Presentation Topics : Splunk Enterprise Security(ES).
Presenter : Md Mofijul Haque
Business Development Executive
Sabuz@deshcloud.com
OUTCOME….
 INTRODUCE WITH SPLUNK ENTERPRISE SECURITY(ES)
SPLUNK SECURITY PORTFOLIO
SPLUNK WORKFLOW & FRAMEWORK
FRAMEWORKS ENABLE USE CASES
WHY DESH CYBER IS RELIABLE
Q&A
SPLUNK TURNS MACHINE DATA INTO
ANSWERS
MOSTLY FACED SECURITY OPERATIONS NOW
A DAYS
SPLUNK WORK AS
FULLY OPTIMIZED FOR MODERN SECURITY
OPERATIONS
SPLUNK SECURITY PORTFOLIO
HOW SPLUNK ETERPRISE SECURITY WORKS
SPLUNK ENTERPRISE SECURITY FRAMEWORK
WORKFLOW FOR STREAMLINED INCIDENT
MANAGEMENT
NOTABLE EVENTS FRAMEWORK
Streamline Incident
Management
Consolidated incident
management allows effective
lifecycle management of
security incidents. Make Rapid Decisions
Automatically aligns all
security context together for
fast incident qualification
and provides predefined
analysis paths
Refine Security Management
Investigation management and
customizations to support
complex process integration
requirements.
NOTABLE EVENTS AND INCIDENT REVIEW
Use for Security Operations
“Application” logics are pre-built on
top of Splunk Enterprise as data
platform.
Provide graphically oriented user
experience supporting the security
operations workflow
Intuitive User Interface Optimized for
Security
Operations
Security operational tasks designed
into user interface versus search bar
interface.
Key relevant information
automatically presented as summary
of incident.
INCIDENT REVIEW INTERFACE
SEARCH AND NAVIGATION INTERFACE
CONSOLIDATED INCIDENT MANAGEMENT
INTERFACE
WORKFLOW PROCESS 1: EVENT OVERVIEW
WORKFLOW PROCESS 2: INCIDENT CONTEXT
WORKFLOW PROCESS 3: ANALYSIS ACTIONS
WORKFLOW PROCESS 4: REMEDIATION
ACTIONS
NOTABLE EVENT FRAMEWORK
ASSET AND IDENTITY FRAMEWORK
Automatically maps asset and identity context to incidents
Fast Incident
Qualification
By automating
context enrichment,
SecOps can qualify
more incidents
quickly
Extended Situation Based
Insights
Rich enrichment allows
more accurate assessment
of situational aspect of
incidents
SECURITY ENRICHED CONTEXT..
ASSET AND IDENTITY FRAMEWORK : ASSET
DATABASE
ASSET AND IDENTITY FRAMEWORK : IDENTITY
DATABASE
ASSET AND IDENTITY FRAMEWORK :
ENRICHMENT
REPRESENTATIVE LIST OF ASSETS AND
IDENTITIES
ASSET AND IDENTITY FRAMEWORK
RISK FRAMEWORK
Quantitative metrics are applied to distinguish
importance
RISK ANALYSIS DASHBOARD
RISK ANALYSIS WITH INCIDENT REVIEW
RISK FRAMEWORK
THREAT INTELLIGENCE FRAMEWORK
Finding hidden IOCs using comprehensive threat intelligence mappings
THREAT INTEL SUPPORT
CONFIGURE THREAT INTELLIGENCE
THREAT INTELLIGENCE IN INCIDENT REVIEW
THREAT ACTIVITY
THREAT INTELLIGENCE FRAMEWORK
USE CASE LIBRARY
SPLUNK AS THE SECURITY NERVE CENTER
ADAPTIVE RESPONSE FRAMEWORK
ADAPTIVE RESPONSE FRAMEWORK
FRAMEWORKS ENABLE USE CASES
REWIND…
WHY DESH CYBER ?
• HIGHLY EXPERIENCED TECHNICAL TEAM .
• BEST COMPETITIVE PRICE WITH BEST SERVICE.
• FIRST BANGLADESHI COMPANY TO ASSOCIATE PARTNER WITH SPLUNK .
• WE WILL PROVIDE TRAINING TO YOUR ORGANIZATIONS .
• DESH CYBER WILL PROVIDE 24/7 MONITORING TO YOUR ORGANIZATIONS .
WE ALSO PROVIDE ….
PHISHING AWARNESS TRAING
(KNOWBE4)
EMAIL THREAT SOLUTIONS
(VAILMAIL)
CISCO UMBRELLA
& MANY OTHER SECURITY
TOOLS AND SERVICES
STAY WITH US .THANKS YOU
Q & A ?
Reference Credit Goes To
Him

Splunk Enterprise Security

Editor's Notes

  • #4 Make Machine Data Accessible, Usable and Valuable to Everyone. Regardless of your organization's size and industry
  • #5 Data ingestion is a process by which data is moved from one or more sources to a destination where it can be stored and further analyzed
  • #6 A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes. UEBA is able to model the behavior of both humans and also the machines within network.  Security Orchestration, Automation and Response (SOAR)
  • #7 Within a volume of time and space, the perception of an enterprise's security posture and its threat environment; the comprehension/meaning of both taken together (risk); and the projection of their status into the near future.
  • #10 An incident management process is a set of procedures and actions taken to respond to and resolve critical incidents: how incidents are detected and communicated, who is responsible, what tools are used, and what steps are taken to resolve the incident.
  • #16 prioritize where action should be taken first. ... This strategy ensures the most effective actions are taken to keep the business running
  • #32 Threat intelligence is knowledge that allows security teams to prevent or mitigate cyberattacks. pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.”
  • #39 Ad Hoc generally signifies a solution designed for a specific problem or task, non-generalizable, and not intended to be adapted to other purposes
  • #40 A correlation search is a type of scheduled search. It lets you detect suspicious events and patterns in your data
  • #42 Mandate is  an authoritative command especially
  • #43 SaaS applications are sometimes called Web-based software, on-demand software, or hosted software. Whatever the name, SaaS applications run on a SaaS provider's servers.