SlideShare a Scribd company logo
SOLUTION BRIEF
IT organizations of every size are spending more money
than ever to protect their network and assets due to the
increasing threat landscape. According to IDC, security
budgets will grow by 40% by 2020. And in addition to the
growing number of threats, the typical IT security ecosystem
is changing rapidly due to:
• The increase in the number and types of devices that a
single user may deploy to access corporate assets
• Cloud-based applications (Box, Salesforce, etc.) that can
be accessed outside the control of corporate IT
• The need to provide access to high value assets to outside
entities such as partners and contractors to increase
efficiency of key business processes
• “Non-traditional” IoT devices accessing the
corporate network
The result is that it used to be a matter of defending the
castle (the corporate network) with a moat (security products
at the entrance and exits). Now it’s about protecting a
borderless, uncontained collection of employees, contractors
and partners – all using multiple devices from anywhere, at
any time – from outside and within the secure boundaries of
the corporate network.
To deal with this new threat landscape, Aruba’s User and
Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect,
detects attacks by spotting small changes in behavior that
are often indicative of attacks that have evaded traditional
security defenses. Aruba IntroSpect integrates advanced
AI-based machine learning, pinpoint visualizations and
instant forensic insight into a single solution. Attacks
involving malicious, compromised or negligent users, systems
and devices are found and remediated before they damage
the operations and reputation of the organization. With
a Spark/Hadoop platform, IntroSpect uniquely integrates
both behavioral-based attack detection and forensically-rich
incident investigation and response at enterprise scale.
USER AND ENTITY BEHAVIOR ANALYTICS
Using machine learning to deliver a smarter security solution
THE NEED FOR UEBA
Traditional cyber defense products were not designed to deal
with the sophisticated, carefully-crafted and targeted attacks
that enterprises now face. They are still needed to deal with
the vast majority of “standard” threats that come in every day,
but require help with the smaller number of deadly “advanced”
attacks that arrive without warning and evade perimeter
defenses. We call these “attacks on the inside”.
By definition, attacks on the inside are “unknown bad”—they
use techniques and tools that haven’t been seen before. This
means there are no “signatures” to match or rules to fire, which
is why IntroSpect features a new class of detection analytics
that utilizes machine learning—artificial intelligence technology
that does not require pre-programming or setup.
Instead, IntroSpect builds baselines of normal behavior for
a user, a system or any device with an IP address—known
as an “entity”. The baselines are built by machine learning
models that operate on key data from logs, netflow and packet
streams—anything that characterizes an entity’s IT behaviour.
These baselines are then used to detect abnormal behavior
that, aggregated over time and put into context, will indicate a
gestating attack.
Figure 1: IntroSpect Machine Learning detects attacks before they
do damage
SOLUTION BRIEF
ARUBA INTROSPECT
Given this approach, Gartner dubbed the category UBA (User
Behavior Analytics) and then extended this to UEBA (User and
Entity Behavior Analytics) to reflect products like IntroSpect
that profile not only users and systems, to anything with an IP
address (i.e., IoT).
A QUICK OVERVIEW OF MACHINE LEARNING
Machine Learning is an umbrella term that encompasses
techniques used to learn and make judgments without being
programmed explicitly for every scenario. Unlike signature-
based products, machine learning models learn from data and
their results are reported as a probability. The likelihood of a
decision being accurate is expressed as a percentage and can
be interpreted as a measure of confidence in that conclusion.
IntroSpect has over 100 machine learning models (algorithms) in
its arsenal that feature two different techniques:
1.	Supervised Machine Learning. These models are
trained in a lab with large amounts of data to find specific
types of attacks. Once the model is developed it can
then be used to predict an attack for any new set of
inputs. For example, IntroSpect uses supervised
machine learning models to spot systems that are
controlled by a malicious outsider by detecting unusual
url’s that are typical of this situation.
2.	Unsupervised Machine Learning. In this model type,
the algorithm is “self-learning” which means there is
no prior training or preparation required before it is
deployed. The algorithm automatically constructs a
“baseline” to detect small changes in behavior indicative
of pending attacks.
Baselines can be established for individual users, systems
or devices. For example – an employee accessing a new
system at an odd time of the day will be noticed, or an IoT
device in a factory that has increased its network traffic
usage by a factor of 5.
TYPICAL USE CASES
IntroSpect UEBA is deployed in a wide variety of industry
verticals and organizations of all sizes.
• HEALTHCARE: The installation requires processing logs
from 300,000 users that result in billions of events per
day. Key use cases include monitoring high value users
such as sysadmins for abnormal behavior and detecting
shared credentials.
• FINANCE: A SIEM customer needs additional analytics
support to detect email-based exfiltration and help
analysts prioritize correlation alerts while accelerating
incident investigation.
• LEGAL: A 2,000 employee law firm with 14 offices around
the world lacks visibility into LAN network traffic which
blocks their ability to see negligent behavior such as
password sharing and abnormal cloud usage.
KEY DIFFERENTIATORS
Aruba is the only networking provider with the industry’s leading
UEBA solution.
1.	Continuous monitoring and attack detection. 100+
supervised and unsupervised models that detect the
widest range of attacks.
2.	Total visibility. IntroSpect uniquely incorporates all
sources of IT-relevant data into both the analytics and
forensics, including packets, flows, logs, alerts, endpoint,
cloud, etc.
3.	Accelerated incident investigation. IntroSpect
combines both attack detection via supervised and
unsupervised machine learning with integrated forensic
data in a consolidated security profile called Entity360.
Entity360 is key to reducing the time and effort required
to understand, diagnose and respond to an attack.
Entity360 provides comprehensive and continuous
risk scoring and enriched security information that
analysts would otherwise spend hours or days
searching for – months and years of security data down
to the packet level.
Figure 2: Consolidated forensic information in an Entity360 profile
SOLUTION BRIEF
ARUBA INTROSPECT
www.arubanetworks.com
3333 SCOTT BLVD | SANTA CLARA, CA 95054
1.844.473.2782 | T: 1.408.227.4500 | FAX: 1.408.227.4550 | INFO@ARUBANETWORKS.COM
© Copyright 2018 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without
notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. SB_IntroSpect_081518
ARUBA INTROSPECT PRODUCT FAMILY—
STREAMLINED FOR QUICK TIME-TO-VALUE,
SCALED FOR THE ENTERPRISE
The IntroSpect UEBA product family consists of Standard and
Advanced Editions:
IntroSpect Standard is a streamlined, fast-start version of the
full UEBA platform, perfect for Aruba networking installations.
It requires as little as three data sources (Active Directory
or equivalent authentication records, LDAP-based identity
information and firewall logs such as the AMON logs that are
generated by Aruba wireless controllers.) to deliver attack
detection focused on abnormal asset access, attempts at
attack expansion, and indications of data exfiltration attempts.
IntroSpect Advanced provides all the attack detection,
incident investigation and threat hunting capabilities that
customers have come to rely on for the broadest protection
available in the UEBA market. If a customer starts with
IntroSpect Standard, upgrading to some or all of the Advanced
Edition functionality is seamless and requires no change to the
base product.
4.	Mature enterprise-class scalability. Support for a Big
Data architecture – IntroSpect has a 3 year head start in
perfecting this technology.
5.	Seamless integration. With bi-directional integration
with the major SIEM and log aggregation systems such as
ArcSight, QRadar and Splunk, IntroSpect leverages both
their centralized data repositories as well as returning
machine learning-based alerts and forensic data to the
SIEM console and workflow.
6.	Business context and policy-based attack response.
Integration with access control systems such as
ClearPass provide IntroSpect with the ability to automate
the response to attack alerts based on policies set by the
organization. And, because IntroSpect attaches business
significance to its risk scoring, policies and actions can
be tuned based on the value of the assets and actors
involved. In a world where it is almost impossible to
block all attacks, IntroSpect is a “post-admission” security
complement to the ClearPass “pre-admission” visibility
and control.
figure 1.0_080818_clearpassintrospect-sba
Wired/Wireless
Device Authentication
ClearPass Real-time Policy-based Actions
• Real-time quarantine
• Re-authentication
• Bandwidth control
• Blacklist
• Role-change
User/Device Context
Actionable Alerts
Entity360 Profile with
Risk Scoring
3
1
DISCOVER AND VALIDATE
2
MONITOR AND ALERT
DECIDE AND ACT
CLEARPASS
POLICY
MANAGER
CLEARPASS + INTROSPECT = 360° PROTECTION
Figure 3: When IntroSpect is integrated with Aruba ClearPass, the combined solution delivers three key security innovations: advanced attack detection,
accelerated investigation, and automated policy-based enforcement.

More Related Content

What's hot

Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
User Behavior Analytics Using Machine Learning
User Behavior Analytics Using Machine LearningUser Behavior Analytics Using Machine Learning
User Behavior Analytics Using Machine Learning
DNIF
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
Splunk
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
Splunk
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
hardik soni
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
DNIF
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
NBBNOC
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
n|u - The Open Security Community
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
Sophos Benelux
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
wharpreet
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
Sqrrl
 
Vectra Concept Overview
Vectra Concept OverviewVectra Concept Overview
Vectra Concept Overview
Ilya O
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
PencilData
 

What's hot (20)

Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
User Behavior Analytics Using Machine Learning
User Behavior Analytics Using Machine LearningUser Behavior Analytics Using Machine Learning
User Behavior Analytics Using Machine Learning
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Offensive Security basics part 1
Offensive Security basics  part 1Offensive Security basics  part 1
Offensive Security basics part 1
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Vectra Concept Overview
Vectra Concept OverviewVectra Concept Overview
Vectra Concept Overview
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
 

Similar to UEBA

The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
CMR WORLD TECH
 
security onion
security onionsecurity onion
security onion
Boni Yeamin
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
 
Top Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfTop Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdf
infosec train
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
ITrust - Cybersecurity as a Service
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
Greg Hanchin
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
Greg Hanchin
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
IOSR Journals
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
Lindsey Sais
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
IJMIT JOURNAL
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 

Similar to UEBA (20)

The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
security onion
security onionsecurity onion
security onion
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
Top Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdfTop Cyber Threat Intelligence Tools in 2021.pdf
Top Cyber Threat Intelligence Tools in 2021.pdf
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

UEBA

  • 1. SOLUTION BRIEF IT organizations of every size are spending more money than ever to protect their network and assets due to the increasing threat landscape. According to IDC, security budgets will grow by 40% by 2020. And in addition to the growing number of threats, the typical IT security ecosystem is changing rapidly due to: • The increase in the number and types of devices that a single user may deploy to access corporate assets • Cloud-based applications (Box, Salesforce, etc.) that can be accessed outside the control of corporate IT • The need to provide access to high value assets to outside entities such as partners and contractors to increase efficiency of key business processes • “Non-traditional” IoT devices accessing the corporate network The result is that it used to be a matter of defending the castle (the corporate network) with a moat (security products at the entrance and exits). Now it’s about protecting a borderless, uncontained collection of employees, contractors and partners – all using multiple devices from anywhere, at any time – from outside and within the secure boundaries of the corporate network. To deal with this new threat landscape, Aruba’s User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses. Aruba IntroSpect integrates advanced AI-based machine learning, pinpoint visualizations and instant forensic insight into a single solution. Attacks involving malicious, compromised or negligent users, systems and devices are found and remediated before they damage the operations and reputation of the organization. With a Spark/Hadoop platform, IntroSpect uniquely integrates both behavioral-based attack detection and forensically-rich incident investigation and response at enterprise scale. USER AND ENTITY BEHAVIOR ANALYTICS Using machine learning to deliver a smarter security solution THE NEED FOR UEBA Traditional cyber defense products were not designed to deal with the sophisticated, carefully-crafted and targeted attacks that enterprises now face. They are still needed to deal with the vast majority of “standard” threats that come in every day, but require help with the smaller number of deadly “advanced” attacks that arrive without warning and evade perimeter defenses. We call these “attacks on the inside”. By definition, attacks on the inside are “unknown bad”—they use techniques and tools that haven’t been seen before. This means there are no “signatures” to match or rules to fire, which is why IntroSpect features a new class of detection analytics that utilizes machine learning—artificial intelligence technology that does not require pre-programming or setup. Instead, IntroSpect builds baselines of normal behavior for a user, a system or any device with an IP address—known as an “entity”. The baselines are built by machine learning models that operate on key data from logs, netflow and packet streams—anything that characterizes an entity’s IT behaviour. These baselines are then used to detect abnormal behavior that, aggregated over time and put into context, will indicate a gestating attack. Figure 1: IntroSpect Machine Learning detects attacks before they do damage
  • 2. SOLUTION BRIEF ARUBA INTROSPECT Given this approach, Gartner dubbed the category UBA (User Behavior Analytics) and then extended this to UEBA (User and Entity Behavior Analytics) to reflect products like IntroSpect that profile not only users and systems, to anything with an IP address (i.e., IoT). A QUICK OVERVIEW OF MACHINE LEARNING Machine Learning is an umbrella term that encompasses techniques used to learn and make judgments without being programmed explicitly for every scenario. Unlike signature- based products, machine learning models learn from data and their results are reported as a probability. The likelihood of a decision being accurate is expressed as a percentage and can be interpreted as a measure of confidence in that conclusion. IntroSpect has over 100 machine learning models (algorithms) in its arsenal that feature two different techniques: 1. Supervised Machine Learning. These models are trained in a lab with large amounts of data to find specific types of attacks. Once the model is developed it can then be used to predict an attack for any new set of inputs. For example, IntroSpect uses supervised machine learning models to spot systems that are controlled by a malicious outsider by detecting unusual url’s that are typical of this situation. 2. Unsupervised Machine Learning. In this model type, the algorithm is “self-learning” which means there is no prior training or preparation required before it is deployed. The algorithm automatically constructs a “baseline” to detect small changes in behavior indicative of pending attacks. Baselines can be established for individual users, systems or devices. For example – an employee accessing a new system at an odd time of the day will be noticed, or an IoT device in a factory that has increased its network traffic usage by a factor of 5. TYPICAL USE CASES IntroSpect UEBA is deployed in a wide variety of industry verticals and organizations of all sizes. • HEALTHCARE: The installation requires processing logs from 300,000 users that result in billions of events per day. Key use cases include monitoring high value users such as sysadmins for abnormal behavior and detecting shared credentials. • FINANCE: A SIEM customer needs additional analytics support to detect email-based exfiltration and help analysts prioritize correlation alerts while accelerating incident investigation. • LEGAL: A 2,000 employee law firm with 14 offices around the world lacks visibility into LAN network traffic which blocks their ability to see negligent behavior such as password sharing and abnormal cloud usage. KEY DIFFERENTIATORS Aruba is the only networking provider with the industry’s leading UEBA solution. 1. Continuous monitoring and attack detection. 100+ supervised and unsupervised models that detect the widest range of attacks. 2. Total visibility. IntroSpect uniquely incorporates all sources of IT-relevant data into both the analytics and forensics, including packets, flows, logs, alerts, endpoint, cloud, etc. 3. Accelerated incident investigation. IntroSpect combines both attack detection via supervised and unsupervised machine learning with integrated forensic data in a consolidated security profile called Entity360. Entity360 is key to reducing the time and effort required to understand, diagnose and respond to an attack. Entity360 provides comprehensive and continuous risk scoring and enriched security information that analysts would otherwise spend hours or days searching for – months and years of security data down to the packet level. Figure 2: Consolidated forensic information in an Entity360 profile
  • 3. SOLUTION BRIEF ARUBA INTROSPECT www.arubanetworks.com 3333 SCOTT BLVD | SANTA CLARA, CA 95054 1.844.473.2782 | T: 1.408.227.4500 | FAX: 1.408.227.4550 | INFO@ARUBANETWORKS.COM © Copyright 2018 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. SB_IntroSpect_081518 ARUBA INTROSPECT PRODUCT FAMILY— STREAMLINED FOR QUICK TIME-TO-VALUE, SCALED FOR THE ENTERPRISE The IntroSpect UEBA product family consists of Standard and Advanced Editions: IntroSpect Standard is a streamlined, fast-start version of the full UEBA platform, perfect for Aruba networking installations. It requires as little as three data sources (Active Directory or equivalent authentication records, LDAP-based identity information and firewall logs such as the AMON logs that are generated by Aruba wireless controllers.) to deliver attack detection focused on abnormal asset access, attempts at attack expansion, and indications of data exfiltration attempts. IntroSpect Advanced provides all the attack detection, incident investigation and threat hunting capabilities that customers have come to rely on for the broadest protection available in the UEBA market. If a customer starts with IntroSpect Standard, upgrading to some or all of the Advanced Edition functionality is seamless and requires no change to the base product. 4. Mature enterprise-class scalability. Support for a Big Data architecture – IntroSpect has a 3 year head start in perfecting this technology. 5. Seamless integration. With bi-directional integration with the major SIEM and log aggregation systems such as ArcSight, QRadar and Splunk, IntroSpect leverages both their centralized data repositories as well as returning machine learning-based alerts and forensic data to the SIEM console and workflow. 6. Business context and policy-based attack response. Integration with access control systems such as ClearPass provide IntroSpect with the ability to automate the response to attack alerts based on policies set by the organization. And, because IntroSpect attaches business significance to its risk scoring, policies and actions can be tuned based on the value of the assets and actors involved. In a world where it is almost impossible to block all attacks, IntroSpect is a “post-admission” security complement to the ClearPass “pre-admission” visibility and control. figure 1.0_080818_clearpassintrospect-sba Wired/Wireless Device Authentication ClearPass Real-time Policy-based Actions • Real-time quarantine • Re-authentication • Bandwidth control • Blacklist • Role-change User/Device Context Actionable Alerts Entity360 Profile with Risk Scoring 3 1 DISCOVER AND VALIDATE 2 MONITOR AND ALERT DECIDE AND ACT CLEARPASS POLICY MANAGER CLEARPASS + INTROSPECT = 360° PROTECTION Figure 3: When IntroSpect is integrated with Aruba ClearPass, the combined solution delivers three key security innovations: advanced attack detection, accelerated investigation, and automated policy-based enforcement.