Definition

security analytics

Security analytics is an approach to cybersecurity that uses data collection, data aggregation and analysis tools for threat detection and security monitoring. An organization that deploys security analytics tools can analyze security events to detect potential threats before they can negatively affect the company's infrastructure and bottom line.

Security analytics combines big data capabilities with threat intelligence to help detect, analyze and mitigate insider threats, as well as persistent cyberthreats and targeted attacks from external bad actors.

Benefits of security analytics

Security analytics tools provide organizations with several key benefits:

  • Security incident and anomaly detection and response. Security analytics tools analyze a wide range of data types, making connections between different events and alerts to detect security incidents or cyberthreats in real time.
  • Regulatory compliance. Security analytics tools help enterprises comply with government and industry regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Payment Card Industry Data Security Standard (PCI DSS). Security analytics software can integrate a variety of data sources, giving organizations a single, unified view of data events across a variety of devices. This enables compliance managers to monitor regulated data and identify potential noncompliance.
  • Enhanced forensics capabilities. Security analytics tools can offer companies insights into where attacks originated from, how their systems were compromised, what assets were compromised and identify any data loss, for example. These tools can also provide timelines for any incidents. The ability to reconstruct and analyze incidents can help organizations shore up their cybersecurity to prevent similar incidents from happening again.

Security analytics tools

Security analytics tools detect behaviors that indicate malicious activity by collecting, normalizing and analyzing network traffic for threat behavior. Providers that specialize in security analytics offer machine learning tools for applying security models to traffic across a company's assets.

Security analytics tools include the following:

  • WildFire from Palo Alto Networks detects and prevents zero-day malware using a combination of malware sandboxing, signature-based detection and malware blocking.
  • Sumo Logic is a cloud-native, machine data analytics service that enables organizations to monitor, troubleshoot and resolve operational issues, as well as security threats to their cloud or hybrid
  • io Security Analytics combines the ELK stack -- a collection of three open source products: Elasticsearch, Logstash and Kibana -- with advanced security analytics tools to help enterprises identify and remediate threats to their systems.

Use cases

Companies can deploy security analytics for a wide variety of use cases. Some common use cases include the following:

  • analyzing network traffic to detect patterns indicating potential attacks;
  • monitoring user behavior, including potentially suspicious activity;
  • detecting potential threats;
  • detecting data exfiltration;
  • monitoring employees;
  • detecting insider threats;
  • identifying compromised accounts;
  • identifying improper user account usage, such as shared accounts;
  • investigating malicious activity;
  • demonstrating compliance during audits; and
  • investigating cybersecurity incidents.

SIEM vs. security analytics

Security information and event management (SIEM) systems collect log data that's generated by monitored devices -- e.g., network equipment, computers, storage, firewalls, etc. -- to identify specific security-related events occurring on individual machines. They then aggregate this data to determine what's occurring across an entire system. This enables organizations to identify any variations in expected behavior so they can formulate and implement the necessary responses.

However, legacy SIEM systems aren't built to handle modern continuous integration/continuous delivery (CI/CD) lifecycles based on frequent build and deployment cycles. As such, they simply can't handle the massive amounts of data these methods generate.

Unlike legacy SIEM systems, security analytics takes advantage of cloud-based infrastructure. And, since cloud storage providers are able to provide almost unlimited data storage that can scale according to an organization's needs, the company is not limited by the corporate data storage and retention policies. In addition, security analytics can collect and store data more efficiently, and it's also better at handling modern DevOps practices and CI/CD systems.

Big data security analytics

The job of IT security professionals is to ensure that their companies' systems are secure, that cyberthreat risks are kept to a minimum and that they're complying with data governance regulations. Consequently, one of their primary responsibilities is monitoring and analyzing huge amounts of log and event data from servers, network devices and applications.

Big data security analytics refers to the techniques and strategies used to analyze vast amounts of security data. Big data security analytics can be divided into two functional categories: performance and availability monitoring (PAM) and SIEM.

PAM applications focus on managing operations data, while SIEM tools focus on log management, event management, behavioral analysis, database monitoring and application monitoring.

Big data security analytics tools can discover network devices, as well as automatically collect each device's event and configuration data. Because big data analytics systems require a comprehensive view of the enterprise's security data, they have to integrate well with other third-party security tools, as well as Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) servers.

This was last updated in January 2020

Continue Reading About security analytics

Dig Deeper on Enterprise network security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

Extensions de fichiers et formats de fichiers

Motorisé par:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close