SlideShare a Scribd company logo
RSA-Pivotal Security Big Data
Reference Architecture

RSA & Pivotal combine to help security teams
detect threats quicker and speed up response
ESSENTIALS
RSA and Pivotal are combining to
help customers get:
•

Better visibility into what’s
happening in their
environments

•

Actionable intelligence from
a diverse set of internal and
external sources

Despite significant investment in information security, attackers appear to have the
upper hand. According to the Verizon Data Breach Investigations report (2013), 97
percent of breaches led to data compromise within “days” or less, whereas 78 percent
of breaches took “weeks” or more to discover.
•

Attackers are becoming more organized and better funded. But while
attacks have become dynamic, defenses have remained static. Today’s

More contextual analytics to
help them prioritize issues

•

ATTACKERS STILL HAVE THE UPPER HAND

attacks are designed to exploit the weaknesses of our user-centric, hyperconnected infrastructures.
•

IT-enabled organizations continue to grow more complex.

Organizations now demand much more open and agile systems, creating
incredible new opportunities for collaboration, communication, and innovation.
This also results in new vulnerabilities that cyber criminals, “hacktivist” groups,
and nation states have learned to exploit.
•

There are often not enough skilled security professionals to help
organizations protect themselves effectively. The 2013 (ISC)2 Global
Information Security Workforce Study found that 56% of its respondents
believe that there is a security workforce shortage

To reverse the tide and protect their organizations better, security teams need a few
things. They need:
•

Better visibility into what’s happening in their environments, from their
networks, to their servers to their applications and endpoints.

•

More contextual analytics of what’s going on to help them prioritize issues
more effectively and concentrate more resources on those issues that are
more likely to impact their business

•

Actionable intelligence from diverse sources, both internal and external, to
tell the system what to look for in a more automated way, and help them
respond quicker

•

An architecture that scales to support the business as it grows and evolves

RSA and Pivotal have worked together to create an architecture that truly helps
security teams to fulfill these needs, and help speed up attack detection and response
times, and reducing the impact of attacks on organizations. Moreover this approach
creates a platform that can be used for a myriad of other use case across IT
operations and the enterprise.
SOLUTION OVERVIEW
VISIBILITY IS THE FOUNDATION FOR
SUPERIOR ANALYTICS
RSA and Pivotal provide unparalleled visibility into user and system activity across the
IT environment. RSA Security Analytics provides a collection infrastructure that can
provides full visibility into
•

Network Activity by performing full packet capture, session
reconstruction and analysis of packet data

•

Log Data by collecting log and event data from devices and applications
that support business and IT activity.

Collection occurs through the deployment of “decoder” devices topographically close
of the systems generating the data, either through a span port or tap (in the case of
packets) or through common system protocols including syslog, SNMP, ODBC or
proprietary protocols.
RSA Security Analytics also integrates with systems that collect contextual information
like
•

Asset data – this includes the collection of technical configuration data, as
well as business context like what business processes the system supports,
or the criticality of the system

•

Vulnerability data – data which can add additional context to an
investigation (e.g. when the system was last scanned and what
vulnerabilities were present) or to help prioritize response to attacks on
vulnerable systems

•

Identity data – additional contextual information about the user, their
location, their job function and the privileges they have.

RSA Security Analytics enriches the log and network data it captures with this
contextual information to aid in the “downstream” processing of that data, either in
the detection or investigation of threats

Fig 1. Security Analytics High Level Architecture
ANALYTICS THROUGHOUT THE INFORMATION
LIFECYCLE STREAMLINE DETECTION AND
INVESTIGATION
RSA and Pivotal combine to provide numerous types of analytics, needed to spot threats
at different times in the information lifecycle. The three main types of analytics provided
are:
•

Capture time analytics – to identify interesting characteristics of data right at
the time of capture. This includes:
o

Basic characteristics – e.g. source IP, destination IP, username, log
action, etc.

o

Interesting characteristics – e.g. such use of encryption, executable
files, administrative users, administrative commands

o

Indicators of compromise – e.g. known bad IPs, known bad protocols,
watchlist users

Security Analytics creates “metadata” out of these interesting characteristics
that can be used for further analytics or to facilitate investigations
•

Streaming analytics – to analyze metadata in real time to spot concurrent
sessions or actions happening over a short time window that might be an
indicator of a threat. This metadata could be log-based, network-based or from
another contextual source. Examples include:
o

Basic SIEM-like correlation rules: like 5 failed logons followed by a
successful logon

o

Compound indicators of compromise: like a user downloading suspect
JavaScript at around the same time as an encrypted session to a
blacklisted country

o

Hybrid log & network rules: like malformed traffic bound for a host at
around the same time as encrypted traffic to a blacklisted country

Streaming analytics can be based on combinations of events or deviations from
a “baseline” normal count of a piece of metadata. Streaming analytics
appliances need not be deployed right at the point of data collection, but can be
deployed in parallel throughout the environment for enhanced scalability.
•

Batch analytics – to identify “low and slow” type attacks, and patterns that
occur over extended periods of time. Batch analytics is performed by the RSA
Security Analytics Warehouse, which has Pivotal HD at its core. Pivotal uses
proven Hadoop and other Big Data technologies, and the Pivotal Data Science
Labs team to enable different analytic techniques including:
o

Rules based pattern matching

o

Cluster analysis

o

Anomaly detection

o

Machine learning

Batch analytics and these advanced methods facilitate use cases such as
malicious domain detection, beaconing host detection, and anomalous user
behavior detection.
In addition, RSA Security Analytics provides a log archiving capability to allow
organizations to satisfy retention and reporting requirements, but store the data in a
cost-effective manner
ANALYTIC METHODS COMBINE TO FACILITATE
ADVANCED SOC ACTIONS
Threat analysts need a combination of capture time, stream and batch analytics to
detect and investigate a full range of threats. Each of these methods combine to
support a number of workstreams common in a security operations center, like:
•

Visualizing heat maps of issues across an organization by business unit or
profile

•

Profiling systems or devices for indicators of risk

•

Prioritizing alerts when a particular critical business asset or user exhibits
multiple suspicious characteristics over a week-long period

•

Providing investigative context after an alert gets triggered to determine
the cause or impact of an issue, e.g. if the user downloaded an executable
prior to the alert, or the IP accessed a critical asset after triggering the
alert

In addition, using Pivotal and Hadoop, and the Pivotal Data Science Labs team offers
the potential to add additional capabilities like:
•

Predictive modeling – using visibility and context to predict where issues
are likely to occur

•

Analyst feedback loops – allowing analysts to provide feedback whether
they think a particular alert warrants follow-up, and allowing the system to
learn that for future alerts

DISTRIBUTED ARCHITECTURE ALLOWS FOR
ENTERPRISE SCALABILITY AND DEPLOYMENT
Many systems have claimed to offer this functionality, but have failed. This is because
older architecture using old database technologies and proprietary data stores don’t
work. More analytical compute power than ever is needed to analyze the data, but this
needs to be provided cost effectively.
Pivotal and RSA have teamed up to create a Security Analytics platform that provides
an architecture that deploys components throughout the environment in order to
provide superior scalability and deployability, and the ability to deploy the platform in
a modular way to suit an organization’s unique use cases.
•

Collection and Capture-Time Analytics get deployed close to where the
activity occurs. This allows the system to scale across locations more
effectively. This also minimizes the impact on WAN connections, since the
system can be configured to transfer only metadata, not raw data across
these connections.

•

Streaming Analytics and Archiving get deployed centrally or in a
federated way. Architects can decide to deploy the system in a more
central way, or in a federated way. This gives maximum flexibility to take
into account compliance regulations around cross-border data transfer
requirements or network constraints.

•

Batch Analytics gets deployed in a Hadoop cluster that takes advantage
of the resilient nature of a Hadoop distributed computing environment

•

SOCs operate where the best talent resides. With this architecture, the
Security Operations Center can access the data and perform analytics from
anywhere across the organization.

A sample multi-location architecture diagram is included below.
Fig 2. Sample deployment for Security Analytics and Pivotal

PIVOTAL EXPANDS USES OF COLLECTED DATA
ACROSS IT AND ENTERPRISE USE CASES
The combined Pivotal and RSA platform allows IT organizations to gain greater value
from the data collected through the use of the collected data for non-security use
cases. The open architecture gives IT organizations flexibility to leverage Hadoop
tools, or Pivotal tools like HAWQ and Spring XD to develop applications and analytics
for adjacent use cases like:
•

Capacity planning

•

Mean-time-to-repair analysis

•

Downtime impact analysis

•

Shadow IT detection

Moreover, outside of security and IT operations, there are a myriad of options for
incorporating security into a wider Enterprise Data Lake allowing the data to be used
for uses such as customer experience monitoring and billing. This allows customers to
gain much wider benefit across their organization from their investment in Pivotal and
RSA.
BENEFITS OF RSA-PIVOTAL APPROACH
The joint RSA-Pivotal offering provides customers with:
•

Reduced risk of compromise by using the latest analytic and detection
techniques and threat intelligence to aid in the detection, investigation and
response to security incidents

•

Reduced deployment risk and quicker time to value through proven,
validated architecture for collection, analytics of data that produces
actionable intelligence at enterprise scale

•

Less reliance on Data Science expertise to leverage cutting edge analytic
techniques

•

Take better advantage of existing security expertise by adding analytic
firepower

•

Enterprise-wide benefits as collected data integrates with the Enterprise
data lake

CONTACT US
To learn more about how EMC
products, services, and solutions can
help solve your business and IT
challenges, contact your local
representative or authorized reseller—
or visit us at www.emc.com.

EMC2, EMC, the EMC logo, RSA are registered trademarks or trademarks of EMC Corporation in
the United States and other countries. VMware is a registered trademark or trademark of
VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC Corporation.
All rights reserved. Published in the USA. 02/14 Solution Overview H12878
EMC believes the information in this document is accurate as of its publication date. The
information is subject to change without notice.

More Related Content

What's hot

Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
Splunk
 
HP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM SolutionHP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM Solution
rickkaun
 
Document fingerprinting in Microsoft 365 Compliance
Document fingerprinting in Microsoft 365 ComplianceDocument fingerprinting in Microsoft 365 Compliance
Document fingerprinting in Microsoft 365 Compliance
Matt Soseman
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
Splunk
 
Splunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search DojoSplunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search Dojo
Splunk
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
Priyanka Aash
 
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout SessionOperational Security Intelligence Breakout Session
Operational Security Intelligence Breakout Session
Splunk
 
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data InSplunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
Shannon Cuthbertson
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Splunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilsonSplunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilson
Becky Burwell
 
ExtraHop Splunk datasheet
ExtraHop Splunk datasheetExtraHop Splunk datasheet
ExtraHop Splunk datasheet
ExtraHop Networks
 
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera, Inc.
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Elasticsearch
 
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Collin Miles
 
SplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding OverviewSplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding Overview
Splunk
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
Splunk
 
Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015
ExtraHop Networks
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic Stack
Elasticsearch
 

What's hot (20)

Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
 
HP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM SolutionHP ArcSight Demonstrating ROI For a SIEM Solution
HP ArcSight Demonstrating ROI For a SIEM Solution
 
Document fingerprinting in Microsoft 365 Compliance
Document fingerprinting in Microsoft 365 ComplianceDocument fingerprinting in Microsoft 365 Compliance
Document fingerprinting in Microsoft 365 Compliance
 
Hands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill ChainHands-On Security Breakout Session- Disrupting the Kill Chain
Hands-On Security Breakout Session- Disrupting the Kill Chain
 
Splunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search DojoSplunk Ninjas: New Features and Search Dojo
Splunk Ninjas: New Features and Search Dojo
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout SessionOperational Security Intelligence Breakout Session
Operational Security Intelligence Breakout Session
 
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data InSplunk Discovery: Warsaw 2018 - Getting Data In
Splunk Discovery: Warsaw 2018 - Getting Data In
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Splunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout SessionSplunk Enterprise for InfoSec Hands-On Breakout Session
Splunk Enterprise for InfoSec Hands-On Breakout Session
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Splunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilsonSplunking configfiles 20211208_daniel_wilson
Splunking configfiles 20211208_daniel_wilson
 
ExtraHop Splunk datasheet
ExtraHop Splunk datasheetExtraHop Splunk datasheet
ExtraHop Splunk datasheet
 
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App EngineCloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
Cloudera Federal Forum 2014: EzBake, the DoDIIS App Engine
 
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELKThreat Hunting with Elastic at SpectorOps: Welcome to HELK
Threat Hunting with Elastic at SpectorOps: Welcome to HELK
 
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
 
SplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding OverviewSplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding Overview
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015
 
End-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic StackEnd-to-End Security Analytics with the Elastic Stack
End-to-End Security Analytics with the Elastic Stack
 

Viewers also liked

летние мастер-классы в сидо
летние мастер-классы в сидолетние мастер-классы в сидо
летние мастер-классы в сидо
Мария Терегулова
 
Power View from the Data Visualisation Perspective
Power View from the Data Visualisation PerspectivePower View from the Data Visualisation Perspective
Power View from the Data Visualisation Perspective
Microsoft TechNet - Belgium and Luxembourg
 
5 tips for_getting_a_job_interview_next_week ppt
5 tips for_getting_a_job_interview_next_week ppt5 tips for_getting_a_job_interview_next_week ppt
5 tips for_getting_a_job_interview_next_week ppt
Peggy McKee
 
The Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the NetworkThe Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the Network
EMC
 
Block political vs physical maps
Block political vs physical mapsBlock political vs physical maps
Block political vs physical maps
Travis Klein
 
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingConverged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
EMC
 
Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence Sharing
EMC
 
รวมไอเดียแบบบ้านชั้นเดียว
รวมไอเดียแบบบ้านชั้นเดียวรวมไอเดียแบบบ้านชั้นเดียว
รวมไอเดียแบบบ้านชั้นเดียว
Kamthon Sarawan
 
psychology of old age
psychology of old agepsychology of old age
psychology of old age
Deepika Singh
 
Insaat kursu-fatih
Insaat kursu-fatihInsaat kursu-fatih
Insaat kursu-fatihsersld54
 
Underground city of_derinkuyu
Underground city of_derinkuyuUnderground city of_derinkuyu
Underground city of_derinkuyu
Chandan Dubey
 
Tues treaty of versailles
Tues treaty of versaillesTues treaty of versailles
Tues treaty of versailles
Travis Klein
 
Formulario agenda telefonica
Formulario agenda telefonicaFormulario agenda telefonica
Formulario agenda telefonica
Nathalia Sanchez
 
Make your presentations stick (3)
Make your presentations stick (3)Make your presentations stick (3)
Make your presentations stick (3)
Helena T Cullina
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
EMC
 

Viewers also liked (15)

летние мастер-классы в сидо
летние мастер-классы в сидолетние мастер-классы в сидо
летние мастер-классы в сидо
 
Power View from the Data Visualisation Perspective
Power View from the Data Visualisation PerspectivePower View from the Data Visualisation Perspective
Power View from the Data Visualisation Perspective
 
5 tips for_getting_a_job_interview_next_week ppt
5 tips for_getting_a_job_interview_next_week ppt5 tips for_getting_a_job_interview_next_week ppt
5 tips for_getting_a_job_interview_next_week ppt
 
The Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the NetworkThe Evolution of IP Storage and Its Impact on the Network
The Evolution of IP Storage and Its Impact on the Network
 
Block political vs physical maps
Block political vs physical mapsBlock political vs physical maps
Block political vs physical maps
 
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage NetworkingConverged Data Center: FCoE, iSCSI and the Future of Storage Networking
Converged Data Center: FCoE, iSCSI and the Future of Storage Networking
 
Transforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence SharingTransforming Expectations for Treat-Intelligence Sharing
Transforming Expectations for Treat-Intelligence Sharing
 
รวมไอเดียแบบบ้านชั้นเดียว
รวมไอเดียแบบบ้านชั้นเดียวรวมไอเดียแบบบ้านชั้นเดียว
รวมไอเดียแบบบ้านชั้นเดียว
 
psychology of old age
psychology of old agepsychology of old age
psychology of old age
 
Insaat kursu-fatih
Insaat kursu-fatihInsaat kursu-fatih
Insaat kursu-fatih
 
Underground city of_derinkuyu
Underground city of_derinkuyuUnderground city of_derinkuyu
Underground city of_derinkuyu
 
Tues treaty of versailles
Tues treaty of versaillesTues treaty of versailles
Tues treaty of versailles
 
Formulario agenda telefonica
Formulario agenda telefonicaFormulario agenda telefonica
Formulario agenda telefonica
 
Make your presentations stick (3)
Make your presentations stick (3)Make your presentations stick (3)
Make your presentations stick (3)
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 

Similar to RSA-Pivotal Security Big Data Reference Architecture

(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
Amazon Web Services
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
M sharifi
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
Amazon Web Services
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
Splunk
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
Yusuf Hadiwinata Sutandar
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck
Matt Soseman
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
Brian Proctor - GICSP, CISSP, CRISC
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
Cloudera federal summit
Cloudera federal summitCloudera federal summit
Cloudera federal summit
Matt Carroll
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
Yehuda Korotkin
 
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSIONCisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Renee Yao
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
DataWorks Summit
 
10 Criteria for Evaluating NPB, Security Architect Edition
10 Criteria for Evaluating NPB, Security Architect Edition10 Criteria for Evaluating NPB, Security Architect Edition
10 Criteria for Evaluating NPB, Security Architect Edition
VSS Monitoring
 
Segmentation on azure platform
Segmentation on azure platformSegmentation on azure platform
Segmentation on azure platform
Rachata Watthanawong
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
Cisco Canada
 
Splunk
SplunkSplunk
Splunk
Deep Mehta
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
bharti singhal
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk
 

Similar to RSA-Pivotal Security Big Data Reference Architecture (20)

(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
SplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT BreakoutSplunkLive! London - Splunk App for Stream & MINT Breakout
SplunkLive! London - Splunk App for Stream & MINT Breakout
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck Azure Sentinel Jan 2021 overview deck
Azure Sentinel Jan 2021 overview deck
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Cloudera federal summit
Cloudera federal summitCloudera federal summit
Cloudera federal summit
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSIONCisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
Cisco_Big_Data_Webinar_At-A-Glance_ABSOLUTE_FINAL_VERSION
 
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFiBuilding the High Speed Cybersecurity Data Pipeline Using Apache NiFi
Building the High Speed Cybersecurity Data Pipeline Using Apache NiFi
 
10 Criteria for Evaluating NPB, Security Architect Edition
10 Criteria for Evaluating NPB, Security Architect Edition10 Criteria for Evaluating NPB, Security Architect Edition
10 Criteria for Evaluating NPB, Security Architect Edition
 
Segmentation on azure platform
Segmentation on azure platformSegmentation on azure platform
Segmentation on azure platform
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Splunk
SplunkSplunk
Splunk
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

RSA-Pivotal Security Big Data Reference Architecture

  • 1. RSA-Pivotal Security Big Data Reference Architecture RSA & Pivotal combine to help security teams detect threats quicker and speed up response ESSENTIALS RSA and Pivotal are combining to help customers get: • Better visibility into what’s happening in their environments • Actionable intelligence from a diverse set of internal and external sources Despite significant investment in information security, attackers appear to have the upper hand. According to the Verizon Data Breach Investigations report (2013), 97 percent of breaches led to data compromise within “days” or less, whereas 78 percent of breaches took “weeks” or more to discover. • Attackers are becoming more organized and better funded. But while attacks have become dynamic, defenses have remained static. Today’s More contextual analytics to help them prioritize issues • ATTACKERS STILL HAVE THE UPPER HAND attacks are designed to exploit the weaknesses of our user-centric, hyperconnected infrastructures. • IT-enabled organizations continue to grow more complex. Organizations now demand much more open and agile systems, creating incredible new opportunities for collaboration, communication, and innovation. This also results in new vulnerabilities that cyber criminals, “hacktivist” groups, and nation states have learned to exploit. • There are often not enough skilled security professionals to help organizations protect themselves effectively. The 2013 (ISC)2 Global Information Security Workforce Study found that 56% of its respondents believe that there is a security workforce shortage To reverse the tide and protect their organizations better, security teams need a few things. They need: • Better visibility into what’s happening in their environments, from their networks, to their servers to their applications and endpoints. • More contextual analytics of what’s going on to help them prioritize issues more effectively and concentrate more resources on those issues that are more likely to impact their business • Actionable intelligence from diverse sources, both internal and external, to tell the system what to look for in a more automated way, and help them respond quicker • An architecture that scales to support the business as it grows and evolves RSA and Pivotal have worked together to create an architecture that truly helps security teams to fulfill these needs, and help speed up attack detection and response times, and reducing the impact of attacks on organizations. Moreover this approach creates a platform that can be used for a myriad of other use case across IT operations and the enterprise. SOLUTION OVERVIEW
  • 2. VISIBILITY IS THE FOUNDATION FOR SUPERIOR ANALYTICS RSA and Pivotal provide unparalleled visibility into user and system activity across the IT environment. RSA Security Analytics provides a collection infrastructure that can provides full visibility into • Network Activity by performing full packet capture, session reconstruction and analysis of packet data • Log Data by collecting log and event data from devices and applications that support business and IT activity. Collection occurs through the deployment of “decoder” devices topographically close of the systems generating the data, either through a span port or tap (in the case of packets) or through common system protocols including syslog, SNMP, ODBC or proprietary protocols. RSA Security Analytics also integrates with systems that collect contextual information like • Asset data – this includes the collection of technical configuration data, as well as business context like what business processes the system supports, or the criticality of the system • Vulnerability data – data which can add additional context to an investigation (e.g. when the system was last scanned and what vulnerabilities were present) or to help prioritize response to attacks on vulnerable systems • Identity data – additional contextual information about the user, their location, their job function and the privileges they have. RSA Security Analytics enriches the log and network data it captures with this contextual information to aid in the “downstream” processing of that data, either in the detection or investigation of threats Fig 1. Security Analytics High Level Architecture
  • 3. ANALYTICS THROUGHOUT THE INFORMATION LIFECYCLE STREAMLINE DETECTION AND INVESTIGATION RSA and Pivotal combine to provide numerous types of analytics, needed to spot threats at different times in the information lifecycle. The three main types of analytics provided are: • Capture time analytics – to identify interesting characteristics of data right at the time of capture. This includes: o Basic characteristics – e.g. source IP, destination IP, username, log action, etc. o Interesting characteristics – e.g. such use of encryption, executable files, administrative users, administrative commands o Indicators of compromise – e.g. known bad IPs, known bad protocols, watchlist users Security Analytics creates “metadata” out of these interesting characteristics that can be used for further analytics or to facilitate investigations • Streaming analytics – to analyze metadata in real time to spot concurrent sessions or actions happening over a short time window that might be an indicator of a threat. This metadata could be log-based, network-based or from another contextual source. Examples include: o Basic SIEM-like correlation rules: like 5 failed logons followed by a successful logon o Compound indicators of compromise: like a user downloading suspect JavaScript at around the same time as an encrypted session to a blacklisted country o Hybrid log & network rules: like malformed traffic bound for a host at around the same time as encrypted traffic to a blacklisted country Streaming analytics can be based on combinations of events or deviations from a “baseline” normal count of a piece of metadata. Streaming analytics appliances need not be deployed right at the point of data collection, but can be deployed in parallel throughout the environment for enhanced scalability. • Batch analytics – to identify “low and slow” type attacks, and patterns that occur over extended periods of time. Batch analytics is performed by the RSA Security Analytics Warehouse, which has Pivotal HD at its core. Pivotal uses proven Hadoop and other Big Data technologies, and the Pivotal Data Science Labs team to enable different analytic techniques including: o Rules based pattern matching o Cluster analysis o Anomaly detection o Machine learning Batch analytics and these advanced methods facilitate use cases such as malicious domain detection, beaconing host detection, and anomalous user behavior detection. In addition, RSA Security Analytics provides a log archiving capability to allow organizations to satisfy retention and reporting requirements, but store the data in a cost-effective manner
  • 4. ANALYTIC METHODS COMBINE TO FACILITATE ADVANCED SOC ACTIONS Threat analysts need a combination of capture time, stream and batch analytics to detect and investigate a full range of threats. Each of these methods combine to support a number of workstreams common in a security operations center, like: • Visualizing heat maps of issues across an organization by business unit or profile • Profiling systems or devices for indicators of risk • Prioritizing alerts when a particular critical business asset or user exhibits multiple suspicious characteristics over a week-long period • Providing investigative context after an alert gets triggered to determine the cause or impact of an issue, e.g. if the user downloaded an executable prior to the alert, or the IP accessed a critical asset after triggering the alert In addition, using Pivotal and Hadoop, and the Pivotal Data Science Labs team offers the potential to add additional capabilities like: • Predictive modeling – using visibility and context to predict where issues are likely to occur • Analyst feedback loops – allowing analysts to provide feedback whether they think a particular alert warrants follow-up, and allowing the system to learn that for future alerts DISTRIBUTED ARCHITECTURE ALLOWS FOR ENTERPRISE SCALABILITY AND DEPLOYMENT Many systems have claimed to offer this functionality, but have failed. This is because older architecture using old database technologies and proprietary data stores don’t work. More analytical compute power than ever is needed to analyze the data, but this needs to be provided cost effectively. Pivotal and RSA have teamed up to create a Security Analytics platform that provides an architecture that deploys components throughout the environment in order to provide superior scalability and deployability, and the ability to deploy the platform in a modular way to suit an organization’s unique use cases. • Collection and Capture-Time Analytics get deployed close to where the activity occurs. This allows the system to scale across locations more effectively. This also minimizes the impact on WAN connections, since the system can be configured to transfer only metadata, not raw data across these connections. • Streaming Analytics and Archiving get deployed centrally or in a federated way. Architects can decide to deploy the system in a more central way, or in a federated way. This gives maximum flexibility to take into account compliance regulations around cross-border data transfer requirements or network constraints. • Batch Analytics gets deployed in a Hadoop cluster that takes advantage of the resilient nature of a Hadoop distributed computing environment • SOCs operate where the best talent resides. With this architecture, the Security Operations Center can access the data and perform analytics from anywhere across the organization. A sample multi-location architecture diagram is included below.
  • 5. Fig 2. Sample deployment for Security Analytics and Pivotal PIVOTAL EXPANDS USES OF COLLECTED DATA ACROSS IT AND ENTERPRISE USE CASES The combined Pivotal and RSA platform allows IT organizations to gain greater value from the data collected through the use of the collected data for non-security use cases. The open architecture gives IT organizations flexibility to leverage Hadoop tools, or Pivotal tools like HAWQ and Spring XD to develop applications and analytics for adjacent use cases like: • Capacity planning • Mean-time-to-repair analysis • Downtime impact analysis • Shadow IT detection Moreover, outside of security and IT operations, there are a myriad of options for incorporating security into a wider Enterprise Data Lake allowing the data to be used for uses such as customer experience monitoring and billing. This allows customers to gain much wider benefit across their organization from their investment in Pivotal and RSA.
  • 6. BENEFITS OF RSA-PIVOTAL APPROACH The joint RSA-Pivotal offering provides customers with: • Reduced risk of compromise by using the latest analytic and detection techniques and threat intelligence to aid in the detection, investigation and response to security incidents • Reduced deployment risk and quicker time to value through proven, validated architecture for collection, analytics of data that produces actionable intelligence at enterprise scale • Less reliance on Data Science expertise to leverage cutting edge analytic techniques • Take better advantage of existing security expertise by adding analytic firepower • Enterprise-wide benefits as collected data integrates with the Enterprise data lake CONTACT US To learn more about how EMC products, services, and solutions can help solve your business and IT challenges, contact your local representative or authorized reseller— or visit us at www.emc.com. EMC2, EMC, the EMC logo, RSA are registered trademarks or trademarks of EMC Corporation in the United States and other countries. VMware is a registered trademark or trademark of VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC Corporation. All rights reserved. Published in the USA. 02/14 Solution Overview H12878 EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice.