SlideShare a Scribd company logo
1 of 30
About AlienVault
“There are two types of companies that use
computers. Victims of crime that know they are
victims of crime and victims of crime that don’t
have a clue yet.”
- James Routh (CISO
Depository Trust Clearing Corporation)
“In today’s modern world, technology alone is not enough to
combat the threats that now face organizations of all types and
sizes. With the integration of continuous threat intelligence
updates from OTX and AlienVault Labs, we can now provide
millions of Spiceworks users with insight into the threats that
could impact their business, and the guidance they need to take
preventative measures.”
- Russ Spitler
What is this SpiceWorks / AlienVault Integration?
Where does the threat data come from?
What should I do when I get an AlienVault alert in SpiceWorks?
Introduction to AlienVault USM.
Demo with Victor Obando, systems engineer.
Agenda
AlienVault Threat Alerts in Spiceworks
Alerts in Spiceworks:
Dashboard & Device Details Page
“SpiceWorks has found a connection with a potentially suspicious
IP Address 77.240.191.89 on device tmg-mbh.“
Investigating You Threat Alert
Threat Details
Remediation Advice
False Positives… The Root Cause
IPs Change
IPs may be assigned to a different server, owner
Threats Get Remediated
In the case of compromised/slaved servers, system owners may
remediate threat
Threats Naturally Expire
Campaigns and targeted attacks end per orchestrator’s plans
windows.update.nsatc.net
safe.happy.unicorns.malware.hackyou.com
The world’s largest crowd-sourced
threat repository
Provides access to real-time,
detailed information about threats
and incidents
Enables security professionals to
share threat data and benefit from
data shared by others
Powers the AlienVault Threat Alerts
in SpiceWorks
What is Open Threat Exchange (OTX)?
OTX + AlienVault Labs
Threat Intelligence Powered by Open Collaboration
Updates every
30 minutes
200,000 – 350,000
IP addresses
validated daily
8,000 Collection
Points
140 Countries and
growing
Threat Types Detected
Malware Domain
Distributing malware or hosting exploit code
Malware IP
Instrumental in malware, including malicious redirection
Command and Control
Sending command and control instructions to malware or a botnet
Scanning Host
Observed repeatedly scanning or probing remote systems
APT
Observed to be actively involved in an APT campaign
Spamming Host
Actively propagating or instrumental in the distribution of spam
Malicious Host
Engaged in malicious but uncharacterized activity
Data Expiry & Privacy
122.225.118.219 # Scanning Host
CN,Hangzhou,30.2936000824,120.161399841
122.225.118.66 # Scanning Host
CN,Hangzhou,30.2936000824,120.161399841
188.138.100.156 # Malware IP;Scanning Host DE,,51.0,9.0
211.87.176.197 # Scanning Host CN,,35.0,105.0
95.163.107.201 # Spamming RU,,60.0,100.0
188.138.110.48 # Malicious Host;Scanning Host DE,,51.0,9.0
72.167.131.220 # Malware IP US,Scottsdale,33.6119003296,-
111.890602112
174.120.172.125 # Malware IP US,Houston,29.7523002625,-
95.3669967651
210.148.165.67 # Malware IP JP,,36.0,138.0
75.75.253.84 # Spamming US,Henderson,36.0312004089,-115.073898315
What OTX Collects
External IPs connecting to system
Traffic Patterns (Timestamps)
What OTX Does NOT Collect
System data
System information
Internal IP traffic
Any personally identifiable
information
Contributed Data
Expires after 30 Days
Scanning
Expires after 30 Days without
additional evidence
Contributed Data
Expires after 30 Days
Scanning
Expires after 30 Days without
additional evidence
August 7th
August 28th
September 4th
August 20th
Aug 7, 2014
September 2nd
September 10th
August 15th
August 27th
Recent Breach Disclosures
More and more organizations are finding
themselves in the crosshairs of various bad
actors for a variety of reasons.
The number of organizations experiencing
high profile breaches is unprecedented.
The “security arms race” cannot continue
indefinitely as the economics of securing your
organization is stacked so heavily in favor of
those launching attacks that incremental
security investments are seen as impractical.
Threat Landscape: Our New Reality
84%
of organizations breached
had evidence of the
breach in their log files…
Source: 2012 Verizon Data Breach Investigations Report
OR
UNIFIED SECURITY
MANAGEMENT
You’ve Got Options:
Many Point Solutions… Integration Anyone?
Asset Discovery
• Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software
Inventory
Vulnerability Assessment
• Network Vulnerability Testing
• Remediation Verification
Threat Detection
• Network IDS
• Host IDS
• Wireless IDS
• File Integrity Monitoring
Behavioral Monitoring
• Log Collection
• Netflow Analysis
• Service Availability Monitoring
Security Intelligence
• SIEM Event Correlation
• Incident Response
Unified, Coordinated Security Monitoring in a single console
Simple Security Event Management and Reporting
Cutting edge, crowd-sourced threat intelligence from
AlienVault Labs and Open Threat Exchange™ (OTX)
SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity
Monitoring, Vulnerability Assessment and more.
Full suite of compliance reporting
Fast Deployment – Be up and running in 1 hour
Designed and Priced for the Midmarket – Starts at $3600!
Why AlienVault for Your Environment
AlienVault Labs Threat Intelligence:
Coordinated Analysis, Actionable Guidance
Weekly updates that cover all your coordinated rule sets:
• Network-based IDS signatures
• Host-based IDS signatures
• Asset discovery and inventory database updates
• Vulnerability database updates
• Event correlation rules
• Report modules and templates
• Incident response templates / “how to” guidance for each alarm
• Plug-ins to accommodate new data sources
Fueled by the collective power of AlienVault’s Open Threat Exchange (OTX)
Award-Winning Solution Used by 10,000+ for Threat Detection,
Incident Response and Compliance Management
Now Lets See
It In Action
More Questions?
Email Hello@AlienVault.com
Thank You! Any Questions?
Test Drive AlienVault USM
Download a Free 30-Day
Trialhttp://www.alienvault.com/free-trial
Try Our Product Sandbox
http://www.alienvault.com/live-demo-site

More Related Content

What's hot

Extracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseExtracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseAshwini Almad
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Benelux
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cnsmmubashirkhan
 
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its TracksHow to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its TracksAlienVault
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA InfographicBlue Coat
 
Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Stefano Maccaglia
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicBlue Coat
 
Nessus-Vulnerability Tester
Nessus-Vulnerability TesterNessus-Vulnerability Tester
Nessus-Vulnerability TesterAditya Jain
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced FeaturesDavid Perkins
 
S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017Marina Krotofil
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 

What's hot (20)

Extracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet NoiseExtracting the Malware Signal from Internet Noise
Extracting the Malware Signal from Internet Noise
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious Client Detection using Machine learning
Malicious Client Detection using Machine learningMalicious Client Detection using Machine learning
Malicious Client Detection using Machine learning
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Drive by downloads-cns
Drive by downloads-cnsDrive by downloads-cns
Drive by downloads-cns
 
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its TracksHow to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks
 
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
Nessus-Vulnerability Tester
Nessus-Vulnerability TesterNessus-Vulnerability Tester
Nessus-Vulnerability Tester
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced Features
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 

Viewers also liked

Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlienVault
 
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative GeniusIMPACT Branding & Design LLC
 
Digital transformation in 50 soundbites
Digital transformation in 50 soundbitesDigital transformation in 50 soundbites
Digital transformation in 50 soundbitesJulie Dodd
 
40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing Career40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing CareerEric Leist
 
What REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The RestWhat REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The RestRoss Simmonds
 
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsHow to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsMarketingProfs
 
Eco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumptionEco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumptionJosh Beatty
 
Creating Powerful Customer Experiences
Creating Powerful Customer ExperiencesCreating Powerful Customer Experiences
Creating Powerful Customer ExperiencesDigital Surgeons
 
6 Snapchat Hacks Too Easy To Ignore
6 Snapchat Hacks Too Easy To Ignore6 Snapchat Hacks Too Easy To Ignore
6 Snapchat Hacks Too Easy To IgnoreGary Vaynerchuk
 
All About Beer
All About Beer All About Beer
All About Beer Ethos3
 
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...Empowered Presentations
 
Pixar's 22 Rules to Phenomenal Storytelling
Pixar's 22 Rules to Phenomenal StorytellingPixar's 22 Rules to Phenomenal Storytelling
Pixar's 22 Rules to Phenomenal StorytellingGavin McMahon
 
Healthcare Napkins All
Healthcare Napkins AllHealthcare Napkins All
Healthcare Napkins AllDan Roam
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureReferralCandy
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignMotivate Design
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsXPLAIN
 

Viewers also liked (20)

Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
 
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
20 Tweetable Quotes to Inspire Marketing & Design Creative Genius
 
Digital transformation in 50 soundbites
Digital transformation in 50 soundbitesDigital transformation in 50 soundbites
Digital transformation in 50 soundbites
 
40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing Career40 Tools in 20 Minutes: Hacking your Marketing Career
40 Tools in 20 Minutes: Hacking your Marketing Career
 
What REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The RestWhat REALLY Differentiates The Best Content Marketers From The Rest
What REALLY Differentiates The Best Content Marketers From The Rest
 
2015 Travel Trends
2015 Travel Trends 2015 Travel Trends
2015 Travel Trends
 
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsHow to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfs
 
Eco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumptionEco-nomics, The hidden costs of consumption
Eco-nomics, The hidden costs of consumption
 
Creating Powerful Customer Experiences
Creating Powerful Customer ExperiencesCreating Powerful Customer Experiences
Creating Powerful Customer Experiences
 
6 Snapchat Hacks Too Easy To Ignore
6 Snapchat Hacks Too Easy To Ignore6 Snapchat Hacks Too Easy To Ignore
6 Snapchat Hacks Too Easy To Ignore
 
Build a Better Entrepreneur Pitch Deck
Build a Better Entrepreneur Pitch DeckBuild a Better Entrepreneur Pitch Deck
Build a Better Entrepreneur Pitch Deck
 
All About Beer
All About Beer All About Beer
All About Beer
 
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...
SMOKE - The Convenient Truth [1st place Worlds Best Presentation Contest] by ...
 
Pixar's 22 Rules to Phenomenal Storytelling
Pixar's 22 Rules to Phenomenal StorytellingPixar's 22 Rules to Phenomenal Storytelling
Pixar's 22 Rules to Phenomenal Storytelling
 
You Suck At PowerPoint! by @jessedee
You Suck At PowerPoint! by @jessedeeYou Suck At PowerPoint! by @jessedee
You Suck At PowerPoint! by @jessedee
 
Healthcare Napkins All
Healthcare Napkins AllHealthcare Napkins All
Healthcare Napkins All
 
What 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From FailureWhat 33 Successful Entrepreneurs Learned From Failure
What 33 Successful Entrepreneurs Learned From Failure
 
Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015Digital, Social & Mobile in 2015
Digital, Social & Mobile in 2015
 
The What If Technique presented by Motivate Design
The What If Technique presented by Motivate DesignThe What If Technique presented by Motivate Design
The What If Technique presented by Motivate Design
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 

Similar to Spice world 2014 hacker smackdown

How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMAlienVault
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsInvincea, Inc.
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMAlienVault
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseLuca Simonelli
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienVault
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security RisksDavid Kondrup
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Benelux
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XSophos Benelux
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneWatering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneAlienVault
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmAlienVault
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizationsOPSWAT
 

Similar to Spice world 2014 hacker smackdown (20)

NetWitness
NetWitnessNetWitness
NetWitness
 
How to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USMHow to Detect a Cryptolocker Infection with AlienVault USM
How to Detect a Cryptolocker Infection with AlienVault USM
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
How to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USMHow to Detect System Compromise & Data Exfiltration with AlienVault USM
How to Detect System Compromise & Data Exfiltration with AlienVault USM
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
Verisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence ServicesVerisign iDefense Security Intelligence Services
Verisign iDefense Security Intelligence Services
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Next Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and DefenseNext Generation Advanced Malware Detection and Defense
Next Generation Advanced Malware Detection and Defense
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 
Intercept product
Intercept productIntercept product
Intercept product
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneWatering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizations
 

More from AlienVault

Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
Malware Invaders - Is Your OS at Risk?
Malware Invaders - Is Your OS at Risk?Malware Invaders - Is Your OS at Risk?
Malware Invaders - Is Your OS at Risk?AlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideAlienVault
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuideAlienVault
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmAlienVault
 
The State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHICThe State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHICAlienVault
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides finalAlienVault
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesAlienVault
 
How Malware Works
How Malware WorksHow Malware Works
How Malware WorksAlienVault
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverAlienVault
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than EverAlienVault
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAlienVault
 
Improve Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMImprove Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMAlienVault
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 

More from AlienVault (20)

Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
Malware Invaders - Is Your OS at Risk?
Malware Invaders - Is Your OS at Risk?Malware Invaders - Is Your OS at Risk?
Malware Invaders - Is Your OS at Risk?
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
The State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHICThe State of Incident Response - INFOGRAPHIC
The State of Incident Response - INFOGRAPHIC
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
 
Improve Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMImprove Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USM
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Spice world 2014 hacker smackdown

  • 1.
  • 3. “There are two types of companies that use computers. Victims of crime that know they are victims of crime and victims of crime that don’t have a clue yet.” - James Routh (CISO Depository Trust Clearing Corporation)
  • 4. “In today’s modern world, technology alone is not enough to combat the threats that now face organizations of all types and sizes. With the integration of continuous threat intelligence updates from OTX and AlienVault Labs, we can now provide millions of Spiceworks users with insight into the threats that could impact their business, and the guidance they need to take preventative measures.” - Russ Spitler
  • 5. What is this SpiceWorks / AlienVault Integration? Where does the threat data come from? What should I do when I get an AlienVault alert in SpiceWorks? Introduction to AlienVault USM. Demo with Victor Obando, systems engineer. Agenda
  • 6. AlienVault Threat Alerts in Spiceworks
  • 7.
  • 8. Alerts in Spiceworks: Dashboard & Device Details Page “SpiceWorks has found a connection with a potentially suspicious IP Address 77.240.191.89 on device tmg-mbh.“
  • 12.
  • 13. False Positives… The Root Cause IPs Change IPs may be assigned to a different server, owner Threats Get Remediated In the case of compromised/slaved servers, system owners may remediate threat Threats Naturally Expire Campaigns and targeted attacks end per orchestrator’s plans
  • 16. The world’s largest crowd-sourced threat repository Provides access to real-time, detailed information about threats and incidents Enables security professionals to share threat data and benefit from data shared by others Powers the AlienVault Threat Alerts in SpiceWorks What is Open Threat Exchange (OTX)?
  • 17. OTX + AlienVault Labs Threat Intelligence Powered by Open Collaboration Updates every 30 minutes 200,000 – 350,000 IP addresses validated daily 8,000 Collection Points 140 Countries and growing
  • 18. Threat Types Detected Malware Domain Distributing malware or hosting exploit code Malware IP Instrumental in malware, including malicious redirection Command and Control Sending command and control instructions to malware or a botnet Scanning Host Observed repeatedly scanning or probing remote systems APT Observed to be actively involved in an APT campaign Spamming Host Actively propagating or instrumental in the distribution of spam Malicious Host Engaged in malicious but uncharacterized activity
  • 19. Data Expiry & Privacy 122.225.118.219 # Scanning Host CN,Hangzhou,30.2936000824,120.161399841 122.225.118.66 # Scanning Host CN,Hangzhou,30.2936000824,120.161399841 188.138.100.156 # Malware IP;Scanning Host DE,,51.0,9.0 211.87.176.197 # Scanning Host CN,,35.0,105.0 95.163.107.201 # Spamming RU,,60.0,100.0 188.138.110.48 # Malicious Host;Scanning Host DE,,51.0,9.0 72.167.131.220 # Malware IP US,Scottsdale,33.6119003296,- 111.890602112 174.120.172.125 # Malware IP US,Houston,29.7523002625,- 95.3669967651 210.148.165.67 # Malware IP JP,,36.0,138.0 75.75.253.84 # Spamming US,Henderson,36.0312004089,-115.073898315 What OTX Collects External IPs connecting to system Traffic Patterns (Timestamps) What OTX Does NOT Collect System data System information Internal IP traffic Any personally identifiable information Contributed Data Expires after 30 Days Scanning Expires after 30 Days without additional evidence Contributed Data Expires after 30 Days Scanning Expires after 30 Days without additional evidence
  • 20.
  • 21. August 7th August 28th September 4th August 20th Aug 7, 2014 September 2nd September 10th August 15th August 27th Recent Breach Disclosures
  • 22. More and more organizations are finding themselves in the crosshairs of various bad actors for a variety of reasons. The number of organizations experiencing high profile breaches is unprecedented. The “security arms race” cannot continue indefinitely as the economics of securing your organization is stacked so heavily in favor of those launching attacks that incremental security investments are seen as impractical. Threat Landscape: Our New Reality 84% of organizations breached had evidence of the breach in their log files… Source: 2012 Verizon Data Breach Investigations Report
  • 23. OR UNIFIED SECURITY MANAGEMENT You’ve Got Options: Many Point Solutions… Integration Anyone?
  • 24. Asset Discovery • Active Network Scanning • Passive Network Scanning • Asset Inventory • Host-based Software Inventory Vulnerability Assessment • Network Vulnerability Testing • Remediation Verification Threat Detection • Network IDS • Host IDS • Wireless IDS • File Integrity Monitoring Behavioral Monitoring • Log Collection • Netflow Analysis • Service Availability Monitoring Security Intelligence • SIEM Event Correlation • Incident Response
  • 25. Unified, Coordinated Security Monitoring in a single console Simple Security Event Management and Reporting Cutting edge, crowd-sourced threat intelligence from AlienVault Labs and Open Threat Exchange™ (OTX) SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity Monitoring, Vulnerability Assessment and more. Full suite of compliance reporting Fast Deployment – Be up and running in 1 hour Designed and Priced for the Midmarket – Starts at $3600! Why AlienVault for Your Environment
  • 26.
  • 27. AlienVault Labs Threat Intelligence: Coordinated Analysis, Actionable Guidance Weekly updates that cover all your coordinated rule sets: • Network-based IDS signatures • Host-based IDS signatures • Asset discovery and inventory database updates • Vulnerability database updates • Event correlation rules • Report modules and templates • Incident response templates / “how to” guidance for each alarm • Plug-ins to accommodate new data sources Fueled by the collective power of AlienVault’s Open Threat Exchange (OTX)
  • 28. Award-Winning Solution Used by 10,000+ for Threat Detection, Incident Response and Compliance Management
  • 29. Now Lets See It In Action
  • 30. More Questions? Email Hello@AlienVault.com Thank You! Any Questions? Test Drive AlienVault USM Download a Free 30-Day Trialhttp://www.alienvault.com/free-trial Try Our Product Sandbox http://www.alienvault.com/live-demo-site

Editor's Notes

  1. Hello SpiceHeads! – my name is Garrett Gross and I’m the Senior technical product marketing manager here at AlienVault. Before that, I was a sales engineer at Solarwinds (you may have heard of them) and, before that a sysadmin at a storage software company. I’ve held many other IT positions as well - help desk, hardware repair, tech support, bounty hunter, etc. Most importantly, I’m very passionate about information security and, of course, bacon.   I’m very excited to be here at SpiceWorld. Its been a great show so far and I cant believe the response we’ve had! I’m also SUPER excited to be speaking to you today and really appreciate your time. There will be a Q&A at the end so make sure to stick around for that!     Let me tell you a bit about AlienVault.
  2. Founded in 2007, AlienVault is the leading provider of Unified Security Management and crowd-sourced threat intelligence, headquartered in San Mateo, CA; with offices in Austin, TX; Madrid and Granada, Spain as well as Cork, Ireland.   You all probably know us from the AlienVault Threat Alerts in your SpiceWorks dashboard, alerting you to any monitored devices in your environment that are in contact with potentially malicious hosts. We’ve gotten a lot of GREAT feedback from the SpiceWorks community and are glad to hear that so many of you are using and enjoying this integration.   I’d like to take some time to talk to you about these Threat Alerts, how we get our data to identify these threats, and what to do when you receive an alert like this.   But first – lets talk about getting hacked…
  3. Famously quoted back in 2007, James Routh (CISO for the Depository Trust Clearing Corporation) said: “There are two types of companies that use computers. Victims of crime that know they are victims of crime and victims of crime that don’t have a clue yet.”   We need to go about our day knowing that we will we get attacked. Not only will we get attacked, there is nothing we can do that will ever 100% prevent someone from compromising assets in our environments.
  4. To quote one of the more talented individuals that I work with, Russ Spitler:   “In today’s modern world, technology alone is not enough to combat the threats that now face organizations of all types and sizes. With the integration of continuous threat intelligence updates from OTX and AlienVault Labs, we can now provide millions of Spiceworks users with insight into the threats that could impact their business, and the guidance they need to take preventative measures.”   And, he’s right – IT pros today need to understand that no amount of security controls will prevent attackers from compromising machines on the perimeter.   So, again – to best prepare for, and understand how to properly mitigate, attacks, we need to operate under the assumption that attackers will breach even the best of security measures. More information about what is going on in your environment from a security perspective will make dealing with these attacks much easier.   That’s where we come in…
  5. Real quick, though - Here’s an agenda of what I’d like to cover today.   What is this SpiceWorks / AlienVault Integration? Where does the threat data come from? What should I do when I get an AlienVault alert in SpiceWorks? Introduction to AlienVault Unified Security Management platform, our commercial product. Demo with Mark Allen, systems engineer.
  6. SpiceWorks/AlienVault integration   As I mentioned earlier (and as most of you here know), SpiceWorks comes with AlienVault Threat Alerts built-in (at no charge) as of version 7.1 (as you can see up here). There’s nothing additional you need to do to enable these alerts. With all these alerts coming in, SpiceWorlks users are quickly figuring out that there is a lot of communication coming in and out of their environment that they are not aware of.
  7. This integration alerts you when one of your monitored devices is found communicating with a known threat, a host we have a record of in our Open Threat Exchange. This is what they look like in your SpiceWorks dashboard.
  8. Clicking on “View Details of threat” then takes you to the Threat Details page where you will find more information about the potentially malicious host:
  9. It will display the threat type (malware domain, command and control server, scanning host, etc), what domains might be associated with the host, any blacklists that the IP is on, when the threat was first and last seen, and how many alerts have been raised in SpiceWorks from this IP.
  10. Scroll down the page and you get a description of what we think this threat is and how we recommend interacting (or not interacting) with it. Directly to the right, you can see how often this threat comes up in our findings to maybe give you an idea of how active of a threat this is. We’ll also display the download link, file type, and MD5 hash of known malicious payloads delivered by the host.
  11. Lastly, we have some GREAT remediation advice that gives you an idea what to do once you know one of your machines has come in contact with a known bad actor. For instance – there are quick tips on how to isolate an infected host or quarantine a command and control server. We’ve actually tailored this advice depending on the direction of the communication (inbound, outbound, or bidirectional)
  12. Our labs team works tirelessly to ensure that you are getting the most accurate data and quick enough to deal with current threats. However, even the most thorough analysis has a chance to produce false positives and we welcome your feedback. If you feel that the IP we have listed as a potential threat is not, in fact, malicious in nature, we would like you to let us know. In the top part of the Threat Details page, there is a link to flag the IP address for review. That will alert our labs team and the report will go under further review. They will then either provide additional detail substantiating the notion that the host is malicious or, in the case that it isn’t, purge the record from our database.   So – why the false positives?
  13. IPs change. IPs can easily be assigned to a different server and/or owner.   Threats Get Remediated. In the case of compromised/slaved servers, system owners may respond to and remediate the threat.   And Threats Naturally Expire. Campaigns and targeted attacks end per orchestrator’s plans. Honestly, that’s the case more often than not these days. Multi-stage dynamic attacks tend to be the more prevalent attack where the same compromised hosts (C&C servers, botnets, rootkits) are rarely used again.   Also - some urls can just LOOK malicious. An example of that is one that came up recently. Microsoft is (or was) using CenturyLink (formerly Savvis Communications) to host some update content. Unfortunately,
  14. ‘windows.update.nsatc.net’ could look a lot like
  15. safe.happy.unicorns.malware.hackyou.com to some IP reputation scanners out there. Now – these entries are usually auto-purged or thrown out by our team by the time the data reaches us but this would be a great opportunity for one of you to flag the IP for review.
  16. Where does this data come from?   Many of you are probably wondering where our IP reputation data comes from and the short answer is “from our Open Threat Exchange” or “OTX”. OTX is an open information sharing and analysis network, providing access to real-time, detailed information about threats around the world. It is also the same threat intelligence that powers our security platform, USM (which some of you here might be familiar with or even use today).   The Open Threat Exchange is an integrated approach to threat intelligence, comprised of data from 140+ countries and the independent research from our AlienVault Labs’ team. We analyze over 500,000 malware samples per day, updated every 30 minutes, converting this threat data into actionable intelligence. This allows you to call out truly significant events to help you prioritize your efforts and reduce the need for in-house expertise.
  17. OTX derives its data from three primary sources: USM and OSSIM installations that enable OTX sharing, external feeds from public researchers and partners, as well as the research done by our AlienVault Labs team. This data is then run through a powerful discovery engine that is able to granularly analyze the nature of the threat, as well as a similarly powerful validation engine that continually curates the database and certifies the validity of those threats.   Crowd-sourced information remains the core focus of OTX, deriving information from normalized, anonymous event logs: firewalls, content filters, ips/ids logs, etc. We receive approximately 17,000 contributions daily from over 140+ countries. Just to be clear, though: OTX's information is anonymous. OTX does not analyze your data or do anything that would identify you or your activity. We are solely focused on analyzing the nature of the threat jeopardizing your system.   OTX receives a significant amount of data from the security community itself. We work with public research institutions, government organizations, and private companies and partners to share and analyze threat data.   AlienVault Labs’ research is also a critical part of our analysis. Our labs team generates novel research on high profile threats and is responsible for instrumenting the automatic analysis for discovering and certifying all threats coming from OTX partners, OSSIM and USM customers who opt in to share data. I want to point out that this is the integration point for our app within SpiceWorks, leveraging the cloud services capabilities within the application.   Simply tracking threats isn't enough. To properly architect a solid defense, you need context. OTX is able to use its powerful validation engine to provide introspection to not only whether a threat is valid, but also WHAT kind of threat it is.
  18. I Want to emphasize how powerful this automated engine is: our engine can engage in code-level analysis to discover whether certain threats are part of an APT attack, deconstruct binaries to see whether a threat is a command and control server for a botnet, and even use the taxonomy of a known attack to see where malware is being stored versus where it simply pipes thru.   Data quality is key with OTX, and two big parts of our validation engine are its ability to score and analyze threats as well as continually certify the data. For scoring and validation, we confirm data with other sources to ensure we're not seeing false positives. This includes pruning known security researching hosts, as well as white-listed sources. Our engine also scores and uses feedback to gauge the potential danger associated with the threat.   Like I mentioned earlier: things change. Its very important to not only discover these threats but to continuously monitor for changes in activity. IPs often change ownership, threats get remediated, and threats naturally expire.
  19. Thankfully, we try to reflect that in our data. Our engine ensures that our threat intelligence is fresh and relevant. Generally, data on a threat expires after 30 days unless new information shows it remains active. However, for specific types of threats these expiry rules may change…   As I mentioned earlier, the information that the Open Threat Exchange collects (should you choose to share your data with the OTX community) is anonymous. External IPs connecting to your system as well as traffic patterns (when these connections were made) are collected but specific system information, internal IP traffic, or any other personally identifiable information is not collected. Don’t worry, no one cares that you’re totally into My Little Pony anyway.   So – Back to Spiceworks. You’ve gotten an alert that one of your devices has been in contact with a potentially malicious host… What do you do?
  20. What you don’t do is freak out. These alerts that pop up in your dashboard are not meant to cause panic or lead you to believe there has been a compromise. However, they are certainly important enough to pay attention to.   If you don’t have any go-to url reputation sites already (VirusTotal, totalhash, etc), just Google the IP. A word of caution, though – put the IP into the actual search field, not the “hybrid” navigation/search field. That’ll just take you to the potentially malicious host. Not like I’ve done that… earlier today…   Seriously, though – a Google search will usually return results from the top IP rep sites, including the one I mentioned. You might have to be creative with the search query but “<IP in question> malicious, analysis, virus, etc” should do the trick. Try to get information from as many sites as possible to either corroborate the alert and confirm the suspected malicious nature of the host or provide enough proof that this must be a false positive. If so, you can dismiss the alert but not before flagging the IP for our AlienVault Labs team to review.   At that point, you can use your new data to check your IDS logs, run thorough scans on potentially compromised devices, update authentication, even block certain IPs, re-image compromised machines, etc. if necessary. It would also be a smart idea to do an environment-wide AV/malware scan as soon as possible.
  21. I imagine I would be hard pressed to find someone in this room that is not aware of any of the recent security breaches involving major retailers and service providers: Target (or is it ‘tar-zjhey’?), Home Depot, um…. iCloud??   These are HUGE corporations with seemingly endless budgets and inexhaustible resources that allow them to not only have the most expensive and elaborate security systems, but also a large and highly skilled team of people to run it all.   But how much importance is put on the security of the environments powering the midmarket?
  22. Talk to slide… “50 percent of all data breaches occurred at companies with fewer than 1,000 employees and 31 percent with fewer than 100 employees. - Verizon 2014 Data Breach Investigations Report” The point I’m trying to make is that, while the big companies are getting the spotlight, it’s the smaller companies facing the greatest amount of threats. Most of these companies are fully networked with their environments exposed to the outside and some have no protection whatsoever. You know the old adage of ‘shooting fish in a barrel’?
  23. Whats the answer? Buy disparate security controls to address an issue, most of the time AFTER it happens? Manage them autonomous from each other, maybe even have different individuals managing different types of security tech?   We all know that doesn’t work. It doesn’t work when monitoring your network , it doesn’t work when monitoring applications, and it doesn’t work when it comes to security either, especially if you’re a small to midsize shop.
  24. I propose a different approach – AlienVault’s Unified Security Management platform, combining Asset Discovery, Vulnerability Assessment, Threat Detection, Behavioral Monitoring, and Security Intelligence. Combined with our Threat Intelligence, this unified set of security controls allows users to effectively monitor their infrastructure and keep up with the latest threats.
  25. So – again – why do I need this in my environment?   Unified, Coordinated Security Monitoring in a single console Simple Security Event Management and Reporting Cutting edge, crowd-sourced threat intelligence from AlienVault Labs and Open Threat Exchange™ (OTX) SIEM, Network IDS, Host IDS, Wireless IDS, File Integrity Monitoring, Vulnerability Assessment and more. Full suite of compliance reporting Fast Deployment – Be up and running in 1 hour Designed and Priced for the Midmarket – Starts at $3600!
  26. So – not only are we able to offer a comprehensive solution to those that have a tight budget, but also arm organizations that do not have a dedicated security team with expert-level threat intelligence. Think of our AlienVault Labs team as an extension of your own IT team.
  27. Regular updates to USM from our labs team include:   Network-based IDS signatures Host-based IDS signatures Asset discovery and inventory database updates Vulnerability database updates Event correlation rules Report modules and templates Incident response templates / “how to” guidance for each alarm Plug-ins to accommodate new data sources   All influenced by the data collected in OTX
  28. I want to stress here how we are not only giving you a software solution that is easy to set up and easy to use but also bolstering that with our open threat intelligence network and independent research from our AlienVault Labs team. Check out our sweet awards..
  29. Lets see the product in action!!
  30. Any questions?