Automated Threat Detection and Response (ATDR) : Customer Presentation
Automated Threat Detection and Response (ATDR) : Customer Presentation
Response (ATDR)
Customer Presentation
1 The Market: Projected to grow from USD 31.6 billion in 2020 to USD 65 billion by 2027
2 The Need: Able to Detect, Respond and Recover with Business Context and Response Automation
3 The Impact: Limited Human and Financial Resources, Evolving Unknown Threats, Ever-Growing Data
4 To Customer: Fast Scalable Platform, Comprehensive Visibility, Latest Techniques and Tactics
5 Opportunity: Reduce Business Risk, Avoid Breach Costs and Operational Costs, Prepare for Delivery
7 Platform: Out-of-the-box MITRE Content, 350+ Use Cases, Integrated Response and Automation
Business Challenges & Solutions
• Increased exposure and false sense of security from outdated use cases and design • Enhanced security posture with closed gaps and updated design
• Failure to deliver and demonstrate value of investment
• Reporting aligned with current security requirements
• Inability to communicate improvements in security posture over time
• Reduced organizational support and commitment to incident handling program • Accurate, real-time fraud/threat detection with minimal impact to user
experience
• Can’t keep pace with latest cyberthreats and tactics
• Unaware of the money, credentials, assets and identities that my business is losing • 24 x 7 x 365 dedicated/shared operations with MITRE content integration
• Prevented from offering new services/products due to lack of controls
• Layered response strategy to safely offer new products and services
Acceleration
Visibility into the organization’s security threats and incidents via an efficient incident management process. A scalable solution security monitoring solution that by
leverages advanced automated response capabilities to perform analysis and incident management, helping the team better contextualize threats and gain insightful
information.
GLOBAL MARKET OPPORTUNITY
The Global Security Operations Center (SOC) Market is expected to register a CAGR of 10.31% during the
review period, 2019-2025.
(source: https://www.marketwatch.com/press-release/security-operation-center-market-company-profiles-business-trends-covid---19-outbreak-industry-profit-growth-global-segments-landscape-
and-demand-2021-01-11 )
5
Solution Package Summary
Scale to Grow Objective Goal
Simple:
Lite
1 up to 1 • Install in minutes
1000 EPS • Configure in hours
• Value in days
• Easy and reliable upgrades
• Single data store
Small
2 up to
2500 EPS Open:
2 • Robust, documented APIs
• Easy data/information exchange
Automated Threat Detection &
Response
Medium • Event sharing
3 up to
5000 EPS
Intelligent:
Large 3 • Self-healing infrastructure
4 up to
10000 EPS
• Ready-to-use content
• Informed dynamic correlation rules
6
Description
ArcSight real-time correlation enables the fastest way to detect and escalate
known threats. ArcSight also enables both simple and complex automated
responses, out-of-the-box, that can be triggered on-demand or by specific alerts.
A cybersecurity dashboard that helps bridge the communication gap between IT
security teams and Boards of Directors, offering a high-level view of their
Automated Threat organization’s cybersecurity environment.
Detection & Response
Solution Features
• End-to-end security operations, faster and more accurate threat detection and response.
• Open architecture, offering greater interoperability to improve ROI and lower TCO, with the
flexibility to scale and expand coverage.
Automated Threat • Provides Single User Interface for All ArcSight Suite of Products.
Detection & Response
Use Cases
• Exposure Time Reduction Compliance
• Operational Efficiency Preemptive Threat Detection
Value Proposition
• Build the Detection & Orchestration Platform and Integrated Data Sources view
• Tailored Threat based Playbooks
• Customized CISO Dashboard
Deployment Options
On-Premises Cloud Managed
Architecture – Automated Threat Detection and Response
Transformation
ESM
Smart
Hub
Fusion
Connector
SOAR
Log Source
9
Package Components and SKU’s
VCPU RAM HDD
Variants Required Components IOPS SKU Remarks
Core GB TB
SWAA303Y1
1000 EPS
ArcSight ESM 12 64 5 6000 QTY 1 will allow 2500 EPS capacity. Provides
90 days online retention
Small
SWAA305Y1
5000 EPS
NOTE: All the SKU’s are applicable as per the regional price list.
Benefits for Customers
FASTER BUILT-IN
DEPLOYMENT USE CASE PACKS
Customer Onboarding Process
CyberRes SecOps Team and CyberRes SecOps Team will Once customer agrees to on-
Partner identifies
Partner jointly work on demonstrate the solution board, Partner builds the
opportunities
customer requirement package in lab environment respective package(s)
2. The given compute specifications are for ESM & Response applications only; customer needs to procure this.
3. Customer needs to factor OS licensing, patching, system hardening, and ongoing maintenance.
4. Customer needs to factor Smart Connector compute based on actual deployment architecture. Smart Connector is a free
download from Micro Focus, with no licensing cost.
5. Online log retention is 90 days, meaning the application can hold 90 days old of old searchable data. Online retention can be
modified based on customer requirement; however, storage space will change according to retention requirements.