October 13, 2011 By John Burnham 4 min read

What Are the Benefits of Security Intelligence?

This is part 4 of an ongoing series of posts that answer “Six Things You Always Wanted to Know About Security Intelligence but Were Afraid to Ask.

With a firm understanding of Security Intelligence (SI) in hand, let’s get down to brass tacks and review the benefits organizations are gaining from their SI deployments.  Here are several real-world examples:

Improved Compliance

Like it or not, regulatory compliance – for PCI DSS, HIPAA, NERC CIP, SOX and many others – is a major driver of IT security initiatives.  Although compliance doesn’t guarantee a secure environment, compliance will always get attention and budget because of the potential penalties for failure.  Complying with relevant mandates is just the start of enhancing one’s security posture, but it’s an important first step.  Security Intelligence aids both regulatory and internal policy compliance by logging and proactively monitoring diverse information across the enterprise in real time, providing accountability, transparency and measurability.  It delivers practical value through automated reporting and easy searching of logs, events, network flows and much more.

David Blackburn of California ISO, the electrical grid operator for 80 percent of California, noted in a recent webcast, “Compliance was the chief driver in our purchasing a SIEM [solution].  We have many tools that monitor and analyze, but there was no centralized logging capability that [could] analyze those logs and give us good information quickly.”

Faster Detection and Remediation of Threats

In the multi-perimeter world, focusing solely on prevention is a noble but losing proposition.  Boundaries are porous – think mobile computing, social media and cloud computing – and there’s a heightened risk of insider theft, leading to what Forrester calls a “zero-trust” environment.  Security Intelligence solutions address this reality by helping businesses detect and remediate breaches faster.  They have become adept at finding the needle in the haystack, by correlating massive data volumes in real time.  This includes events from network & security devices, servers, applications, directory servers; network activity flows with Layer 7 visibility; asset information; configuration data; vulnerability information; and more.  (If you think SIEM solutions have already been doing this for years, think again.)  SI solutions also aid in remediation by identifying which assets and users were potentially affected by a compromise, and by capturing application content for forensic activities.

Adobe Systems senior network security manager Leon Fong explains that QRadar detected threats other security products missed:

“Within 2 months [of deploying the solution], the conficker worm starting hitting our network.  I noticed that we were getting a lot of heavy TCP port 445 traffic being denied by our firewalls.  The next day, the traffic grew 10-fold.  I had to notify our antivirus team that this needed to be looked into.  Soon after, McAfee sent a note of this worm being prevalent.  In this case, the SIEM solution [QRadar] found the problem before McAfee was able to.”

Reduction of Insider Fraud, Theft and Data Leakage

External attacks garner most of the headlines, but insider threats can be even more damaging – compromising invaluable intellectual property and even jeopardizing national security.  We’re all familiar with WikiLeaks, but few organizations have come to grips with the true risk of insider threats.  Would you know if an employee was sending key product plans to a competitor, anonymously publishing confidential information, or accessing financial information that could be used for insider trading?  With Security Intelligence solutions, organizations can identify and mitigate those inside threats and many more, by detecting the following:

  • Unauthorized application access or usage
  • Data loss such as sensitive data being transmitted to unauthorized destinations
  • VoIP toll fraud
  • Application configuration issues such as privileged access exceptions
  • Application performance issues such as loss of service or over-usage

A multi-billion-dollar branded consumer products firm recently used its SI solution to detect an attempted data exfiltration by a trusted employee for financial gain.  The company’s executives suspected its intellectual property was being leaked but couldn’t identify the source.  When they applied flow-based network activity monitoring to the situation, they were able to quickly track down the data leakage and stop the employee.  With application content capture (via Deep Packet Inspection or DPI), they could even drill down and view the specific emails sent by the employee through his personal email account to the third party.  This prevented the problem from snowballing and potentially causing millions of dollars in damage to the firm.

Pre-Exploit Risk Reduction

Sure, I just finished explaining how you can’t focus only on threat prevention in a multi-perimeter, zero-trust world.  But that doesn’t mean you have to give up on prevention either.  No one is ripping out all their firewalls or IDS/IPS products.  Likewise, you shouldn’t overlook some of the more cutting edge approaches to pre-exploit risk reduction.  Three ways SI solutions are helping customers prevent compromises today are by:

  • Automatically monitoring device configurations (e.g., firewalls) and alerting on policy violations
  • Prioritizing the multitude of vulnerabilities reported by vulnerability scanners
  • Performing predictive threat modeling and simulation of network changes

These may sound familiar, but modern SI solutions surpass yesterday’s point products by applying greater intelligence to a broader set of inputs.  Network activity flows, for example, provide a more complete view of the effectiveness of security device rules than configuration data by itself.  As a colleague wrote, “[Configuration data alone can] miss situations where a configuration is thought to be adequate but for some reason still allows potentially risky network traffic to propagate.”  Similarly, knowledge of network topologies can “minimize false positives common among vulnerability scanners and … [prioritize vulnerabilities] that can be easily exposed because of the way the network is configured.”

A major electric energy transmission company uses QRadar Risk Manager to perform centralized device configuration monitoring and auditing, thus reducing the risk of security breaches.  Because the solution monitors multiple vendors’ security products and uses flow analytics (QRadar QFlow) to paint a rich picture of exposures, the company believes it has significantly strengthened its security and risk posture.  The fact that its risk management capability is part of a broader Security Intelligence solution also reduces training and staffing requirements.

Simplified Operations and Reduction of Effort

Lastly, SI solutions are applying intelligent automation to simplify security operations and reduce the burden on security and network professionals.  IANS  published a study of the Return on Security (ROS) achieved by two large customers, and the findings were compelling.  In addition to estimated risk reduction benefits of $13.5 million, the objective benefits (net of all solution costs) were estimated at $550,000.  These stem from greater efficiencies and elimination of tedious manual tasks.  Again, these were the benefits reported by the customers based on actual experience.  The full report can be accessed here.

How do these benefits compare to what you’ve received from security solutions?  We welcome comments about your own real-world experiences.

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today