SlideShare a Scribd company logo
RuSIEM Analytics
From SIEM to business processes
CEO, Co-founder RuSIEM
Olesya Shelestova
oshelestova@rusiem.com
Imagine: You bring a robot into the company
What are the first steps you take?
2
Step-by-step. T-PDCA.
• Teach him to "basic functions“
• Teach it to the “compound functions”
• Try it in a real process
• Define its tasks
• Continue to "teach him" for a real process
• Periodically, the necessary improvements
Try on  Plan  Do  Check  Act
3
What the customer wants
• Big red auto-button
• Automation and cost reduction for processes and employees
• Know everything that happens in real time
• Timely prevention of incidents affecting the business
• Staff wants to feel their importance in business and their careers
• All important and required information should be available from a
single location
• Have process evaluation indicators
God mode ON
4
Our team
• Development since from 2014
• All team members have extensive experience in developing
• Product architects have experience in development other SIEM
• The product technology based on practical experience and the use of SIEM/LM
• The product has already been successfully used in many enterprise companies
5
#Team
6
7 members of the current team:
• 2 – php, JS, backbone
• 2 – c+ STL linux
• 1 – agent for windows, c#/.net
• 1 – Analytics: java/scala/apps for Apache Storm
• 1 – Analytic for KB (correlation rule, integrations, symptomatic,
normalizations rule)
#Why_need_investments
• The product is already ready
• We have successful implementation and sales
• There is already an RuSIEM Analytics working on the customer side,
without cloud
• In a short period of time, we were able to realize much more than
large companies with large resources
7
And it really works already stably!
Past year Last 2 year With labor costs
over < 1 month
With labor costs
1-3 month
All tasks 308 734 490 244
Original features > 26 > 60 16 44
Customers cases 163 207 84 123
Bugs 54 137 116 21
Bugs from
customers
11 24 14 10
Successful
implementation
> 23 > 50
RvSIEM free version
installed at
customers
693 online unique installations around the world
(by statistics of requested updates on 02 june 2017)
8
• All companies want automation: processes, employees, detect of the
incidents
• Existing solutions AI / ML can not work at low hardware power
• As the business is tied heavily on IT - necessary processing and
analysis in real time
9
What tasks are solved by our product
• Ensuring continuity of IT infrastructure
• Detection of incidents of information security
• Detection of incidents affecting on business processes
• Analysis of business process metrics
• Interfacing units and employees through the built-in workflow
• Identifying incidents without the need for correlation rules
• All detection processes in real time
• Increase the chance of detecting an incident through multiple sources of
events
• Real-time big data without a scalability limit
• No cloud solution is required, limited hardware resources are used
10
5+ stage of product development
LM SIEM Analytics Business AnalyticsEmployee Profiling
11
Why need LM
LM SIEM
12
Employee Profiling Business AnalyticsAnalytics
LM:
• Collection of states from various sources (events, surveys)
• Connectors to many different systems
• Event normalization (single taxonomy, key: value)
• Saving to big data for further analysis and queries
• Ensuring continuity of the collection and the absence of loss events
Why need SIEM
LM SIEM
13
Employee Profiling Business AnalyticsAnalytics
SIEM:
• Managed Correlation for real-time Incident Detection and Prevention
• Incident recording and timely notification
• Proactive actions - running the script, blocking ip ...
• Reports on processes, incident management, unloading of events,
compliance with standards
• Correlation rules help to reduce the number of false positives from
Analytics
Analytics
Analytics:
Complex calculations and reports
Baseline indicators
Real-time analysis of multiple user-controlled algorithms
Managed and user-configurable analytics
Elimination of "heavy" and historical analyzes from correlation for real-time
Detection of threats without the need to create many of correlation rules (by
case)
Provide data sets for quick access
14
LM SIEM Employee Profiling Business AnalyticsAnalytics
Auxiliary objectives of SIEM Analytics
• Provide a quick demo to the customer
• Ensure rapid implementation and successful installation
• A wide range of detected incidents without correlation rules
• Providing complex calculations and algorithms (back-end for
correlations and reports)
15
Personal profiling
• What is the employee's: pass, logins, access rights, email addresses,
where he enters the system
• Interests, queries, social pages, social circle, etc.
• What systems did I enter into, what did I do
• Change of activities and current activities that can affect the company
and its business
Pre-enrichment of the selected entities in real time
from a data set that already exists in the system.
16
Business analytics, part 1
• Description and formalization of business processes
• Assessing the impact of IT and IS components on the business process
(vulnerabilities, personnel, staff actions, infrastructure errors, unauthorized
actions, etc.) in real time:
• Formalization and understanding of what is affected by a separate server, windows
service, account
• Incidents are not about IT components, but with an assessment of the impact on the
business process
• Continuity, process availability and information integrity
• Prioritization of tasks and incidents for effective work of the units
• Valuation of works, measures
• Risks, their financial assessment depending on the processes
17
Business analytics, part 2
• Description and formalization of business processes in information systems in real
time
• Evaluation of business performance in real time:
• Movement of financial flows, trends
• Account balances
• Targeting (targeted services and offers)
• Customer refusals from orders on portals and their interests
• The success of PR actions and news about the company / products
• Assessment of trends (baseline) with the registration of bursts and deviations, violations of
processes, inaccessibility of services.
• If the IT component fails, notify the unavailability of the process in which it is involved.
• Analysis for the purpose of stopping the service on a historical and current trend -
when it is possible to carry out technical work with minimal financial and
reputation losses
18
Needs and consumers
LM SIEM Analytics Profiling BA
IT IS Business units PR & Marketing Security
19
Sales model
20
• Sales through partners (integrators, software distributors)
• Rare sales directly to key customers and partners (example: partner located in
other country)
• Clients: any sphere of activity of the companies in which the business depends
on IT infrastructure
• A solution out of the box, or an adaptation for solving customer cases (if it is
not yet supported and can be scaled for other customers)
• Technical support is provided by our company, or partners as the first line of
support
• Integration is carried out by the partners, or RuSIEM (if the partner does not
have its own qualified specialists)
Market
• Not only SIEM. SIEM is an outdated term.
• Currently 15 companies have been implementing
• Over 25 customers in 2017 already awaiting implementation
• For 2018-2019 already planned more than 190 implementations for
customers (we do not have marketing)
• Our partners and customers are located: Russia, Spain, Italy, Norway,
Brazil.
• Over the past month, we have more than 10 customers wishing to
switch from free RvSIEM to a commercial version
21
Thank you for attention
CEO, Co-founder RuSIEM
Olesya Shelestova
oshelestova@rusiem.com
22
Why did we do LM / SIEM
• Each component is a separate product
• Sets of the modules - can be used as separate products for solving
various tasks
• Real-time analytics just require what LM / SIEM does:
• Data collection from a variety of sources for comprehensive analysis
• The reduction to the same type of format (key: value and taxonomy)
• Interpretation to various levels of representations (machine, operator,
analyst, logical connections)
• Removing unnecessary data from an event
• A stream of normalized events to analytics in real time
23

More Related Content

What's hot

Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
akquinet enterprise solutions GmbH
 

What's hot (20)

SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]SAST Threat Detection for SAP [Webinar]
SAST Threat Detection for SAP [Webinar]
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
Qradar as a SOC core
Qradar as a SOC coreQradar as a SOC core
Qradar as a SOC core
 
SIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security ArsenalSIEM - Your Complete IT Security Arsenal
SIEM - Your Complete IT Security Arsenal
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
Hp arcsight services 2014 ewb
Hp arcsight services 2014   ewbHp arcsight services 2014   ewb
Hp arcsight services 2014 ewb
 
ECMDAY2015 - Kaido Jarvemets - Managing Configuration Manager with PowerShell
ECMDAY2015 - Kaido Jarvemets -  Managing Configuration Manager with PowerShellECMDAY2015 - Kaido Jarvemets -  Managing Configuration Manager with PowerShell
ECMDAY2015 - Kaido Jarvemets - Managing Configuration Manager with PowerShell
 
Event log analyzer by me
Event log analyzer by me Event log analyzer by me
Event log analyzer by me
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Dos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your NetworkDos and Don’ts for Managing External Connectivity to/from Your Network
Dos and Don’ts for Managing External Connectivity to/from Your Network
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]SAST Interface Management for SAP systems [Webinar]
SAST Interface Management for SAP systems [Webinar]
 
SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis SIEM 101: Get a Clue About IT Security Analysis
SIEM 101: Get a Clue About IT Security Analysis
 
EventLog Analyzer - Product overview
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overview
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 

Similar to From SIEM to Business processes

Key Components of a Successful Automation Implementation 
Key Components of a Successful Automation Implementation Key Components of a Successful Automation Implementation 
Key Components of a Successful Automation Implementation 
Precisely
 

Similar to From SIEM to Business processes (20)

what-is-bpm-1234452005226143-34862409.ppt
what-is-bpm-1234452005226143-34862409.pptwhat-is-bpm-1234452005226143-34862409.ppt
what-is-bpm-1234452005226143-34862409.ppt
 
Senseity
SenseitySenseity
Senseity
 
What is BPM?
What is BPM?What is BPM?
What is BPM?
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
 
Abhi bhalla a 02
Abhi bhalla a 02Abhi bhalla a 02
Abhi bhalla a 02
 
Enterprise Process Automation Suite
Enterprise Process Automation SuiteEnterprise Process Automation Suite
Enterprise Process Automation Suite
 
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the EnterpriseNZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
NZS-4555 - IT Analytics Keynote - IT Analytics for the Enterprise
 
Intelligent Process Management
Intelligent Process ManagementIntelligent Process Management
Intelligent Process Management
 
Erp
Erp Erp
Erp
 
Auxis Webinar: Diving into RPA
Auxis Webinar: Diving into RPAAuxis Webinar: Diving into RPA
Auxis Webinar: Diving into RPA
 
De-mystifying Robotic Process Automation
De-mystifying Robotic Process AutomationDe-mystifying Robotic Process Automation
De-mystifying Robotic Process Automation
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
The Business Value of System Center 2012
The Business Value of System Center 2012The Business Value of System Center 2012
The Business Value of System Center 2012
 
Operational Process Analytics - Why traditional analytics and monitoring are ...
Operational Process Analytics - Why traditional analytics and monitoring are ...Operational Process Analytics - Why traditional analytics and monitoring are ...
Operational Process Analytics - Why traditional analytics and monitoring are ...
 
What is Robotics Process Automation ?
What is Robotics Process Automation ?What is Robotics Process Automation ?
What is Robotics Process Automation ?
 
Fyipe - One complete DevOps and IT Ops platform.
Fyipe - One complete DevOps and IT Ops platform. Fyipe - One complete DevOps and IT Ops platform.
Fyipe - One complete DevOps and IT Ops platform.
 
HR Software - Find Your Match
HR Software - Find Your MatchHR Software - Find Your Match
HR Software - Find Your Match
 
2017 1221-orgzit engineering erp
2017 1221-orgzit engineering erp2017 1221-orgzit engineering erp
2017 1221-orgzit engineering erp
 
Key Components of a Successful Automation Implementation 
Key Components of a Successful Automation Implementation Key Components of a Successful Automation Implementation 
Key Components of a Successful Automation Implementation 
 
A case of Fusion Middleware - iLOUG 2013
A case of Fusion Middleware - iLOUG 2013A case of Fusion Middleware - iLOUG 2013
A case of Fusion Middleware - iLOUG 2013
 

More from Olesya Shelestova

RuSIEM. Потребители. Состав продукта. Отличия. Применение.
RuSIEM. Потребители. Состав продукта. Отличия. Применение.RuSIEM. Потребители. Состав продукта. Отличия. Применение.
RuSIEM. Потребители. Состав продукта. Отличия. Применение.
Olesya Shelestova
 
автоматизируем пентест Wifi сети
автоматизируем пентест Wifi сетиавтоматизируем пентест Wifi сети
автоматизируем пентест Wifi сети
Olesya Shelestova
 

More from Olesya Shelestova (17)

Руководство по формату событий для разработчиков
Руководство по формату событий для разработчиковРуководство по формату событий для разработчиков
Руководство по формату событий для разработчиков
 
RuSIEM vs SOC (En)
RuSIEM vs SOC (En)RuSIEM vs SOC (En)
RuSIEM vs SOC (En)
 
RuSIEM vs SOC (Rus)
RuSIEM vs SOC (Rus)RuSIEM vs SOC (Rus)
RuSIEM vs SOC (Rus)
 
RuSiem events collection and forwarding
RuSiem events collection and forwardingRuSiem events collection and forwarding
RuSiem events collection and forwarding
 
RuSIEM IT assets
RuSIEM IT assetsRuSIEM IT assets
RuSIEM IT assets
 
How to create correlation rule for threat detection in RuSIEM
How to create correlation rule for threat detection in RuSIEMHow to create correlation rule for threat detection in RuSIEM
How to create correlation rule for threat detection in RuSIEM
 
Deploy RvSIEM (eng)
Deploy RvSIEM (eng)Deploy RvSIEM (eng)
Deploy RvSIEM (eng)
 
Free RvSIEM. Intro (Rus)
Free RvSIEM. Intro (Rus)Free RvSIEM. Intro (Rus)
Free RvSIEM. Intro (Rus)
 
Rusiem 2017_обзор
Rusiem 2017_обзорRusiem 2017_обзор
Rusiem 2017_обзор
 
SIEM use cases - как их написать
SIEM use cases - как их написатьSIEM use cases - как их написать
SIEM use cases - как их написать
 
Корреляция в SIEM системах
Корреляция в SIEM системахКорреляция в SIEM системах
Корреляция в SIEM системах
 
SIEM для ИТ
SIEM для ИТSIEM для ИТ
SIEM для ИТ
 
RuSIEM. Потребители. Состав продукта. Отличия. Применение.
RuSIEM. Потребители. Состав продукта. Отличия. Применение.RuSIEM. Потребители. Состав продукта. Отличия. Применение.
RuSIEM. Потребители. Состав продукта. Отличия. Применение.
 
RuSIEM 2016
RuSIEM 2016RuSIEM 2016
RuSIEM 2016
 
RuSIEM (15.11.2015)
RuSIEM (15.11.2015)RuSIEM (15.11.2015)
RuSIEM (15.11.2015)
 
RuSIEM
RuSIEMRuSIEM
RuSIEM
 
автоматизируем пентест Wifi сети
автоматизируем пентест Wifi сетиавтоматизируем пентест Wifi сети
автоматизируем пентест Wifi сети
 

Recently uploaded

Recently uploaded (20)

Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 

From SIEM to Business processes

  • 1. RuSIEM Analytics From SIEM to business processes CEO, Co-founder RuSIEM Olesya Shelestova oshelestova@rusiem.com
  • 2. Imagine: You bring a robot into the company What are the first steps you take? 2
  • 3. Step-by-step. T-PDCA. • Teach him to "basic functions“ • Teach it to the “compound functions” • Try it in a real process • Define its tasks • Continue to "teach him" for a real process • Periodically, the necessary improvements Try on  Plan  Do  Check  Act 3
  • 4. What the customer wants • Big red auto-button • Automation and cost reduction for processes and employees • Know everything that happens in real time • Timely prevention of incidents affecting the business • Staff wants to feel their importance in business and their careers • All important and required information should be available from a single location • Have process evaluation indicators God mode ON 4
  • 5. Our team • Development since from 2014 • All team members have extensive experience in developing • Product architects have experience in development other SIEM • The product technology based on practical experience and the use of SIEM/LM • The product has already been successfully used in many enterprise companies 5
  • 6. #Team 6 7 members of the current team: • 2 – php, JS, backbone • 2 – c+ STL linux • 1 – agent for windows, c#/.net • 1 – Analytics: java/scala/apps for Apache Storm • 1 – Analytic for KB (correlation rule, integrations, symptomatic, normalizations rule)
  • 7. #Why_need_investments • The product is already ready • We have successful implementation and sales • There is already an RuSIEM Analytics working on the customer side, without cloud • In a short period of time, we were able to realize much more than large companies with large resources 7 And it really works already stably!
  • 8. Past year Last 2 year With labor costs over < 1 month With labor costs 1-3 month All tasks 308 734 490 244 Original features > 26 > 60 16 44 Customers cases 163 207 84 123 Bugs 54 137 116 21 Bugs from customers 11 24 14 10 Successful implementation > 23 > 50 RvSIEM free version installed at customers 693 online unique installations around the world (by statistics of requested updates on 02 june 2017) 8
  • 9. • All companies want automation: processes, employees, detect of the incidents • Existing solutions AI / ML can not work at low hardware power • As the business is tied heavily on IT - necessary processing and analysis in real time 9
  • 10. What tasks are solved by our product • Ensuring continuity of IT infrastructure • Detection of incidents of information security • Detection of incidents affecting on business processes • Analysis of business process metrics • Interfacing units and employees through the built-in workflow • Identifying incidents without the need for correlation rules • All detection processes in real time • Increase the chance of detecting an incident through multiple sources of events • Real-time big data without a scalability limit • No cloud solution is required, limited hardware resources are used 10
  • 11. 5+ stage of product development LM SIEM Analytics Business AnalyticsEmployee Profiling 11
  • 12. Why need LM LM SIEM 12 Employee Profiling Business AnalyticsAnalytics LM: • Collection of states from various sources (events, surveys) • Connectors to many different systems • Event normalization (single taxonomy, key: value) • Saving to big data for further analysis and queries • Ensuring continuity of the collection and the absence of loss events
  • 13. Why need SIEM LM SIEM 13 Employee Profiling Business AnalyticsAnalytics SIEM: • Managed Correlation for real-time Incident Detection and Prevention • Incident recording and timely notification • Proactive actions - running the script, blocking ip ... • Reports on processes, incident management, unloading of events, compliance with standards • Correlation rules help to reduce the number of false positives from Analytics
  • 14. Analytics Analytics: Complex calculations and reports Baseline indicators Real-time analysis of multiple user-controlled algorithms Managed and user-configurable analytics Elimination of "heavy" and historical analyzes from correlation for real-time Detection of threats without the need to create many of correlation rules (by case) Provide data sets for quick access 14 LM SIEM Employee Profiling Business AnalyticsAnalytics
  • 15. Auxiliary objectives of SIEM Analytics • Provide a quick demo to the customer • Ensure rapid implementation and successful installation • A wide range of detected incidents without correlation rules • Providing complex calculations and algorithms (back-end for correlations and reports) 15
  • 16. Personal profiling • What is the employee's: pass, logins, access rights, email addresses, where he enters the system • Interests, queries, social pages, social circle, etc. • What systems did I enter into, what did I do • Change of activities and current activities that can affect the company and its business Pre-enrichment of the selected entities in real time from a data set that already exists in the system. 16
  • 17. Business analytics, part 1 • Description and formalization of business processes • Assessing the impact of IT and IS components on the business process (vulnerabilities, personnel, staff actions, infrastructure errors, unauthorized actions, etc.) in real time: • Formalization and understanding of what is affected by a separate server, windows service, account • Incidents are not about IT components, but with an assessment of the impact on the business process • Continuity, process availability and information integrity • Prioritization of tasks and incidents for effective work of the units • Valuation of works, measures • Risks, their financial assessment depending on the processes 17
  • 18. Business analytics, part 2 • Description and formalization of business processes in information systems in real time • Evaluation of business performance in real time: • Movement of financial flows, trends • Account balances • Targeting (targeted services and offers) • Customer refusals from orders on portals and their interests • The success of PR actions and news about the company / products • Assessment of trends (baseline) with the registration of bursts and deviations, violations of processes, inaccessibility of services. • If the IT component fails, notify the unavailability of the process in which it is involved. • Analysis for the purpose of stopping the service on a historical and current trend - when it is possible to carry out technical work with minimal financial and reputation losses 18
  • 19. Needs and consumers LM SIEM Analytics Profiling BA IT IS Business units PR & Marketing Security 19
  • 20. Sales model 20 • Sales through partners (integrators, software distributors) • Rare sales directly to key customers and partners (example: partner located in other country) • Clients: any sphere of activity of the companies in which the business depends on IT infrastructure • A solution out of the box, or an adaptation for solving customer cases (if it is not yet supported and can be scaled for other customers) • Technical support is provided by our company, or partners as the first line of support • Integration is carried out by the partners, or RuSIEM (if the partner does not have its own qualified specialists)
  • 21. Market • Not only SIEM. SIEM is an outdated term. • Currently 15 companies have been implementing • Over 25 customers in 2017 already awaiting implementation • For 2018-2019 already planned more than 190 implementations for customers (we do not have marketing) • Our partners and customers are located: Russia, Spain, Italy, Norway, Brazil. • Over the past month, we have more than 10 customers wishing to switch from free RvSIEM to a commercial version 21
  • 22. Thank you for attention CEO, Co-founder RuSIEM Olesya Shelestova oshelestova@rusiem.com 22
  • 23. Why did we do LM / SIEM • Each component is a separate product • Sets of the modules - can be used as separate products for solving various tasks • Real-time analytics just require what LM / SIEM does: • Data collection from a variety of sources for comprehensive analysis • The reduction to the same type of format (key: value and taxonomy) • Interpretation to various levels of representations (machine, operator, analyst, logical connections) • Removing unnecessary data from an event • A stream of normalized events to analytics in real time 23