupra_corpurilor_cu_viata
Influenta factorilor de_mediu_asupra_corpurilor_cu_viataInfluenta factorilor de_mediu_asupra_corpurilor_cu_viata
Influenta factorilor de_mediu_asupra_corpurilor_cu_viata
 
Near to possession project in noida extension
Near to possession project in noida extensionNear to possession project in noida extension
Near to possession project in noida extension
 
writing sample redacted
writing sample redactedwriting sample redacted
writing sample redacted
 
Tas 1 ( redrafted)
Tas 1 ( redrafted)Tas 1 ( redrafted)
Tas 1 ( redrafted)
 
lecture11_2013
lecture11_2013lecture11_2013
lecture11_2013
 
Dreams together
Dreams togetherDreams together
Dreams together
 
L cron ppp
L cron pppL cron ppp
L cron ppp
 
Aironet
AironetAironet
Aironet
 
ლოცვის საზღაური
ლოცვის საზღაურილოცვის საზღაური
ლოცვის საზღაური
 
D01_Gruppo-editoriale-lespresso-Madonna
D01_Gruppo-editoriale-lespresso-MadonnaD01_Gruppo-editoriale-lespresso-Madonna
D01_Gruppo-editoriale-lespresso-Madonna
 
LCron_FinalPPP
LCron_FinalPPPLCron_FinalPPP
LCron_FinalPPP
 
LO7 physics 101
LO7 physics 101LO7 physics 101
LO7 physics 101
 
Apartments In Noida Extention
Apartments In Noida ExtentionApartments In Noida Extention
Apartments In Noida Extention
 
მოგზაურობა წმიდა მთაზე
მოგზაურობა წმიდა მთაზემოგზაურობა წმიდა მთაზე
მოგზაურობა წმიდა მთაზე
 

Similar to Fluency - Next Generation Incident Response Utilizing Big Data Analytics Overview

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAmazon Web Services
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...ijtsrd
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inmaribethy2y
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlationfrantzyv
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 

Similar to Fluency - Next Generation Incident Response Utilizing Big Data Analytics Overview (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 

Recently uploaded

Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 

Recently uploaded (20)

Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 

Fluency - Next Generation Incident Response Utilizing Big Data Analytics Overview

  • 2. Fluency 2 Next Generation Incident Response – Real Time Network Visibility Next Generation Incident Response utilizing Big Data Analytics. Fluency’s speed provides the capabilities of ingesting network flow data as well as multiple log feeds from disparate security solutions. Fluency analyzes, fuses, cross correlates flow & log data. Fluency then further validates the alerts against reputation & validation engines.
  • 3. Three Things 3 Records all attributes & events performing real time analytics. No other product can do this at high bandwidth speeds. Captures all files being transported via http & reviews with all known AV products. Incorporates Flow Analytics to determine events that did not trigger detection. Fluency does better than any security offering in the marketplace
  • 4. Single View, Multiple Perspectives 4 Provide an integrated view organized by flow Third Party analysis of artifacts Blue Coat MAA and VirusTotal Meta provides insight indirect to the event itself Fluency Metadata sensor Derived data provides insight from interaction Deployed IPS, IDS, Firewalls and Web Filters Validation Metadata Derived Data
  • 5. Vision 5 Presenting Alerts by Flows is Natural
  • 6. Same Approach Always ‣ High End-High Load Implementation Current Fluency deployment includes 1 of 13 root DNS servers. Requirements include 10Gbps access points. Fluency’s F-10 offering meets the requirements of over 30,000 EPS & 6,000,000,000 events per day. ‣ SMB/Remote Office Implementation Fluency’s F-250 provides a 250Mbps inline bypass network interface; no tap needed. ESET Antivirus is built into the system scanning transmitted files. Provides the full flow capability of the high-end offerings at a lower investment. 6 Fluency provides offerings from 100Mbps to 10Gbps F-250 F-1 F-5 F-10 250 Mbps 1 Gbps 5 Gbps 10 Gbps
  • 7. Fluency 7 Architecture Fluency is deployed in a combination of Sensors & Big Data Analytic Servers The Sensors collect Metadata Network Flows (MetaFlows), Full Packet Capture plus events from other devices • Monitors the Network Big Data Analytic Servers find gaps & direct response to provide the means to remove issues • Patent Pending Big Data Backend
  • 8. Increase of detected security incidents in 2015 (PWC Study) Organizations don’t have sufficient security resources to review dramatic > in number of alerts 8 Numbers from multiple studies Invest in Response tools that incorporate Big Data analytics & cross correlation, radically reducing staffing requirements & the number of alerts needing review to a manageable number Fluency Answers $7,700,000 Avg. Financial Cost per Breach Issue SolutionImpact Emphasis Today is Detection; Sound Security Posture Requires Focus On Response 137% Increase
  • 9. WHY 9 Security is broken. Today the focus is on detection. The real need is how to execute a response consistently, comprehensively & continuously. HOW Fluency Big Data Provides the ability to handle vast amounts of data. To do this, data without relationships. Instead of joining data, Fluency performs recursive calls.
  • 10. Alert Lifecycle in an Incident 10 Key events detect an aspect of an attack Alert is a message with attributes (client address, server address, server host name, user name …) Tag Attributes of an attack can be marked malicious, such as server address and server host name Scope Determine other addresses associated with the server host name Track Watch to see if these attributes appear on other communications regardless of the original alert message
  • 11. Recover Resolving Issues 11 Focusing on Detection, Hinders Response Validate Scope Track Provide Supporting Data Perspectives that Confirm Detection is Correct Determine if Associated Attributes are Malicious. Pivot on new scope till no new malicious attributes Determine assets to freeze & recover, while preventing flow from threats Continually watch threats & their attributes to insure that there are no new related flows
  • 12. Scope, Categorize & Pivot 12 Tasks an analyst does repeatedly Scope: Determine all attributes & artifacts associated with a negative attribute Categorize: Determine if associated attribute is negative Pivot: Review the scope of any negative attribute Search Speed limits the number of pivots
  • 13. Key Events File Capture to Analysis Process Built In ! ! ! Tags Antivirus Alerts ?Perspective
  • 14. Vision 14 Provides the means to merge the alerts detected & not detected by deployed solutions to Fluency's perspective. Fluency provides a holistic/comprehensive picture, not the snapshot organizations see today.
  • 15. 15 The Power of Search If Google took 3 minutes to perform a search; would anyone use it? NO. One should expect the same from their Incident Response process. Fluency’s patent pending Big Data Analytics technology provides the ability to search billions of events in sub-seconds.
  • 16. Data Volumes 16 Metadata Firewall EventData AlertData Metadata is 3X larger than Firewall logs 1 Gbps line 210M Separate Events 70M 1.2M 10K
  • 17. SanKey 17 Seeing the Flow of Data Alerts
  • 18. Centralized View of Alerts 18 300 5 0 Gb Customer sees only the prevention alerts, resulting in false belief all secure
  • 19. Fluency Results 19 622 130 10 Gb Fluency clearly sees: • Threats • Infected Machines • Malicious traffic
  • 20. 20
  • 21. Fluency 21 Fluency RSA SA McAfee Nitro Lancope Blue Coat Fidelis FireEye ArcSight NGIR Components Full Packet Capture      Metaflow Capture  Netflow  Netflow File Extraction       Big Database  Arc Logger Real-time Search  Full Field Indexing   Integrated Components Threat Feeds   Internal Internal Internal  Reputation Feeds   Internal Internal Internal  Validation Engines    Sophos  Workflow        Automated Response Mar ‘16       Cloud Option  Multi-tenant  Next Generation Incident Response (NGIR) Fluency is at the forefront of this developing market segment utilizing patent pending Big Data Analytics & incorporating Full Packet Capture
  • 22. What Customers are Saying 22 Fluency’s integration into the Cisco ASA platform has enhanced American Fidelity Assurance Company’s investment in our deployed Cisco ASA environment and improved our security posture. Specifically, Fluency added additional value by being able to identify, track, and mitigate security issues in a timely and efficient manner. “ ”— David Maberry Chief Risk Officer
  • 23. Fluency • Accomplishes the fusion of events of the server & the customer’s 10Gbps access point in an environment with requirements of over 30,000 EPS & 6,000,000,000 events a day. • Reduced number of alerts needing analysis from 450,000,000 to 16 per day. • Discovered 12 actionable incidents that affected 14 devices in 14 days that existing security systems (IPS, Anti-Virus, Etc.) did not detect. • Detected an internal host communicating with 696 IP’s located in 46 different countries, that triggered 6 alerts that other security solutions deployed in the environment trusted. • Discovered > 620 infected machines & 130 C&C systems with more than 10GB of data leaving per day. All deployed solutions showed the attack was prevented. Fluency exposed there was a breach & provided timely resolution. Next Generation Incident Response – Realized Value from Customers/POVs 23
  • 24. Industry Buzz - Click on each to learn more 24 04/20/15 07/15/15 08/03/15