0% found this document useful (0 votes)
67 views5 pages

Sourcefi Re Defense Center: Centralized Command and Control

Defense Center is capable of collecting events from up to 100 sensors and handling a maximum of one hundred million events. Defense Center includes a powerful, yet easy-to-use, Web-based interface for event viewing, reporting, and forensic analysis. Users can choose from dozens of pre-configured event views, making it easy to view large volumes of events by a wide range of criteria.

Uploaded by

subnaught
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views5 pages

Sourcefi Re Defense Center: Centralized Command and Control

Defense Center is capable of collecting events from up to 100 sensors and handling a maximum of one hundred million events. Defense Center includes a powerful, yet easy-to-use, Web-based interface for event viewing, reporting, and forensic analysis. Users can choose from dozens of pre-configured event views, making it easy to view large volumes of events by a wide range of criteria.

Uploaded by

subnaught
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CENTRALIZED COMMAND AND CONTROL

Aggregating and Monitoring Intrusion Events


All Sourcere 3D events are sent securely from Sourcere 3D Sensors to
the Defense Center (DC) for centralized analysis and storage. Designed with
enterprise deployments in mind, Defense Center is capable of collecting events
from up to 100 sensors and handling a maximum of one hundred million events.
Defense Center includes a powerful, yet easy-to-use, Web-based interface for
event viewing, reporting, and forensic analysis. Customizable workows enable
users to tailor the interface to t the way they investigate and analyze security
events. Users can choose from dozens of pre-congured event views, making it
easy to view large volumes of events by a wide range of criteria. Event views are
easily customized and can be stored for later reuse.
Detection Policy Management
With Defense Center, users have complete control of policies and conguration
of up to 100 3D Sensors from a single management console. Sourcere IPS and
Sourcere RNA

(Real-time Network Awareness) policies can be pushed down


to all sensors, or a number of policies can be created for individual sensors or
sensor groups.
Group sensors logically for easier policy management
Import/export capabilities for IPS and RNA policies
Sensor Management and Health Monitoring
Depending on the Defense Center appliance model, a maximum of 3, 25, or
100 3D Sensors can be administered from a single DC interface. Once a sensor
is assigned to a DC, an Admin can view its connection status, edit sensor
properties, delete sensors, and create/manage/edit sensor groups.
In addition to collecting and taking action on security events, Defense Center
provides centralized health monitoring for all sensors. You can be alerted when
sensors are ofine or overloaded, and the DC can alert users of critical sensor
metrics like temperature, CPU utilization, and available disk capacity.
Sourcere Defense Center
Capabilities
Store up to 100,000,000 security &
host events, including packet data
Centralized policy & sensor
management
Centralized audit logging of
conguration & security policy
changes
Easy registration of new sensors
Sensor grouping for easy policy
management in large enterprises
Secure communication with all
sensors
Manage up to 100 Sourcere 3D
Sensors with a single Defense
Center
MDC mode for managing up to
10 subordinate DC appliances
manage many hundreds of
sensors from one DC
Centralized health monitoring of
all Sourcere appliances
Powerful reports, alerts, &
dashboards
Generate enterprise- or site-
specic reports, graphs, &
charts
Create incident reports &
bookmarks to direct others to
specic events
Report Designer for full report
customization
Customized alerts & responses
Customized dashboard view of
enterprise & event data
Dozens of pre-dened or
customized drag-and-drop
dashboard widgets
Detailed packet-level forensics
Automated event & sensor
maintenance tasks
Centralized updating &
deployment of security content
High Availability options
RADIUS & LDAP-based
authentication capability
Sourcere Defense Center
TM
Centralized and Fully Customizable Management
The Sourcere Defense Center management console is the nerve
center of the Sourcere 3D

System. Defense Center correlates attacks


with real-time network and user intelligence and centrally manages
network security and operational functions, including event monitoring,
incident prioritization, forensic analysis, and reporting, so that you can
better protect your business.
Table 1. Sourcere Defense Center Appliance Family *No single sensor larger than Sourcere 3D2100
MODEL DC500 DC1000 DC3000
Management Interfaces (copper) RJ45 RJ45 RJ45
Memory (RAM) 1GB 2GB 4GB
Maximum Event Storage 2,500,000 10,000,000 100,000,000
Maximum Sensors Managed 3* 25 100
2
Reports, Alerts, and Dashboards
Defense Center provides customers with powerful reports, alerts, and
dashboards. Customers can leverage a variety of pre-dened report templates
or create custom reports to meet the needs of any organization. Reports can be
created in PDF, HTML, and CSV formats, which can be automatically e-mailed
for easy distribution. Analysts can receive alerts in the form of e-mail messages
or SNMP alerts.
Using Defense Center,
customers can create fully
customized dashboards
with dozens of pre-dened
or custom drag-and-drop
widgets that display
critical information in the
form of tables and graphs.
The dashboard appears
immediately after the
user logs into the DC and
becomes the focal point
for monitoring security
and compliance events
generated by the 3D System.
Additional dashboard
benets include
interactive drill-down to
navigate to raw event
data or 3D System conguration interfaces, granular administrative privileges
for creating different levels of access to data/policy, dashboard sharing among
colleagues with similar roles, and dashboard tab cycling at a user-dened time
interval to ease the monitoring of security, compliance, and administrative
events.
Packet-level Forensics
With Defense Center, customers can easily investigate the source and nature
of an attack and what steps to take in response. Defense Center gives users
sophisticated, highly customizable, easy-to-use workows for investigating
security events down to the packet level. Unlike most other IPSes, Sourceres
packet-level forensics are enabled by default and do not affect sensor
performance.
Automated System Maintenance
Customers can schedule automated system maintenance tasks to occur at the
Defense Center at user-dened intervals, including:
Performing backups
Generating reports
Downloading and applying software updates
Downloading and applying Snort rules
Applying recommendations from RNA-Recommended Rules
The Sourcere solution has
allowed us to expand the
system to monitor seven
network segments and manage
all from a single Defense
Center.
Greg Clayton, Assistant VP and
Network Security Manager,
BankersBank CardServices (BBCS/TIB)
Figure 1. The Sourcere Defense Center dashboard is fully
customizable and provides numerous drag-and-drop widgets
that display critical security, compliance, and health events.
3
ENABLING AUTOMATED IPS WITH REAL-TIME NETWORK INTELLIGENCE
Network Discovery
Defense Center is far more than a management solution. Customers who use
Sourcere RNA can build a complete network map of their environment.
RNA provides 24x7 network intelligence, storing a real-time inventory of all
operating systems (OSes), services, applications, protocols, and potential
vulnerabilities that exist on the network. The network map is maintained in real
time on the DC, and alerts can be generated when a change occurs or when a
new device is installed on the network.
Event Correlation
RNA discovers each assets OS and its active services, protocols, and client
applications, and then determines its potential vulnerabilities. Snort-based
security alerts are generated at the sensor and forwarded to the DC. The DC
evaluates each threat against RNAs asset data, forming the context from which
the impact of the attack can be determined. The DC instantly correlates attack
relevance based on the nature of the attack and the characteristics of the target
asset. The result is real-time impact assessment and prioritization shown via
Impact Flags to focus security analysts on the relatively small number of events
that really matter, saving valuable time and maximizing network protection.
Real-time asset tracking and change detection
Event impact analysis
False positive reduction by up to 99%
Adaptive IPS
We have explained how Defense Center performs event correlation for the
Impact Flags feature of Sourceres Adaptive IPS strategy, which provides
automated impact assessment and IPS tuning. Now lets discuss the DCs role in
the remaining Adaptive IPS featuresRNA-Recommended Rules, Non-Standard
Port Handling, and Adaptive Trafc Proles.
The RNA-Recommended Rules (RRR) feature takes the guesswork out of
determining which IPS rules to enable and disable by recommending only
those rules that pertain to potential vulnerabilities associated with the
host and service information contained in the network map maintained on
the DC. As new devices join or leave the network, RRR can prompt policy
personnel that new rules are needed or can be disabled. The Non-Standard
Port Handling feature helps to prevent possible IPS evasions by inspecting
trafc on non-standard ports. RNA identies the ports and services on the
hosts its monitoring and adds this information to the network map. The DC
then congures the IPS to dynamically apply the correct rules for any non-
standard ports. The Adaptive Trafc Proles feature helps to prevent possible
IPS evasions attempted through trafc fragmentation. Via the DC, RNA provides
OS data about each host to the 3D Sensor so that the sensor can dynamically
adjust the trafc reassembly process in a manner consistent with different
target OSes.
None of the aforementioned Adaptive IPS features are possible without the
powerful aggregation and correlation capabilities of Defense Center.
TOOLS FOR THE ENTERPRISE
Compliance White Lists and Policy and Response Rules
Compliance white lists and Policy and Response (P&R) rules can be used
to monitor and enforce IT policy compliance. Armed with the real-time
network map powered by RNA, Admins can create compliance white lists
of approved host assets by simply checking and un-checking those OSes,
Sourcere Defense Center
Enables Automated IPS with
Real-Time Network Intelligence
24x7, passive network discovery
provided by Sourcere RNA
Know what hosts youre
protecting on a continuous basis
Obtain a real-time inventory of
all OSes, services, applications,
protocols, & potential
vulnerabilities on your network
Impact Flags assessment
(powered by RNA) for determining
event relevance
Real-time asset tracking
& potential vulnerability
assessment
Event impact analysis based on
your dynamic network
False positive reduction by up to
99%
Adaptive IPS
RNA-Recommended Rules takes
guesswork out of determining
which IPS rules to enable &
disable
Non-Standard Port Handling
helps to prevent possible IPS
evasions by inspecting trafc on
non-standard ports
Adaptive Trafc Proles helps to
prevent possible IPS evasions
attempted through trafc
fragmentation
4
services, applications, and protocols that can and/or cannot be used on a
particular network. Defense Center will then generate alerts if RNA sees
changes that indicate the violation of a compliance policy, such as introduction
of unauthorized OSes, services, or applications. These alerts can be used to
trigger automated responses including quarantining assets from the network.
Network Behavior Analysis
RNAs built-in RNA Flow capability, and/or the optional Sourcere NetFlow
Analysis module, can be used to perform Network Behavior Analysis (NBA).
Sourceres NBA solution benets both Information Security and Network
Operations groups. RNA or NetFlow Analysis enables Information Security to
guard against attacks that originate from the inside by establishing normal
trafc baselines and detecting network anomalies. When anomalies are
detected, Defense Center can send real-time alerts via e-mail or SNMP. With
information from RNA or NetFlow Analysis, the DC also enables Network
Operations to monitor bandwidth consumption across the network and
troubleshoot network outages and performance degradations.
Sourcere RUALink User Identity to Security and Compliance Events
Sourcere is the only IPS provider to link user identity to security and
compliance events. Sourcere RUA (Real-time User Awareness) passively
detects Active Directory (AD) and LDAP logons, pairs usernames with their
corresponding host IP address, and forwards the information to Defense
Center. For each username shown on the DCs Table View of Users, the security
analyst can see the corresponding IP address and the users rst and last name,
department, e-mail address, and phone number. RUA drastically reduces the
time and effort to determine users affected by security and compliance events,
when time is of the essence.
Powerful Integration with Third-Party Systems
Sourcere offers more ways to integrate with third-party security and network
management products than any other IPS vendor. Defense Center provides a
number of remediation options, and virtually any kind of event, including IPS
events, RNA events, and 3D health alerts, can be used to initiate a number
of responses. Responses include the creation of syslog events, SNMP alerts,
event logging, or the initiation of a custom response by leveraging the DCs
Remediation API. The Remediation API ships with a number of pre-built
response modules for passing critical alert data to third-party products,
including Cisco routers and PIX rewalls, OPSEC for Check Points VPN-1/FW-1,
NMAP, and Nessus. Admins can build their own modules and achieve additional
integration with a variety of other third-party applications, including helpdesk,
NAC, and patch management solutions.
Figure 2. Sourcere RUA immediately provides full contact information for a username
associated with a security or compliance event.
Sourcere Defense Center
Enables Numerous Enterprise
Tools
Compliance white lists & P&R
rules to monitor & enforce IT
policy compliance
Network Behavior Analysis (NBA)
Detect & quarantine internal
threats by establishing trafc
baselines & detecting anomalies
Monitor bandwidth consumption
across the network
Troubleshoot network outages &
performance degradations
Sourcere RUA for linking user
identity to security & compliance
events
Click on username to access full
contact info
First & last name
Department
E-mail address
Phone number
Support for Active Directory &
LDAP
Third-Party System Integration
Options
eStreamer API for ofoading
host & event data to 3
rd
-party
applications
Remediation API for integrating
Sourcere event data into
3
rd
-party applications
Direct active scanning instances
using NMAP & Nessus
Sourcere MDC mode for
managing up to 10 subordinate DC
appliances
5 WWW.SOURCEFIRE.COM 03.09 | REV 2
2009 Sourcere, Inc. All rights reserved. SOURCEFIRE, SNORT, the Sourcere logo, the Snort and Pig logo, SOURCEFIRE 3D, SOURCEFIRE RNA, CLAMAV, SECURITY
FOR THE REAL WORLD, SOURCEFIRE DEFENSE CENTER, SOURCEFIRE RUA, DAEMONLOGGER, SOURCEFIRE SOLUTIONS NETWORK, and certain other trademarks
and logos are trademarks or registered trademarks of Sourcere, Inc. in the United States and other countries. Other company, product and service names may be trademarks or
service marks of others.
In addition, all IPS, RNA, and 3D Sensor health events on the DC can be
forwarded via the eStreamer API to other applications, such as SIEM and
network management platforms. The eStreamer API includes a reference
client that allows customers to format and integrate precisely the data from
Sourcere 3D that they need. eStreamer can also be queried by third-party
applications to provide host data stored in the DCs network map.
Sourcere Master Defense CenterEnterprise Scalability
For very large organizations or organizations with distributed IT personnel,
a single DC3000 can be congured in Master Defense Center (MDC) mode to
manage up to 10 subordinate DCs, effectively allowing the management of
many hundreds of sensors from a single management console. Sourcere is
the only IPS vendor to offer this powerful management capability.
Subordinate DCs can forward and aggregate selected events to the MDC for
further analysis and alerting. IPS, RNA, system, and health policies can also
be pushed down from the MDC to subordinate DCs and/or sensors from one
centralized MDC console.
With the MDC capability, enterprises of all shapes and sizes can reduce
operating costs and achieve economies of scale when multiple DC appliances
are spread throughout their organization.
TAKE THE NEXT STEP TO PROTECT YOUR NETWORK
Sourcere Defense Center is a highly customizable centralized management
console for basic security and operational tasks, but it also does so much more.
Below is a summary of Defense Centers key capabilities.
Centralized event monitoring and sensor management
Customizable dashboards with numerous drag-and-drop widgets
Sophisticated and customizable reporting
E-mail and SNMP alerts
Automated Sourcere VRT rules updates
Enables real-time network intelligence, automated impact assessment,
automated IPS tuning, IT policy compliance, NBA, and user identication
Store up to 100,000,000 events and manage up to 100 3D Sensors from a
single DC
Master Defense Center (MDC) capability for managing up to 10 subordinate
DC appliances
To learn more about Sourcere Defense Center, visit our Web site at www.
sourcere.com or contact Sourcere or a member of the Sourcere Solutions
Network today.
Master Defense
Center (DC3000)
Defense
Center
3D Sensor 3D Sensor 3D Sensor
Defense
Center
3D Sensor 3D Sensor 3D Sensor
Defense
Center
3D Sensor 3D Sensor 3D Sensor
Global IPS
and RNA Policies
IPS, RNA, RUA,
and Health Events
IPS, RNA, and
Sensor Health Events
Figure 3. Sourceres Master Defense Center (MDC) capability allows management of up to 10
subordinate DC appliances.
Once inside the managerin
this case, the Sourcere
Defense Centerwe can view
more details about the alert and
even start packet captures, if
necessary. Packet captures are
very benecial tools that we
used as part of this pilot which
are not always available on
other products.
Tristan Morel LHorset, Director of
Managed Security Services, Unisys
Federal Government Group

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy