|By Adam Vincent||
|April 7, 2014 01:04 PM EDT||
Last week, Anton Chuvakin from Gartner wrote a blog about what he is calling an Intelligence Management Platform. He includes some thoughts by Facebook on how they are building their own platform. He alludes to non-public sources and I’m sure ThreatConnect™ is one, so rather than keep you all in suspense, I thought this would be an opportune time for ThreatConnect to say what we think a Threat Intelligence Platform is.
Rick Holland from Forrester said recently at a SANS conference that the threat intelligence platform is like the quarterback of your operations. The threat intelligence platform should be calling the shots and running the show.
There is also talk of how Threat Intelligence Platforms and Incident Response platforms are emerging into two distinct products. I do not think that they should be, rather I believe that the pursuit of truly understanding security of the business will result in a single converged product category. You can’t have a football team with two quarterbacks on the field, and you can’t have two different platforms responsible for managing your threat intelligence and response activities.
I’m not sure what the industry will settle on as far as a name given the now extended scope of requirements, but whatever the name becomes, I believe the requirements are now well understood.
What is the Problem and Why Now?
Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat analysis. Integration between teams supporting these functions and management have to this point been mostly manual efforts.
Unless they had vast resources to build a proper platform, security team efforts haven’t been integrated, or are integrated but through rudimentary technologies like email, spreadsheets, or maybe a SharePoint portal or a ticketing system. These techniques, although better than nothing, do not scale as the team grows and the number of malicious events and security processes increases. We saw this same problem with other parts of the business, and platforms were created to support them in their quest for automation and better management processes. For example, PeopleSoft for human resources, Salesforce for sales, Intuit for finance, SAP for manufacturing, and Eloqua for marketing.
Due to the ever-increasing threat of cyber attack and regulatory pressures there is a need for a new type of enterprise platform that can support the entire security team from the CIO to the personnel spanning processes for incident response, network defense, and threat analysis. The platform must be used for tactical day-to-day blocking and tackling as well as strategic decision-making and process improvement.
What is a Threat Intelligence Platform?
A Threat Intelligence Platform permits personnel throughout the enterprise to manage processes on the security relevant data that they care about. Other personnel processes can be integrated on top of that same data simultaneously as part of the same or a different process. Processes might include triaging events in the SOC, conducting incident response, or the threat team’s processes for integrating external feeds or intelligence. From the management perspective, the platform must present trends, supply real-time updates, as well as support threat-driven long-term prioritization across the business. The platform must support the integration of all the stakeholders and data that is relevant to each in a way where they can work together as a team. Customization of the platform is key, as each organization will have different processes, and data customizations needs across processes for aggregation, analysis, and action.
Aggregation – From Feeds to Intelligence
The culmination of one or more feeds is not sufficient on its own; instead you need to focus on processing your own data then overlay what everyone else knows on top of that. Without this type of understanding you never know what is truly relevant to your organization.
There is a lot of emphasis on feeds in the marketplace right now. How many feeds do you support and which ones? Can you support structured and unstructured data input? Do you support STIX? What is the process (manual, automated, semi-automated) to get it into the system? Do you support API level integrations? Although these things are important, I would attest that these questions are just the beginning, and the easy part of the question.
Instead, we need to be thinking bigger and considering how incoming feeds will be made relevant and how they will support the various processes and stakeholders throughout the business that will use them in different ways. Incoming feed data must be correlated with the organization’s knowledge base, and tailored to meet the needs of the different stakeholders – from security team personnel to management and beyond. Automation of processing feeds will be critical so that you can avoid overwhelming your staff with mundane data processing. Even with automation, you will need to support human processing on feed data to ensure its usefulness. This will require analysis process support as described below.
Finally, the feedback loop will be critical in order to support the processes of evaluating the feeds you are using. This will allow internal events to highlight what feed sources are most applicable to the organization, and what types of data have the most usefulness.
Analysis – Where the Rubber Meets the Road
Analysis is a core feature of the Threat Intelligence Platform and it needs to automate as much of the processing as is technically possible. This requires the platform to be built with data management in mind and automation can’t be an afterthought. ThreatConnect leverages the Diamond Model for Intrusion Analysis as its foundation for making sense of the dataset. This is not a data structure, as ThreatConnect allows each customer to extend their data structures to meet their own unique needs, but instead is a powerful baked-in methodology that allows the platform to make sense of the dataset.
Here are three use-cases that are typically done by ThreatConnect customers. Although I’m discussing three different teams in them, the productivity gains provided by the platform are even more apparent with more limited resources.
- Collections – The organization is receiving feeds, tippers, community-derived intelligence, and possibly detection signatures from a variety of sources. They input all of this incoming data into ThreatConnect, triage its priority, and conduct processing to make it actionable. If the data already exists, the system can add additional context derived by the new source. If the data is new, ThreatConnect may assign initial priorities based on relations to already known threats or previously observed activity. Depending on the data type and integration, and the organization’s policy, processing for action can be completely automated at various thresholds (detect-only, block, report, etc.). Signature management is made simple through the process of automatically associating new feed indicators and context with already present signatures that have been previously associated with the same indicator, while any new indicators can be put into a process for signature creation.
- SOC – The SOC supplies the threat team with potential indicators of compromise via ThreatConnect. The threat team analyzes the indicators to provide additional context by leveraging data service integrations within ThreatConnect such as passive DNS and Reverse Whois tracking, and provides more indicators back to the SOC to search for in their logs. Like in the first use case, this process can be automated through integrations with SIEM or other network defense. This iterates until a point where no more information can be gleaned and the process is completed.
- Incident Response – The IR team processes an incident within ThreatConnect. Throughout the process, incident data is automatically associated with existing knowledge and potentially previous courses of action created during previous incident response activities or by the threat team based on their own proactive efforts. Throughout the process, asking for assistance is as easy as creating a task and assigning it to another team member.
Although redundant for each use case, there are several common analysis requirements supported through the platform.
- The ability for each ThreatConnect customer to customize the platform to meet his or her needs for data storage, management, and processing. This includes customizing data elements requiring storage and management, processes across various teams, as well as the input fields that help staff more quickly support data entry tasks.
- ThreatConnect will create new data, enrich current data, and/or make associations across the existing dataset. This allows the team to work collectively from the same knowledgebase, create more accurate data, and become more productive throughout all their processes.
- Using the ThreatConnect discussions feature allows collaboration across all processes, tasks, and even supports collaboration at the atomic indicator level. The ability to collaborate is essential as teams become larger and more geographically disparate. With the follow feature you can be alerted during or after a process is completed if anything changes.
- Using ThreatConnect workflow, the organization’s process is streamlined and tracked through completion. The ability to do postmortem inspection allows you to continually improve your processes.
- ThreatConnect cloud customers can leverage our Analyst On-Demand feature to seek virtual assistance for one task or across an entire process.
Action – The Pieces Come Together
Integrations are a key requirement of a Threat Intelligence Platform. Whether the integration leverages threat intelligence collected and analyzed from a feed, or new context found during a SOC event or incident response activity; data from the platform needs to make its way back into the products your organization uses to automate your organizations protection. By shortening the timeframe from aggregation, analysis processes, to action with automated integration, you can speed up the processes for detection and protection.
Use-cases with the ThreatConnect Platform:
- Signature Management – Customer defined processes for signature (currently snort, YARA, BRO, OpenIOC, clamAV, CybOX, Suricata) creation, approval, and installation.
- Context specific Watchlists – The process of creating tailored feeds of malicious indicators to hunt for and integrating them into a variety of SIEMs or other products based on common threats, exploits, or other areas of concern.
- Block Approvals – There are a variety of ways to approve malicious indicators for blocking. Depending on the source, rating, or relevancy to your business, the system can approve blocks or submit them for human approval.
- Subsequent Analysis – Sometimes you need to look for the needle in the haystack or allow external partners access to the data for their analysis. API integration with third party data analysis tools allows customers to conduct further analysis. Sharing with external parties may also create its own cycle of sharing and receiving back threat intelligence, so easily extracting data in a structured format has proven an important capability.
But that isn’t where it should stop, as described in the SOC and IR processes, response processing should also be done within the platform as well. To truly realize the potential of the platform, threat intelligence-derived events should be communicated back to the platform as internally derived intelligence for automated association and subsequent processing. This would allow you to prioritize your response based on the risk of the unknown event (based on existing data) and shorten the timeframes for processing of true threats to your network. This also can serve a prioritization scheme for budget approval of threat intelligence feeds that are most relevant to your business.
In order for threat data to be threat intelligence it has to be relevant. In the world of network defense, this means it must be relevant to the threats that your organization faces. For this reason it does not make sense to separate incident response and threat analysis processes or teams into separate platform environments. Doing so would be needlessly segmenting internal intelligence gleaned from incident response and external intelligence from research and indicator feeds. By pulling all your stakeholders and data into a single enterprise security platform you can make everyone more productive, make better decisions, and begin to automate the processes of detecting and responding to cyber threats in a more comprehensive way.
SYS-CON Events announced today that Hitrons Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Hitrons Solutions Inc. is distributor in the North American market for unique products and services of small and medium-size businesses, including cloud services and solutions, SEO marketing platforms, and mobile applications.
Oct. 24, 2016 11:00 PM EDT Reads: 1,993
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
Oct. 24, 2016 09:45 PM EDT Reads: 1,360
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Oct. 24, 2016 08:45 PM EDT Reads: 1,026
SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine...
Oct. 24, 2016 08:30 PM EDT Reads: 1,325
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Oct. 24, 2016 07:30 PM EDT Reads: 3,204
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Oct. 24, 2016 07:15 PM EDT Reads: 1,166
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
Oct. 24, 2016 07:15 PM EDT Reads: 1,049
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Oct. 24, 2016 06:15 PM EDT Reads: 4,757
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
Oct. 24, 2016 05:45 PM EDT Reads: 1,501
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Oct. 24, 2016 05:00 PM EDT Reads: 3,636
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
Oct. 24, 2016 04:45 PM EDT Reads: 1,570
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Oct. 24, 2016 04:30 PM EDT Reads: 1,368
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Oct. 24, 2016 04:15 PM EDT Reads: 2,608
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
Oct. 24, 2016 04:15 PM EDT Reads: 2,787
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Oct. 24, 2016 04:00 PM EDT Reads: 3,728
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Oct. 24, 2016 02:15 PM EDT Reads: 3,965
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
Oct. 24, 2016 02:00 PM EDT Reads: 34,160
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
Oct. 24, 2016 01:00 PM EDT Reads: 1,015
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 24, 2016 01:00 PM EDT Reads: 868
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
Oct. 24, 2016 01:00 PM EDT Reads: 914