|By Adam Vincent||
|April 7, 2014 01:04 PM EDT||
Last week, Anton Chuvakin from Gartner wrote a blog about what he is calling an Intelligence Management Platform. He includes some thoughts by Facebook on how they are building their own platform. He alludes to non-public sources and I’m sure ThreatConnect™ is one, so rather than keep you all in suspense, I thought this would be an opportune time for ThreatConnect to say what we think a Threat Intelligence Platform is.
Rick Holland from Forrester said recently at a SANS conference that the threat intelligence platform is like the quarterback of your operations. The threat intelligence platform should be calling the shots and running the show.
There is also talk of how Threat Intelligence Platforms and Incident Response platforms are emerging into two distinct products. I do not think that they should be, rather I believe that the pursuit of truly understanding security of the business will result in a single converged product category. You can’t have a football team with two quarterbacks on the field, and you can’t have two different platforms responsible for managing your threat intelligence and response activities.
I’m not sure what the industry will settle on as far as a name given the now extended scope of requirements, but whatever the name becomes, I believe the requirements are now well understood.
What is the Problem and Why Now?
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat analysis. Integration between teams supporting these functions and management have to this point been mostly manual efforts.
Unless they had vast resources to build a proper platform, security team efforts haven’t been integrated, or are integrated but through rudimentary technologies like email, spreadsheets, or maybe a SharePoint portal or a ticketing system. These techniques, although better than nothing, do not scale as the team grows and the number of malicious events and security processes increases. We saw this same problem with other parts of the business, and platforms were created to support them in their quest for automation and better management processes. For example, PeopleSoft for human resources, Salesforce for sales, Intuit for finance, SAP for manufacturing, and Eloqua for marketing.
Due to the ever-increasing threat of cyber attack and regulatory pressures there is a need for a new type of enterprise platform that can support the entire security team from the CIO to the personnel spanning processes for incident response, network defense, and threat analysis. The platform must be used for tactical day-to-day blocking and tackling as well as strategic decision-making and process improvement.
What is a Threat Intelligence Platform?
A Threat Intelligence Platform permits personnel throughout the enterprise to manage processes on the security relevant data that they care about. Other personnel processes can be integrated on top of that same data simultaneously as part of the same or a different process. Processes might include triaging events in the SOC, conducting incident response, or the threat team’s processes for integrating external feeds or intelligence. From the management perspective, the platform must present trends, supply real-time updates, as well as support threat-driven long-term prioritization across the business. The platform must support the integration of all the stakeholders and data that is relevant to each in a way where they can work together as a team. Customization of the platform is key, as each organization will have different processes, and data customizations needs across processes for aggregation, analysis, and action.
Aggregation – From Feeds to Intelligence
The culmination of one or more feeds is not sufficient on its own; instead you need to focus on processing your own data then overlay what everyone else knows on top of that. Without this type of understanding you never know what is truly relevant to your organization.
There is a lot of emphasis on feeds in the marketplace right now. How many feeds do you support and which ones? Can you support structured and unstructured data input? Do you support STIX? What is the process (manual, automated, semi-automated) to get it into the system? Do you support API level integrations? Although these things are important, I would attest that these questions are just the beginning, and the easy part of the question.
Instead, we need to be thinking bigger and considering how incoming feeds will be made relevant and how they will support the various processes and stakeholders throughout the business that will use them in different ways. Incoming feed data must be correlated with the organization’s knowledge base, and tailored to meet the needs of the different stakeholders – from security team personnel to management and beyond. Automation of processing feeds will be critical so that you can avoid overwhelming your staff with mundane data processing. Even with automation, you will need to support human processing on feed data to ensure its usefulness. This will require analysis process support as described below.
Finally, the feedback loop will be critical in order to support the processes of evaluating the feeds you are using. This will allow internal events to highlight what feed sources are most applicable to the organization, and what types of data have the most usefulness.
Analysis – Where the Rubber Meets the Road
Analysis is a core feature of the Threat Intelligence Platform and it needs to automate as much of the processing as is technically possible. This requires the platform to be built with data management in mind and automation can’t be an afterthought. ThreatConnect leverages the Diamond Model for Intrusion Analysis as its foundation for making sense of the dataset. This is not a data structure, as ThreatConnect allows each customer to extend their data structures to meet their own unique needs, but instead is a powerful baked-in methodology that allows the platform to make sense of the dataset.
Here are three use-cases that are typically done by ThreatConnect customers. Although I’m discussing three different teams in them, the productivity gains provided by the platform are even more apparent with more limited resources.
- Collections – The organization is receiving feeds, tippers, community-derived intelligence, and possibly detection signatures from a variety of sources. They input all of this incoming data into ThreatConnect, triage its priority, and conduct processing to make it actionable. If the data already exists, the system can add additional context derived by the new source. If the data is new, ThreatConnect may assign initial priorities based on relations to already known threats or previously observed activity. Depending on the data type and integration, and the organization’s policy, processing for action can be completely automated at various thresholds (detect-only, block, report, etc.). Signature management is made simple through the process of automatically associating new feed indicators and context with already present signatures that have been previously associated with the same indicator, while any new indicators can be put into a process for signature creation.
- SOC – The SOC supplies the threat team with potential indicators of compromise via ThreatConnect. The threat team analyzes the indicators to provide additional context by leveraging data service integrations within ThreatConnect such as passive DNS and Reverse Whois tracking, and provides more indicators back to the SOC to search for in their logs. Like in the first use case, this process can be automated through integrations with SIEM or other network defense. This iterates until a point where no more information can be gleaned and the process is completed.
- Incident Response – The IR team processes an incident within ThreatConnect. Throughout the process, incident data is automatically associated with existing knowledge and potentially previous courses of action created during previous incident response activities or by the threat team based on their own proactive efforts. Throughout the process, asking for assistance is as easy as creating a task and assigning it to another team member.
Although redundant for each use case, there are several common analysis requirements supported through the platform.
- The ability for each ThreatConnect customer to customize the platform to meet his or her needs for data storage, management, and processing. This includes customizing data elements requiring storage and management, processes across various teams, as well as the input fields that help staff more quickly support data entry tasks.
- ThreatConnect will create new data, enrich current data, and/or make associations across the existing dataset. This allows the team to work collectively from the same knowledgebase, create more accurate data, and become more productive throughout all their processes.
- Using the ThreatConnect discussions feature allows collaboration across all processes, tasks, and even supports collaboration at the atomic indicator level. The ability to collaborate is essential as teams become larger and more geographically disparate. With the follow feature you can be alerted during or after a process is completed if anything changes.
- Using ThreatConnect workflow, the organization’s process is streamlined and tracked through completion. The ability to do postmortem inspection allows you to continually improve your processes.
- ThreatConnect cloud customers can leverage our Analyst On-Demand feature to seek virtual assistance for one task or across an entire process.
Action – The Pieces Come Together
Integrations are a key requirement of a Threat Intelligence Platform. Whether the integration leverages threat intelligence collected and analyzed from a feed, or new context found during a SOC event or incident response activity; data from the platform needs to make its way back into the products your organization uses to automate your organizations protection. By shortening the timeframe from aggregation, analysis processes, to action with automated integration, you can speed up the processes for detection and protection.
Use-cases with the ThreatConnect Platform:
- Signature Management – Customer defined processes for signature (currently snort, YARA, BRO, OpenIOC, clamAV, CybOX, Suricata) creation, approval, and installation.
- Context specific Watchlists – The process of creating tailored feeds of malicious indicators to hunt for and integrating them into a variety of SIEMs or other products based on common threats, exploits, or other areas of concern.
- Block Approvals – There are a variety of ways to approve malicious indicators for blocking. Depending on the source, rating, or relevancy to your business, the system can approve blocks or submit them for human approval.
- Subsequent Analysis – Sometimes you need to look for the needle in the haystack or allow external partners access to the data for their analysis. API integration with third party data analysis tools allows customers to conduct further analysis. Sharing with external parties may also create its own cycle of sharing and receiving back threat intelligence, so easily extracting data in a structured format has proven an important capability.
But that isn’t where it should stop, as described in the SOC and IR processes, response processing should also be done within the platform as well. To truly realize the potential of the platform, threat intelligence-derived events should be communicated back to the platform as internally derived intelligence for automated association and subsequent processing. This would allow you to prioritize your response based on the risk of the unknown event (based on existing data) and shorten the timeframes for processing of true threats to your network. This also can serve a prioritization scheme for budget approval of threat intelligence feeds that are most relevant to your business.
In order for threat data to be threat intelligence it has to be relevant. In the world of network defense, this means it must be relevant to the threats that your organization faces. For this reason it does not make sense to separate incident response and threat analysis processes or teams into separate platform environments. Doing so would be needlessly segmenting internal intelligence gleaned from incident response and external intelligence from research and indicator feeds. By pulling all your stakeholders and data into a single enterprise security platform you can make everyone more productive, make better decisions, and begin to automate the processes of detecting and responding to cyber threats in a more comprehensive way.
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
Oct. 9, 2015 06:00 AM EDT Reads: 1,398
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
Oct. 9, 2015 06:00 AM EDT Reads: 283
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Oct. 9, 2015 05:45 AM EDT
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context w...
Oct. 9, 2015 05:15 AM EDT
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll share tips on how to speed up business initiatives, harness Big Data and remain one step ahead by apply...
Oct. 9, 2015 05:15 AM EDT Reads: 507
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Oct. 9, 2015 04:00 AM EDT Reads: 567
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
Oct. 9, 2015 04:00 AM EDT Reads: 500
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas ...
Oct. 9, 2015 03:00 AM EDT Reads: 727
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
Oct. 9, 2015 03:00 AM EDT Reads: 291
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at the same time reduce Time to Market (TTM) by using plug and play capabilities offered by a robust IoT ...
Oct. 9, 2015 02:00 AM EDT Reads: 2,215
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, along with new ways to engage with users.
Oct. 9, 2015 02:00 AM EDT Reads: 167
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
Oct. 9, 2015 02:00 AM EDT Reads: 208
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Oct. 9, 2015 01:45 AM EDT Reads: 7,026
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes about through a Communications Platform as a Service which allows for messaging, screen sharing, video...
Oct. 9, 2015 12:00 AM EDT Reads: 1,133
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
Oct. 8, 2015 10:00 PM EDT Reads: 596
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Oct. 8, 2015 09:00 PM EDT Reads: 118
Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text message to Betty – mobile messaging now offers tremendous value to businesses for customer and empl...
Oct. 8, 2015 05:30 PM EDT Reads: 233
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT.
Oct. 8, 2015 04:30 PM EDT Reads: 7,473
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Oct. 8, 2015 02:45 PM EDT Reads: 499
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl...
Oct. 8, 2015 02:30 PM EDT Reads: 657