You are on page 1of 55

CYBER SECURITY

PAC K E T W O R K E R
N E T W O R K S I T U AT I O N A L A W A R E N E S S
Every connected
asset is a potential
target.
ŸŸ The global median dwell time from
compromise to discovery in 2018 was 78
days.
ŸŸ 38% of the organisations surveyed were not
aware that they had been compromised.
ŸŸ >50% of breaches are carried out by well-
funded and organised crime groups.
ŸŸ Insider threats increased from 20% in 2014 to
~30% in 2018
ŸŸ Motives are not just financial in nature.
It includes espionage, grudge, fun and,
shaming.
Sources: Industry analysts and market data, March 2019

Buyers want better threat detection - cutting


hacker dwell time once they get inside. data
science techniques such as Machine Learning
allows use of predictive models for network
and application traffic analysis enabling
prompt threat detection to improve business
confidence.

Index
PacketWorker for Network Situational Awareness 05
Case Study - Banking 10
Case Study - Manufacturing 18
Case Study - Telecommunications 24
Case Study - Critical Infrastructure/Government 30
Case Study - Energy & Utilities 36
PacketWorker Appliances Datasheet 41
White Paper 45
Machine Learning as employed by PacketWorker 52
Vehere PacketWorker is an effective cyber
threat detection and response solution
that helps organisations minimise risk by
accurately detecting cyber threats and
enabling swift response. It facilitates efficient
resolution of identified security incidents
with relevant context, concrete evidence,
actionable intelligence and response work-flow
integrations.

PacketWorker for Network Situational Awareness


offers meaningful insights from comprehensive
monitoring of networks, enabling security
practitioners implement efficient, cost-effective
and predictive threat-detection technologies
besides permitting time-travel to effectively
respond to security incidents.

We are able to give organisations an advanced


threat detection solution that removes many
of the shortcomings that make ‘air-gapped’
environments vulnerable and inefficient for
teams to manage.

02 - Vehere Cyber Security


Who What What sets Where we
we are we do us apart are present
We are a young Our products and PacketWorker We are present in three
product company services enable technology can continents with offices in
developing organisations to identify an attack the United States, South
strategic and detect threatening early enough to Africa, Singapore and India.
tactical solutions for abnormalities ensure that an
law enforcement emerging across the incident doesn’t
and national network in real time, escalate and become
security (LENS) including insider a problem.
agencies and threats and ‘unknown So, it helps defends
Network Situational unknowns’, enabling your most critical
Awareness for cyber the security team to assets.
security and risk disrupt attacks before
managers. they can cause any
harm.

Vehere Cyber Security - 03


Working off full packet
capture or flow-records,
PacketWorker’s self-
learning starts from
day one, detecting
anomalous and
suspicious behaviours
on the network.

PacketWorker for Network


Situational Awareness

Vehere Cyber Security - 05


PacketWorker for Network
Situational Awareness

06 - Vehere Cyber Security


NetSA
Increased risk of exposure Organisations looking at improving
It may come as a surprise to some, but the their defenses can benefit by employing
fact is that <10% of all known vulnerabilities automation techniques to anticipate and
have actually been exploited so far. This respond to security risks.
leaves the security and risk practitioners
Vehere PacketWorker is an effective cyber
with a daunting task of ensuring that the
threat detection and response solution
assets under their watch stay protected.
that helps organisations minimise risk by
With a dearth of security skills, adoption
accurately detecting and enabling swift
of advanced strategies and expensive
response to cyber threats. It facilitates
technology is beyond the feasibility of most
efficient resolution of identified security
organisations.
incidents using concrete evidence,
For all practical purposes, the network is actionable intelligence and response work-
a perpetual source of data for proactive flow integrations.
and predictive analytics that can enable
Working off full packet capture or flow-
monitoring of almost all possible attack
records, PacketWorker’s self-learning starts
vectors.
from day one, detecting anomalous and
Security and risk practitioners are well suspicious behaviours on the network. Key features
aware that cyber-security has a significant
PacketWorker enables security practitioners
impact on accomplishment of business
to monitor the current state of the network Comprehensive rules, frameworks
goals. To better defend their organisation,
in aid of their security posture assessment. and Machine Learning algorithms
it’s imperative that they start automating
Retention of raw packets and metadata automate detection of security risks in
analytics tasks on network data to identify
enables historical analysis to probe into real time.
threats and risks.
root-cause or past trends that find use in
Improved Network Situational predictive analysis.
Deep packet and payload inspection
Awareness PacketWorker reduces dwell time from days helps detect thousands of protocols
It’s known for a fact that advanced malicious to hours when it comes to investigating and applications to provide precise
actors test and validate effectiveness of security issues. It enables security managers contexts.
their craft against the same set of tools that to free up human resources quickly to
enterprises use for defending their assets. attend to important business imperatives. Powerful visualisation platform
Besides, advanced automation techniques PacketWorker’s user interface offers an easy- enables threats to be analysed and
are actively being employed by malware to-use and customised dashboard to gain investigated intuitively to help reduce
factories to improve code quality and situational awareness using data enrichment mean-time-to-detect and mean-time-
evasion techniques resulting in repetitive that eliminates the need to refer to third- to-respond.
success against well-fortified targets. party correlations and look up sources.
Session replays and reconstructions
facilitates better assessment of
security risks using third-party tools or
human analysis.

Detects IPv4 and IPv6 traffic in VLAN,


MPLS encapsulation and tunnelled
traffic to support deployment for
most environments.

Vehere Cyber Security - 07


Packet broker
Data store User interface
Response
actions
Full Packet
Network tap
Capture
DATA Rules UNIFIED
ENRICHMENT framework INTERFACE
Port mirror Northbound
integrations
Forensics
Advanced
Flow automation
Flow record
configuration

Provisioning Acquisition Context Automation and integration Action

08 - Vehere Cyber Security


NetSA
Network Situational Awareness About PacketWorker
Full packet capture: Integration with
network packet brokers and taps to support
non-disruptive setup in any network. Available as ISO image and purpose-
built appliance.
One box and one hour to install:
Everything is contained in a single
appliance. Setup is easy with built-in Installed, configured and deployed in
configuration wizards. less than an hour.

Bundled DPI and ML algorithms: This


User interface accessible using a web
ensures that the system is up-and-running
browser.
in any environment (including air-gapped
networks) without the need to look up
external sources of threats. The system ‘Standard’ and ’Extended’ support
leverages Machine Learning and human options to suit different service-level
knowledge to detect cyber risks. agreements.

Accelerated results: PacketWorker provides


useful results from the very first day. Quality Incident response and professional
insights into cyber activities and proactive services to assist with product use
threat detection enables improved optimisation.
assessment and effective responsiveness in
the face of security risks.

Capabilities
ŸŸ Capture, classify and index all
communications on the wire at line-
speeds.

ŸŸ Detect, analyse and, dissect traffic across


all ports and protocols.

ŸŸ Use mathematical modelling to classify


encrypted communication.

ŸŸ Detect threats, policy and compliance


violations using out-of-the-box
automation.

ŸŸ Integrate with existing security


ecosystem tools such as SIEM, sandboxes
and trouble-ticketing systems.

Vehere Cyber Security - 09


Case study #1

Banking

10 - Vehere Cyber Security


PacketWorker’s innovation has turned it into an

Banking
essential device for security teams attempting to
comprehend the scale of their network, observe activity
levels and detect potential shortcomings. Machine
Learning plays a key role in defending assets from
cyber-criminals and malicious insiders.
Summary

Industry/Organisation
Banking

Challenges
ŸŸ Comply with regulatory and audit
requirements

ŸŸ Attain comprehensive visibility

ŸŸ Secure organisation from breaches,


data thefts and malware/zero-day
attacks

ŸŸ Reduce complexity with security


analytics adoption

Solution
PacketWorker 10G (combined with
professional services)

Benefits
ŸŸ >50% improvement in detection
efficiency

ŸŸ >60% time optimisation for


investigations

ŸŸ >30% reduction in risks associated


with data breaches

ŸŸ >90% reduction in compliance


efforts

Vehere Cyber Security - 11


“Insider threat is one of the most serious
threats a company can face. We knew we
needed to prioritise, reduce, and manage
cyber security risks to address the needs of
our business.”
- Name withheld, R1

12 - Vehere Cyber Security


Banking
Background Business challenges Regulations regarding technology and
The contemporary world is witnessing Due to a growth in its customer base information security are far-reaching and
customer expectations, technological and burgeoning data usage, R1’s ability include areas such as e-mail, SWIFT-coded
capabilities and regulatory requirements to respond to these increased risks from payments, cipher suite strength, domain
join forces with demographic and economic malicious insiders and unknown vectors/ name systems, core banking solutions and,
factors to bring about radical changes. This exposures, had been severely hampered. R1 back-office applications. R1 recognised a
has caused banking institutions to look needed to manage this ever-growing, ever- need to proactively defend its sensitive
for ways and means to get used to these changing array of risks from across the globe information across the technological value
changes and adopt a proactive approach while ensuring adherence to stringent chain. Therefore, R1 undertook a decisive
towards security. Financial institutions will regulatory requirements. The challenges initiative to implement technologies that
always be prime targets for cyber-criminals, included: could help it make sense of the ‘unknowns’
making their security requirements and provide tangible answers during
extremely complex. ŸŸ Preserving customer trust by protecting investigations.
data privacy.
This case study focuses on a large global If there was a targeted attack and R1’s
bank and will be referred to as R1 for the ŸŸ Maintaining strong security without computers were to become affected, it
sake of anonymity. The bank’s intelligence impeding business operations. would have resulted in business disruption
data was facing significant cyber threats and potentially lead to privileged
ŸŸ Ensuring compliance with regulatory
from multiple sources. However, despite information getting leaked. R1 needed
requirements.
implementing multiple security protocols, to urgently respond to incidents that
R1 continued to suffer security lapses. The ŸŸ Adding new devices and introducing required sourcing specialists from external
bank’s business operations were getting services to networks devoid of security agencies to assist it with time-consuming
impacted each time such an incident was monitoring or any understanding of and risky processes. Thus, the impact of any
happening. exposure. incident could have amplified. R1 needed
an integrated solution that would allow it
ŸŸ Accommodating bring-your-own- to maintain staff productivity, ensure threat
devices and guest end-points without detection and facilitate rapid response and
compromising on security. recovery.

ŸŸ Combining existing security tools into


cohesive solutions that accelerate
incident-response times and reduce
vulnerabilities.

Vehere Cyber Security - 13


“PacketWorker’s technology gave us visibility into
potential implementation differences and policy
discrepancies. Leveraging its technology, we were
able to identify and remedy these differences before
connecting the two networks, mitigating potential
integration risks.”
- Name withheld, R1
14 - Vehere Cyber Security
Banking
Solution – PacketWorker 10G detect potential shortcomings. Machine
Traditional tools that are programmed to Learning plays a key role in defending assets
spot known threats are no longer sufficient. from modern cyber-criminals and malicious
Modern network border defenses, such as insiders. The technology detects threats and
firewalls, perform an important function. abnormalities emerging across the network
However, insiders often escape restrictions on a real-time basis, including insider threats
imposed by these perimeter security and ‘unknown unknowns’, enabling the
controls. security team to disrupt attacks before they
can cause much harm.
Limitations posed by legacy
Whenever any anomalous behavioural
approaches changes happen within the environment,
ŸŸ Perimeter controls are dependent on
PacketWorker identifies them and alerts
signatures, rules and heuristics and,
the organisation. Changes that are not
hence, are likely to miss attacks at points-
real threats are fused into PacketWorker’s
of-entry.
evolving understanding of normality. The
ŸŸ End-point security controls rely on arithmetic inside PacketWorker makes it
signatures and fall short when it comes uniquely equipped for featuring noteworthy
to detecting rogue behaviours or potential threats without burying them
detecting unknown attacks. beneath numerous unimportant or
repetitive alerts. Going beyond setting
ŸŸ Sandboxes are side-stepped by modern down simple rules applicable for
attacks, which recognise when they are network traffic, it can correlate numerous
in a fake space and delay the execution inconspicuous trends isolated by type
of malicious activities. or time to sniff out real emerging threats
and ensure that security analysts are not
ŸŸ Log tools and security information and burdened with false positives.
event management databases require
inordinate amounts of manual effort
to ensure data is consistently collected
across the entire organisation and
Benefits - visibility and
matched against the security team’s
predictions of threats. Besides, not every
answers
Equipped with Vehere PacketWorker,
actor needs to target assets holding the
R1 can autonomously defend itself
‘crown jewels’, they wish to simply exploit
against pernicious cyber-criminals
the chain of trust.
and insider threats. Since it does not
To combat these challenges, R1 deployed rely upon any prior assumptions of
PacketWorker 10G at the core and what ‘bad’ entails, the self-learning
peripheries of its network. After a prompt solution is also uniquely capable of
installation and using the deep packet identifying hitherto unseen threats.
inspection and analytics capabilities of
PacketWorker empowered R1 to
PacketWorker 10G, R1 gained complete
deal with cyber threats on a real-
visibility of its entire infrastructure, including
time basis. It allowed the security
IoT and non-sanctioned devices. Using
and risk management teams to
PacketWorker 10G, the security team was
proactively assess cybersecurity
able to identify anomalous activities and
postures and lay down rules to
disrupt them early, before any damage was
detect malicious behaviour besides
done.
using advanced predictive analytics
PacketWorker 10G’s innovation has turned to spot ‘unknown unknowns’
it into an essential device for security teams without disrupting ongoing
attempting to comprehend the scale of business processes.
their network, observe activity levels and
Vehere Cyber Security - 15
“R1 has been able to maintain stringent compliance
with industry regulations since PacketWorker was
implemented. The platform provides real-time
anomaly detection capabilities and unprecedented
visibility that is simply unmatched by any other
vendor in the industry.”
- Name withheld, R1

16 - Vehere Cyber Security


Banking
Results Vehere PacketWorker
ŸŸ Faster detection of internal breaches and
compromised customer.

ŸŸ Reduction in incident response times.

ŸŸ Fewer resources required to manage and


act on risk assessment.

ŸŸ Seamless detection of unknown and


Search Automation Machine Custom Integration
insider threats.
Learning Analytics
With PacketWorker 10G, R1 managed to
speed up triage from an average of five
days to less than six hours. By simplifying
an analyst’s interaction with network data
and using an easy point-and-click interface
Packet capture Flow data
to lay down complex behaviour-based
rules, enabled the security operations team
was imbued with the ability to deliver
predictable and repeatable outcomes
(irrespective of the skill set of the user),
maximising efficiency and significantly
reducing dwell-times.

Over time, R1 was able to identify and


alleviate threats with greater productivity
compared to the same period during the
previous year.

PacketWorker facilitated simplification of


implementation of big data-led security
analytics in security operations by
leveraging readily-available structured data
from the source of truth – packets on the
Data enrichment
network.

“We no longer live in an era where cyber-attacks are


limited to the desktops or servers. PacketWorker’s
Machine Learning fights the battle before it has
begun.”
- Name withheld, R1

Vehere Cyber Security - 17


Case study #2

Manufacturing

18 - Vehere Cyber Security


Manufacturing
Summary

Industry/Organisation
Manufacturing

Challenges
ŸŸ Lack of consistency and accuracy
in cybersecurity monitoring of
organisational assets

ŸŸ Inability to detect anomalous


events

ŸŸ Inadequate context when it came


to analysing security events

ŸŸ Absence of monitoring of IT-OT


integration for real-time risk
detection and response

Solution
PacketWorker 1G

Benefits
ŸŸ 100%-visibility into cyber activities
of organisational assets

ŸŸ 70% improvement in network/


security issue triages

ŸŸ Real-time detection of anomalous


events and activities

Vehere Cyber Security - 19


“Many manufacturing powerhouse companies fear
disruptive attacks the most, regardless of whether it is
done by internal or external attackers.”
- Name withheld, Client

20 - Vehere Cyber Security


Manufacturing
Background
Cyber attacks against industrial control
systems (ICS) weren’t noticeable till about
recently, and were purportedly less frequent
than IT attacks because numerous ICS
attacks don’t get revealed. However, ICS are
presently among the top targets of cyber
threats and attacks worldwide. Malware
infection, ransomware and other attacks, on
ICS assets can have serious ramifications.
With IT-OT integration, the risks of cyber-
attack on ICS endpoints are expanding.

Interconnections between control systems


and public networks deliver important
business benefits. However, without
appropriate security measures, it can
compromise control system availability and
cause service disruptions.

A 2017 industry report found that attacks


targeting ICSs have increased by >110%
compared to the previous year. While, a
2018 SANS study found that 69% of ICS
security practitioners believe threats to the
ICS systems are high or severe and critical.

Business challenges
Traditional solutions don’t work in ICS/
SCADA environments. The customer needed
technology to monitor their enterprise IT
ICS and SCADA and SCADA networks as coherent entities of
ICS is an umbrella term covering many historically different types the enterprise network. Given the mission-
of control systems such as SCADA (supervisory control and data critical nature of assets deployed in ICS
acquisition) and DCS (distributed control systems). Also known as environment, enhancing or upgrading these
IACS (Industrial automation and control systems), they are a form of systems with preventive security controls
operational technology. In practice, media publications often use was deemed unacceptable.
‘SCADA’ interchangeably with ‘ICS’.

Vehere Cyber Security - 21


“The energy sector has The threat to the energy/manufacturing
sector is serious and it’s becoming
become a major focus increasingly difficult to guard against lateral
for targeted attacks movements as a result of integration of IT
and is among the with operational technology (OT) systems.
This integration offers attack vectors the
top-five most targeted chance to seep into OT networks, which
sectors, worldwide”. were unmonitored and unprotected, leaving
- Name withheld, Client the company with little technological help
to effectively respond to such risks.

The client’s in-use tools offered little or no


visibility into network traffic and the security
operations were found to be inadequately
prepared to manage never-before-seen
threats in SCADA environment. The
client required a solution that would give
comprehensive visibility into the network,
and also lower some of the burden their
security team was carrying.

22 - Vehere Cyber Security


Manufacturing
“PacketWorker has added
another dimension
of refinement to our
defense systems and
productively identified
threats with the potential
to disrupt our networks”.
- Name withheld, Client

Benefits
PacketWorker has rapidly turned
into an essential part of client cyber
security strategies, because of its
one-of-a-kind methodology and
capacity to detect emerging threats
Solution – PacketWorker 1G PacketWorker is a fundamental innovation before they have the potential to
Following a tightly-guarded security that views data from an ICS network in real cause significant damage.
event whose remnants were detected time and sets up a developing pattern for
On deploying PacketWorker, the
by PacketWorker during a later proof-of- what is normal for operators, workstations
organisation was immediately
concept trial followed by a pragmatic policy and automated systems within that
alerted of potential intrusions
review cycle, the company decided to environment. With PacketWorker’s Machine
inside its systems that had already
adopt PacketWorker 1G for their IT and OT Learning, organisations can distinguish
bypassed its other security tools.
networks. and react to emerging threats in real time.
Following an easy implementation
Advanced behavioural analysis can detect
PacketWorker demonstrated the inherent process, it now currently utilises
even previously unseen novel or custom-
value of its self-learning threat detection PacketWorker to persistently analyse
fitted attacks, regardless of whether they
abilities, which is uniquely capable of the overall health of its system
originate in the corporate IT or OT domains
forming an understanding of normal and and to spot sporadic activities that
or navigate between them.
abnormal behaviours without any prior have a high likelihood of being
knowledge. Total prevention of all cyber compromises pernicious, hazardous or non-
is not a realistic goal, but, if identified compliant.
ICSs confront various cybersecurity threat early enough, threats can be alleviated
vectors with varying degrees of loss The advanced cyber defense
before they become full-blown crises.
potential, ranging from non-compliance to technology allows clients to
PacketWorker’s technology can be deployed
disruption of operations, and beyond. secure themselves from the most
across both IT and OT environments to
deceptive attacks that endanger
provide full coverage to an organisation.
Cost of post-event mitigation is significantly critical infrastructure systems,
higher, not to mention the financial loss. regardless of whether those threats
Hence, it is a prudent strategy to ‘efficiently originate from within or outside the
detect and respond swiftly’ to security organisation.
threats in ICS networks to keep costs low.
Vehere Cyber Security - 23
Case study #3

Telecommunications

24 - Vehere Cyber Security


Telecom
Summary

Industry/Organisation
Telecommunications

Challenges
ŸŸ Gain visibility into what’s
happening on the network

ŸŸ Speed up triage – reduce time to


respond to security incidents

ŸŸ Comply with regulatory mandates

ŸŸ Protect the system from


constantly-evolving threats

Solution
PacketWorker 10G

Benefits
ŸŸ Real-time insights into
applications, actors and, actions

ŸŸ Prompt incident response


and discovery by leveraging
comprehensive indexing and
searching capabilities

ŸŸ Improved performance of
application monitoring and
network behaviour analytics for
non-standard management-plane
traffic

ŸŸ Reduction in total cost


of ownership for security
implementation

Vehere Cyber Security - 25


“We needed to ensure compliance with regulatory
requirements and enhance visibility with respect to
management-plane applications.”
- Name withheld, Client

26 - Vehere Cyber Security


Telecom
Background
The security leadership of a leading
telecommunications company was looking
to curtail costs and improve the efficiency
of the cyber threat detection solution that
was deployed for their management-plane
networks. The incumbent vendor’s solution
was at its end-of-life stage and the cost of
refreshing the technology was proving to be
higher than budgeted.

Gaining visibility into the


network
Burgeoning growth in terms of customer
base and data usage had meant that the
company’s network had become more
complex and the throughput had exceeded
10 gigabytes per second across majority of
their router interfaces. Adding to their woes
was the fact that the solutions available at
their disposal did not really have much to
offer in terms of detection for management-
plane applications. Subsequently, the
company began to look for a technology
that could help them make sense of the
‘unknowns’ and provide a response to
the questions that were being raised as a
result of the security incidents they were
encountering. The company was found to
be lacking the ability their sectoral peers
had in terms of discovering and triaging a
security incident. Not only did this indicate
the waning power of the company’s risk
management framework but also its
potential inability to deal with a material
attack, if and when it happened. There was a
“Vehere’s PacketWorker is extremely powerful when strong likelihood that the company was on
it comes to detecting abnormal activities that can the verge of inviting customer ire because
threaten our cybersecurity framework.” of the aforementioned failings.

- Name withheld, Client

Vehere Cyber Security - 27


“We have ensured stringent compliance with
established sectoral regulations ever since
PacketWorker was installed.”
- Name withheld, Client

28 - Vehere Cyber Security


Telecom
Solution – PacketWorker 10G unknowns. Capitalising on a powerful
By leveraging the deep packet inspection deep packet and payload inspection,
and analytics capabilities of PacketWorker, PacketWorker offered full visibility into
the company gained incisive insights into network traffic along with the ability
their management-plane traffic and by to analyse encrypted communications
utilising signature-less techniques they using mathematical models. Security
were able to detect security risks and shield analysts leveraged the visual play-book
the network from sophisticated cyber and time-travel capabilities to determine
threats. PacketWorker is an effective cyber root causes of incidents and retrieve
threat detection and response solution actionable intelligence – from session
that helps organisations minimise risk of correlations and graphic analyses – to
expensive breaches by accurately detecting improve the organisational security posture.
and enabling swift responses to thwart Furthermore, all this was done without
cyber threats. PacketWorker facilitates the disrupting ongoing business processes.
efficient resolution of identified security
incidents using concrete evidence, Accelerated resolutions
actionable intelligence and response With PacketWorker, the company managed
workflow integrations. The solution is true to trim their incident resolution time from
big data architecture that is built around days to hours and simplified an analyst’s
a search engine to speed up retrieval of interaction with network data. An easy
information and execute complex analytical point-and-click interface was used to lay
tasks such as identifying instance of spikes down complex behaviour-based rules,
and slow and low-flying traffic, correlating which enabled the security operations
them across multiple activities and finding team to deliver predictable and repeatable
similar patterns to tell normal and malicious outcomes, irrespective of the skill set of the
behaviour apart. user. The result: maximised efficiency and
reduced dwell-time. PacketWorker used big
Visibility and answers data analytics to eliminate considerations
PacketWorker empowered the company to pertaining to events or log rates and
get cyber threat alerts on a real-time basis. obviate the need for deploying collectors
PacketWorker’s unique ability allowed the for different applications and processes. The
company’s security and risk management platform ran on readily-available structured
teams to proactively assess security postures data that it gathered from the source of
and formulate detection rules and use truth – packets on the network.
advanced predictive analytics to detect

Vehere Cyber Security - 29


Case study #4

Critical infrastructure/Government

30 - Vehere Cyber Security


Critical Infra
Summary

Industry/Organisation
Critical infrastructure/Government

Challenges
ŸŸ Concerns about the prevalence of
fast-moving, automated attacks

ŸŸ Adopt a proactive approach to


cyber defense

ŸŸ Attain comprehensive visibility


into critical infrastructure stations

ŸŸ Secure itself from breaches, data


thefts, malware/zero-day attacks

ŸŸ Too many false positives

ŸŸ Insider threats

ŸŸ Surfeit of reactive and lack of


proactive measures

Solution
PacketWorker 10G and professional
services

Benefits
ŸŸ 100%-network visibility including
in ICS protocols

ŸŸ Improved response time by >100%

ŸŸ Reduction in cybersecurity risks,


data losses and subsequent costs
of restoration

ŸŸ Compliance with contractual and


regulatory obligations

ŸŸ Detection of automated attacks in


real time

ŸŸ Increased efficiency with proactive


alerts

Vehere Cyber Security - 31


Critical infrastructure owners need more “A wide range of risks are now being played out in
resilience, with fewer siloes and the
competency to detect, scrutinise and
the cyber domain and pose a real and growing threat
respond to issues in real-time – as they to the energy and utilities industry.”
occur. - Name withheld, Client

32 - Vehere Cyber Security


Critical Infra
“Disruption of Business challenges
In the context of an increasingly
critical infrastructure sophisticated threat landscape, the client
has tremendous was essentially worried about impact of an
psychological impact as attack on its rather infrequently-updated
and under-protected SCADA network.
large-scale disruption to Specifically, it was concerned about
civilian facilities leave a fast-moving and automated threats, like
profound impact”. ransomwares/cryptwares, that have the
- Name withheld, Client potential to jeopardise operations at the
earliest opportunity. With a security stack
that primarily depended on border defense
based on rules and signatures, the client
Background was unable to take a proactive approach
As an integral part of national critical when it came to cyber defense.
infrastructure, cyber security has been
a priority for the client (a public sector In addition to confronting evolving cyber
enterprise) for some years. However, threats, the client was affected by tight
recent high-profile attacks on operational budgets and lack of resources, complex
technology uncovered significant gaps in processes, and a need to stay up-to-date
security posture. With the threat landscape with latest regulatory mandates, attack
rapidly advancing, and mounting cost methods, and technologies.
of mitigating security breaches, a new
approach to cyber defense for Industrial Additionally, client felt it lacked visibility
Control Systems became an urgent into its internal network. It wanted a
requirement. As attacks continue to increase solution that could provide insights into
in volume and sophistication, critical the behaviours of users, devices, and the
infrastructure owner had to evolve. network as a whole. Keeping resource
constraints, training and integration needs
The client acquired significant cyber threat in mind, the client set out to identify an
and risk intelligence data from multiple easy-to-deploy solution to combat next-
sources. However, despite application of generation threats, including zero-day and
available intelligence to various security advanced persistent threats, to supplement
controls, client continued to experience legacy security defenses across the
security incidents. corporate infrastructure.

Vehere Cyber Security - 33


“PacketWorker’s Machine Learning technology has
proven instrumental in terms of providing visibility of
devices we didn’t even know we had on our network”.
- Name withheld, Client

34 - Vehere Cyber Security


Critical Infra
Benefits
With PacketWorker’s Machine
Learning abilities, the client re-
established trust in its security
operations to defend itself
from evolving and increasingly
automated attacks. Since the
solution prioritises detection
outcome by potential gravity, it
enables security professionals
to optimise their resources for
increased effectiveness.

PacketWorker allows the security


and risk management teams to
proactively assess security postures
and then sets up detection rules to
maintain their edge over malicious
behaviours besides using advanced
predictive analytics to detect
Solution – PacketWorker 10G PacketWorker proved to be an effective unknowns. All this is done without
Following a quick installation, security cyber threat detection and response any disruption to ongoing business
analysts were able to identify abnormal solution that helped the client respond processes.
activities and disrupt exploitative actions swiftly to cyber threats. It facilitated efficient
in the early stages, before any damage resolution of identified security incidents Exemplary performance and
was done. It also provided the client with with concrete evidence, actionable detailed contextual availability
total network visibility. From day one, intelligence and response workflow enabled the cyber security team
PacketWorker started to analyse users, integrations. to focus on responding to threats
devices and network behaviours, in real quickly, minimising operational and
Machine Learning is a principal ally in terms business impact.
time and, detecting anomalies pertaining to
of defense of assets from cyber-criminals
cyber risks.
and malicious insiders. The technology Over time, the client was able to
PacketWorker demonstrated the inherent detects the slightest of abnormal identify and alleviate threats more
value of its self-learning threat detection behaviours across network in real time, efficiently compared to the previous
abilities, uniquely capable of forming an including ‘unknown unknowns’, enabling year.
understanding of normal and abnormal the security team to detect and respond to
behaviours without any prior knowledge. attacks before any harm befalls.
Vehere Cyber Security - 35
Case study #5

Energy and Utilities

“We have a lot of suspicious communication that we don’t


necessarily get time to analyse but PacketWorker helps
focus our efforts just on the riskiest ones and enables us to
safely investigate their true nature and intent”.
- Name withheld, Client

36 - Vehere Cyber Security


Energy &
Utilities
Summary Background
Cyber security and compliance continues
to be a challenge for many energy sector
Industry/Organisation organisations. Hackers, including both
Energy and Utilities state and non-state actors, are getting
progressively advanced in their attacks,
making it increasingly hard to keep up with
Challenges
the latest threats.
ŸŸ Need to improve detection rates
without impacting business Analysts noted an increase of >60% in
continuity or taking excessive hacktivism targeting the energy sector. A
measures to lock down machines 2018 survey of IT professionals across the
oil, gas, utility and energy sectors found that
ŸŸ Enhanced compliance posture
fewer than half believed their organisations
ŸŸ Long and tedious operations and could immediately detect a cyber-attack,
security investigations lacked although ~65% believed that they were
visibility a target. Furthermore, 81% believed that
attacks could do ‘serious damage’. All
ŸŸ Concern about prevalence of fast- the statistics pointed to a clear state of
moving, automated attacks uncertainty with the prevalent style of risk
management and adoption of security
Solution controls.
PacketWorker 10G and professional
services

Benefits
ŸŸ Gained real-time operational
visibility

ŸŸ Reduced operational disruption


and remediation costs

ŸŸ Consolidated intelligence and


reporting

ŸŸ Ensured immediate and significant


drop in attacks

Vehere Cyber Security - 37


Business challenges The main hindrance faced was that users ŸŸ Limited data retention capabilities.
Although there has been an increased focus could not get a context or insights from
multiple security solutions quickly enough ŸŸ No compatibility with other
on cyber security in the recent years, threats
and in one place to perform an efficient technologies.
against the energy sector continue to go
undetected for an average of six months. investigation. This is precisely why adopting
To protect its digital infrastructure, the client
Machine Learning can help improve
required situational awareness of its security
A key reason behind this is alert overload. versatility cyber hygiene and compliance.
posture, context and relevant insights for its
Standard cyber security deployments
The client’s previous tool set had led to a departments and stakeholders.
generate thousands of alerts per week,
but the client organisation only had the number of challenges, including:
resources to investigate ~5-6% . With 20%
ŸŸ Slower threat detection and response
reliability rate, the client believed they were
due to too many disparate tools, too
wasting precious time and money each
much information and the need for a lot
year chasing false positives or performing
of manual correlation to find the right
investigations with inadequate insights.
data.

38 - Vehere Cyber Security


Energy &
Utilities
Benefits going on daily, the client was unable to
PacketWorker empowered the client analyse everything.
to detect and neutralise cyber threats
Exemplary performance and high detail
in real time. PacketWorker immediately
availability enabled the cyber security
affirmed that the bulk of client
team to respond to threats quickly,
infrastructure was clean but did detect
minimising operational and business
the presence of a certain malware in
impact.
their network and allowed them to “No business in the
zero in on a specific workstation for
remediation.
PacketWorker facilitated simplification energy industry is
of implementing big data-led security
analytics in a secops environment by
immune to security
From the first day of deployment,
eliminating the considerations around issues and fear of
clients have seldom had issues with
false-positives of the rule engine. This
event rate and the need for collectors disruptive attacks,
for different applications/processes.
has given them the certainty to resolve
It is a platform for readily-available
regardless of whether
security incidents.
structured data lifted from the source – it is done by internal or
With large volumes of data transfer Packets on the network. external attackers.”.
- Name withheld, Client

Key facts and figures Solution – PacketWorker 10G PacketWorker was immediately able to
ŸŸ Energy attacks went up by 20% between Deployed in promiscuous mode to monitor identify a lot of malicious malware that had
2017 and 2018. This trend is expected to networks, PacketWorker proved to be an been entering the client’s environment.
continue as governments pours more effective detection and response solution The client saw the cost savings generated
resources into cyber warfare that helped respond swiftly to cyber threats. in terms of preventing the attacks and
It facilitated efficient resolution of identified the gains in efficiency resulting from
ŸŸ 75% of companies in the oil, gas and security incidents using concrete evidence, PacketWorker.
electricity reported a cyber attack in actionable intelligence and response
2018. Intruders were able to bypass PacketWorker does not require weeks and
workflow integrations.
protections that were in place. weeks of consulting to implement and the
The client had an account that was speed at which it can operate and mitigate
ŸŸ Cyber-attacks against energy companies the target of an email-based attack. risk is a key differentiator.
usually take months to discover. PacketWorker put the right protection in
Clients often need easy access to real-
place and stopped the ransomware from
ŸŸ 48% of energy and utility CEOs think a time data and actionable information to
deploying.
cybersecurity attack is inevitable, sooner understand where they need to focus.
or later.

Vehere Cyber Security - 39


PacketWorker can provide
meaningful insights
from comprehensive
monitoring of enterprise
networks for cloud and
shadow-IT, social media
and recreational access,
remote access, trusted-to-
trusted communication,
IoT, and encrypted
communication, enabling
security practitioners to
take proactive remedial
measures, faster.

PacketWorker
Appliances

Vehere Cyber Security - 41


PacketWorker Appliances
DATA SHEET

Key features

ŸŸ Comprehensive rules framework mean-time-to-detect and, mean-


and Machine Learning algorithms time-to-respond.
automate detection of security risks in
real time. ŸŸ Session replays and reconstructions to
facilitate better assessment of security
ŸŸ Deep packet and payload inspection risks using third-party tools or human
helps detect thousands of protocols analysis.
and applications to provide precise
context. ŸŸ Detects IPv4 and IPv6 traffic in VLAN,
MPLS encapsulation and tunneled
ŸŸ Powerful visualisation platform traffic to support deployment for
enables threats to be analysed and most environments.
investigated intuitively to help reduce

42 - Vehere Cyber Security


DataSheet
Services
Support
• Standard – 8/5 e-mail and telephonic support

• Extended – 12/5 e-mail and telephonic support

• Appliances – next business day hardware


replacement

• Web and knowledge base – 24X7 access

Implementation and consulting


• Site survey, preparation/readiness assessment,
consulting and deployment

• Custom-sizing and design for large- scale


deployment

Incident assurance
• Affirmation – confirm an incident/suspicion

• Assistance – provide operational assistance


for PacketWorker while your key human capital
undertakes critical incident response tasks

• Response – provides incident response execution


assistance

PacketWorker 300 - ideal for PacketWorker 1K - ideal for PacketWorker 10K – ideal for
throughput up to 300 mbps throughput up to 1 gbps throughput up to 10 gbps
ŸŸ 1 X gigabit-ethernet copper OOB ŸŸ 1 X gigabit-ethernet copper OOB ŸŸ 1 X gigabit-ethernet copper OOB
interface interface interface

ŸŸ 2 X 1 gigabit-ethernet copper interfaces ŸŸ 4 X 1 gigabit-ethernet copper interfaces ŸŸ 2 X 1 gigabit-ethernet copper interfaces

ŸŸ 2 X 10 gigabit-ethernet SFP+ LR/SR


options

Vehere Cyber Security - 43


Vehere’s PacketWorker
is a Network Situational
Awareness solution that
enables comprehensive
network monitoring using
either a line-rate full packet
capture or, flow monitoring
technology. It enables
security practitioners at
leadership, risk management
and operational hierarchies
to find answers to the six
most compelling questions –
‘What?’, ‘Why?’, ‘When?’, ‘How?’,
‘Where?’ and, ‘Who?’

White paper

Vehere Cyber Security - 45


White paper
I keep six honest serving men; they taught
New-age secops me all I knew.
Their names are ‘What’ and ‘Why’ and
‘When’ and ‘How’ and ‘Where’ and ‘Who’.
- Rudyard Kipling

46 - Vehere Cyber Security


White Paper
In defence of secops Security operations can benefit by
Security operations are expected to deploying security analytics that use
be proactive in response. However, full-packet capture technology. These
architectural complexity of layered defenses, are considerable easy-to-deploy, require
demanding service level agreement minimal effort to configure and manage, do
availabilities and uptimes, performance not require establishment of middleware to
penalties imposed on in-line tools while work with different data sources, resulting
using deep inspection and executing in considerably faster data analysis. Pairing
complex policy enforcement activities with a customisable user interface ensures
are complicated further by a complex predictable outcomes of assessments and
compliance and security monitoring setups. investigations and eliminates the need
This has rendered security operations to for expensive training and associated
adopt a reactive stance in the better interest manpower costs.
of businesses they support.
Such technologies can provide businesses
with the confidence to deliver timely
responses in the face of eventualities and
offering positive outcomes even in trying
situations, such as serious security breaches.
Response is no longer hostage to person
or device availability. Instead, actionable
intelligence is attained without disrupting
business processes and activities, boosting
customer and investor confidence.

Vehere Cyber Security - 47


Business impact analysis
Left to itself, technology would do no harm. It is the human factor that introduces and amplifies risk in any ecosystem.

Safeguarding an enterprise’s digital ‘crown jewels’ is a priority. However, business is a social activity and several organisations have actually
lowered their guards to improve productivity, increase customer engagement and identify new revenue sources.

The result is a manifold jump in security risks and a serious impact on the business.

Additionally, security teams find it difficult to enforce policies on applications being used by business teams. Risk managers cannot
determine the security posture of personal devices or tools used for customer engagement. Newer digital initiatives by enterprises for
business benefit has put pressure on risk managers and security operators to keep up pace without enforcing stringent policies of the
past and at the same time assuring the senior leadership team of being able to accurately determine business impacts and respond to
eventualities.

Cloud/Shadow IT

Incident response
Encrypted traffic
and network
analysis
forensics

Network
Threat
anomaly
detection
detector
Reactive
Proactive

Adaptable
Security
interpretive
orchestration
monitor

Comprehensive visibility

Businesses are increasingly focusing on being able to ‘find more for less’ i.e., better quality insights but with less talented and
lesser number of manpower.

Source: Gartner Analysis Viewpoint, July 2018

48 - Vehere Cyber Security


White Paper
Doing it right
The concept of surveillance is
ingrained in our beings. God was the
original surveillance camera.
- Hasan M. Elahi

To observe and respond is human nature. critical monitoring tasks in a cost and
Let’s just apply this to the cyber world. resource-efficient manner to streamline
Deploy a simple monitoring capability that security operations. Integrate output and
enables secops to be proactive and fall back intelligence to prevent perpetrators – on the
to retrospective analysis mode, on demand. inside or from the outside – from causing
significant damage to enterprisal assets.
Gain visibility into every session on Free up cycles to focus on future readiness
the network. Monitor cloud usage and of security operations. Hone capabilities
encrypted communications. Leverage of network managers to troubleshoot
Machine Learning to identify suspicious performance or availability issues and assist
behaviour, watch out for non-compliances in terms of capacity planning along with risk
and travel back in time to determine assessment.
root causes. Pick up evidence to build
actionable intelligence, uncomplicate

Vehere Cyber Security - 49


Services

Affirmation Assistance Response

50 - Vehere Cyber Security


White Paper
Uncomplicate secops With a simple and easy-to-use, web-based
Security and risk practitioners need an interface and an adaptable interpretive
upper hand over their adversaries. This monitor, it offers secops the ability to
can be achieved using technologies that deliver predictable and replicable outcomes
permit security and risk practitioners to irrespective of the skill-set of the user,
adopt their learnings as templates and maximising efficiency and significantly
apply it to discover threats or risks in reducing dwell-times.
corporate environments. These silently
The solution is based on true big data
monitor multiple network segments and
architecture built around a search engine to
easily integrate with current solutions in the
speed up information retrieval and execute
security ecosystem to provide visibility and
complex analytical tasks such as identifying
control.
spikes and instances of low and slow-flying
Vehere’s PacketWorker is a Network traffic, correlate these across multiple
Situational Awareness solution that enables activities and find similar patterns to tell
comprehensive network monitoring using normal and malicious behaviours apart.
either a line-rate full packet capture or flow
PacketWorker gels well with the secops
monitoring technology. It enables security
ecosystem by integrating with the existing
practitioners at leadership, risk management
security monitoring and orchestration
and operational hierarchies to find answers
layers and using standardised interfaces
to the six most compelling questions –
– with security information and event
‘What?’, ‘Why?’, ‘When?’, ‘How?’, ‘Where?’ and,
management for security monitoring and
‘Who?’
preventive controls for delivering immediate
A powerful deep packet and payload responses.
inspection offers incisive insights into
PacketWorker facilitates seamless
network traffic, analyses encrypted
implementation of big data security
communications without resorting to
analytics in security operations by
decryption, detects network anomalies and
eliminating concerns pertaining to events
compliance violations, provides visibility
or log rates and the need for collectors for
into cloud and software-as-a-service
different applications or processes. It is a
applications, goes back in time to perform
platform for readily-available structured
forensics and root-cause analyses and
data and lifts the same off from the source –
retrieves actionable intelligence via session
packets on the network.
correlations, graph analyses, full-fidelity
user-session reconstructions for evidence Vehere backs PacketWorker’s deployment
retrieval and attribution. This ensures with a set of services aimed at assisting
operational efficiency and bolsters the enterprises in various phases of risk
organisational security foundation without management.
disrupting ongoing business processes.

Vehere Cyber Security - 51


Machine Learning as
employed by Vehere
PacketWorker

52 - Vehere Cyber Security


Machine Learning as employed by Vehere
PacketWorker

54 - Vehere Cyber Security


Learning
Machine
During Machine Topic modeling is a natural language
processing technique with a design
Learning analysis, principle that offers responses to one
the system infers question – What is the probability that
observed session adheres to a behaviour?
a probabilistic
behavioural model
Observed session is the network activity as it
happens and, ‘probability’ is a score between
of each network 0 (zero) and 1 (one). Lesser scores imply

node using ‘topic


suspicious activity and these are delivered
as alerts in human-readable form.
modeling’. PacketWorker uses the Latent Dirichlet
Allocation (LDA) model.

Vehere Cyber Security - 55


Rule engine
PacketWorker enables security analysts to
define and specify various rules in the rule
engine to help them discover compliance
or policy violation issues, look for risky
communications or discover attacks and,
identify network or security-related issues
proactively. Security analyst’s need to set
rules in the application after analysing
their environments. Rules run through the
flow records captured in the system and
generate an alert or execute an action upon
a rule hit.

Rule types with common monitoring paradigms


include:

ŸŸ Match where there are X events in Y time


(frequency type)

ŸŸ Match when the rate of events increases or


decreases (spike type)

ŸŸ Match when there are less than X events in Y time


(flatline type)

ŸŸ Match when a certain field matches a blacklist or


whitelist (blacklist and whitelist type)

ŸŸ Match on any event matching a given filter (any


type)

ŸŸ Match when a field has two different values


within some time (change type)

56 - Vehere Cyber Security


V-1.5.1

Vehere
1629 K Street NW Suite 300,
Washington DC 20006-1631, USA
P +1 202 355 6371

391B Orchard Road #23-01,


Ngee Ann City Tower B
Singapore 238874
P +65 9299 0905

Roxborough Heights,
College Road, Harrow
London HA11GN
P +44 776 631 7891

7 Hazell Rd, Somerset West


Cape Town
South Africa
P +27 83 649 1970

232 DLF South Court,


Saket District Centre
New Delhi 110017, India
P +91 33 4004 6349

#1603, PS Srijan Corporate Park,


Block GP, Sector V, Salt Lake,
Kolkata 700091, India
P +91 33 4054 5454

E info@vehere.com
W www.vehere.com

You might also like