The SANS Technology Institute Contact Stephen Northcutt FOR IMMEDIATE RELEASE May 8, 2010 Tel: (808) 823-1375 Email: stephen@sans.edu SANS Technology Institute announces paper with guidance on A new paper has been released from the SANS Technology Institute on Event Correlation and SIEM Vendor Approaches. Known as a Joint Written Project, this paper was developed by students as part of the SANS Technology Institute Masters Program. As technology progresses IT professionals and Security analysts are presented with an ever increasing volume of data to parse through to find evidence of security events. Many companies rely on disparate logging architectures that split network, server, and application logging. The security threats to a company are always increasing and it is becoming imperative for a company to have a well designed logging infrastructure that consolidates, archives, and correlates any useful logging information from as many parts of a company's network as possible. Not only is it becoming imperative to stop intrusions from both external and internal attackers but it is crucial for protecting critical information from getting into the wrong hands. The paper will describe how a Security Information and Event Management (SIEM) system can prevent or mitigate data loss by detecting both network intrusions and extrusions. Such losses of data can cost organizations in the millions of dollars to recover from – some organizations may never recover. Several key area will be examined with the intent to discuss how different vendors SIEM products can mitigate these areas. The areas discussed are: Identification of infected systems trying to exfiltrate information; Countermeasures to detect attempts to infect internal systems; Detection of outbound sensitive information; and Mitigation of the impact of infected systems. Once data has started being collected, the next task that an organization must tackle is how to correlate the different logs in order to identify where and when an attack is occurring or has occurred. Without additional log analysis software, this can be a daunting, if not impossible task. To that end, the use of a SIEM to detect and prevent attacks will be examined in detail. Several different SIEM vendors have agreed to share the approach they take to address the identified key areas for discussion. The vendors providing input to this paper are, in alphabetic order: LogRythm; Nitro Security; Prism Microsystems; and QRadar (by Q1Labs). To access the paper, please see http://www.sans.edu/resources/student_projects About SANS and SANS Technology Institute. SANS was established in 1989 as a cooperative research and education organization. Its programs reach more than 165,000 security professionals, auditors, system administrators, network administrators, chief information security officers, and CIOs who share the lessons they are learning and jointly find solutions to the challenges they face. At the heart of SANS are the many security practitioners in government agencies, corporations, and universities around the world who invest hundreds of hours each year in research and teaching to help the entire information security community. To develop the technology leaders needed to help strengthen the world-wide defensive information community, the SANS Technology Institute was created as a degreegranting affiliate of SANS. It is one of the nation's leading graduate schools devoted to the study of information security.