EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response
Total Page:16
File Type:pdf, Size:1020Kb
EXABEAM SECURITY MANAGEMENT PLATFORM INTEGRATIONS Inbound Data Sources for Log Ingestion and Service Integrations for Incident Response The more data sources you have in your security incident and event management (SIEM), the better equipped you are to detect attacks. And the more security orchestration and automation response (SOAR) connections you have between your SIEM and your IT and security systems the quicker LIMITLESS SCALE WITH FLAT, PREDICTABLE PRICING you can respond. Every log and every security event matters. Not retaining your log data can create security blinds spots that prevent Exabeam Security Management Platform (SMP) integrates compliance or leave your organization vulnerable to attack. with over 300 IT and security vendors to help your analysts Exabeam is designed to scale without penalizing you for the work smarter - providing inbound integrations with data amount of data you ingest. Our flat pricing model is based sources from vendors to easily allow you to ingest as on the number of users and devices in your environment, much data as possible; and SOAR integrations with not data volume. 3rd party vendors to help you automate and orchestrate your security response. CENTRALIZED SECURITY AUTOMATION AND ORCHESTRATION WITH 3RD PARTY INTEGRATIONS EXTENSIVE DATA SOURCES Exabeam integrates with over 65 third party IT and Exabeam ingests data from approximately 300 different IT security vendors. These integrations help your analysts and security vendors to provide security analysts with the full to gather evidence and attach them as artifacts to scope of events. Exabeam ingest logs from various sources, incidents or quarantine affected users and assets including VPN, endpoint, network, web, database, CASB, and until incidents are mitigated. cloud solutions. After ingesting the raw logs, Exabeam then parses and enriches them with contextual information to provide security analysts with the information they need to detect and investigate incidents. List of Integrations as of November 2018 INBOUND DATA SOURCES FOR LOG INGESTION SERVICE INTEGRATIONS FOR INCIDENT RESPONDER • Authentication • Asset Discovery • Cloud Access Security Broker (CASB) • Cloud Infrastructure and Applications • Cloud Infrastructure & Applications • Endpoint Detection and Response (EDR) • Data Loss Prevention (DLP) • Email Management • Database Activity • Email Protection • Directory Service • Firewall • Email • Geolocation • Endpoint • Identity Access Management (IAM) • Endpoint Monitoring • Information Technology Service Management (ITSM) • Network Access Controller (NAC) • Malware Scanning • Network • Mobile Device Management (MDM) • Physical Access • Messenger • Privileged Account Management • Sandbox • Unix/Linux/OSX • Security Incident and Event Management (SIEM) • VPN Servers • Threat Intelligence • Web Activity INBOUND DATA SOURCES FOR LOG INGESTION TYPE OF LOG DATA SOURCES AUTHENTICATION • Duo • RSA Authentication Manager • SecureAuth • Microsoft Azure AD • VMWare Horizon • Secure Computing • Microsoft Azure MFA • Google G Suite • SiteMinder • Cisco ISE CLOUD ACCESS SECURITY • Imperva Skyfence • Netskope BROKER (CASB) • McAfee SkyHigh CLOUD INFRASTRUCTURE & • Github • Okta APPLICATIONS • Office 365 • Shibboleth • Box • Webmail OWA • Perforce • Pulse Secure • OneLogin • Netskope • Osirium • Salesforce • Google • IP Switch MoveIt • Skyformation • SecureAuth • Duo Security • Ping Identity • Securelink • Xceedium • Verdasys Digital • Thales Vormetric • Guardian • Comware • Kemp • AWS CloudTrail • Tanium • oVirt • NetIQ • ServiceNow • Dropbox • iManage DMS Exabeam Security Management Platform Integrations 2 TYPE OF LOG DATA SOURCES DATA LOSS PREVENTION (DLP) • Symantec DLP • Websense DLP • Vontu • Codegreen • Digital Guardian • Imperva Counterbreach • Varonis • Forcepoint • Accellion • Pharos • Tripwire Enterprise • HP SafeCom • Lumension • Lexmark • Ricoh • Trap-X • Nasuni • xsuite • BitGlass DATABASE ACTIVITY • Imperva • Oracle • Microsoft SQL Server • IBM Guardium • Ranger Audit DIRECTORY SERVICES • SteathBits • Namespace rDirectory • Microsoft Active Directory EMAIL • Vontu • Symantec Brightmail • Websense • Codegreen • Microsoft Exchange/365 • Proofpoint • Clearswift SEG • Minecast • Postfix • Cisco Ironport ESA • Mimecast ENDPOINT • McAfee EPO • IBM Trusteer • Sophos • Symantec DLP • Symantec EPP • Forcepoint • TrendMicro • LightCyber • Microsoft Forefront/SCEP • Windows Native Logs • ESET • Crowdstrike Falcon • Invincea • Secureworks • MalwareBytes • Cisco Threat Grid • Cisco AMP for Endpoints • Anomali ThreatStream • Confer • ProtectWise • RSA Ecat • Fidelis XPS • F-Secure • Red Canary ENDPOINT MONITORING • CarbonBlack • Ziften • Dtex • Avecto • Bit9 • Defendpoint • Fortigate • Kaspersky • Safend NETWORK ACCESS • Cisco ISE • Infoblox CONTROLLER (NAC) • ForeScout NETWORK • Tipping Point • Palo Alto Networks WildFire • Cisco FirePower • Cyphort • Blue Coat Damballa • Cylance • Failsafe • Snort • Cisco FirePower Management • FireEye • Radius • Morphisec • BCN • Quest InTrust • Nokia VitalQIP • StealthWatch • Darktrace • Vectra Exabeam Security Management Platform Integrations 3 TYPE OF LOG DATA SOURCES PHYSICAL ACCESS • KABA EXOS • Vanderbilt • PicturePerfect • Badgepoint • ICPAM • Viscount • Lenel • Siemens • Honeywell • DataWatch • CCURE • ProWatch • RedCloud • AMAG Technologies • Swipes PRIVILEGED ACCOUNT • CyberArk • BeyondTrust MANAGEMENT • Liebsoft • Password Manager Pro • Thycotic UNIX/LINUX/OSX • SSH • Sudo VPN SERVERS • Citrix Netscaler • Nortel Contivity • Fortinet • Pulse Secure • NetMotion Wireless • Dell • SonicWall Aventail • Palo Alto Globalprotect • Checkpoint • Cognitas CrossLink • Cisco ASA • F5 WEB ACTIVITY • Bluecoat • Palo Alto Networks • Microsoft • Bro Network Security • Checkpoint • McAfee Web Gateway • Cisco Umbrella • Cisco Ironport WSA • TMG • Zscaler • Watchguard SERVICE INTEGRATIONS FOR INCIDENT RESPONDER PRODUCT AREA PRODUCT ACTIONS ASSET DISCOVERY Shodan • Lookup domain • Lookup IP CLOUD INFRASTRUCTURE AND Amazon AWS EC2 • Remove tag APPLICATIONS • Add tag • Disable account • Enable account • Get EC2 tags • Unmonitor EC2 instance • Monitor EC2 instance • Unquarantine AWS instance • Quarantine EC2 instance • Stop EC2 instance • Start EC2 instance • Terminate EC2 instance • Get EC2 Security groups • Get EC2 details • Get EC2 instance ENDPOINT DETECTION AND CarbonBlack Response • List alerts RESPONSE (EDR) • List processes • Unblock hash • Get device Info • Unquarantine host • Hunt file Exabeam Security Management Platform Integrations 4 PRODUCT AREA PRODUCT ACTIONS ENDPOINT DETECTION AND CarbonBlack Detect & Response • Get file RESPONSE (EDR) - (CON’T) • Ban hash from endpoint • Get triage data • Delete file • Kill process Cisco AMP for Endpoints • Search infected hosts • Get device info • Hunt file • Hunt IP Crowdstrike Falcon • Hunt URL/domain • Get device info • Hunt file SentinelOne • Change user password • List reports • Generate report • Get file reputation • Send email verification • Restart host • List processes • Scan host • Get File • List applications on host • Get device information • Get user information • Enable two-factor authentication • Disable two-factor authentication FireEye HX • Get file • Get triage data • Hunt file • Get device information • Get containment state • Contain host Tanium • List sensors • Run sensor • Get device info by IP • Get device info by hostname McAfee EPO • Add/Remove tag WMI • Get installed applications from endpoint WinRm • Get installed applications from endpoint • Get processes from endpoint • Get triage data • Get recently opened files • Get file • Get recently run applications • Get removable device information In addition to above, WinRm has these actions • Get processes from endpoint • Get event logs (departed employee) Exabeam Security Management Platform Integrations 5 PRODUCT AREA PRODUCT ACTIONS EMAIL MANAGEMENT Microsoft Exchange • Search email by sender Microsoft Office 365 • Delete email (by sender/subject) • Delete email by Message ID • Search email by Sender SMTP • Search email • Send phishing report EMAIL PROTECTION Proofpoint TAP • Get clicks to malicious links/files • Get forensics analysis on malicious links/files • Search SIEM for clicks to malicious links/files FIREWALL Check Point Firewall • Block IP Palo Alto Firewall • Block URL Fortinet Firewall • Block IP • Unblock IP GEOLOCATION MaxMind GeoIP2 • Geolocate IP MaxMind GeoLite2 IP-API IDENTITY ACCESS MANAGEMENT Microsoft Active Directory • Get user information (IAM) LDAP Okta • Add user to group • Get user Info • Remove user from group • Suspend user • Test service • Unsuspend user • Reset password INFORMATION TECHNOLOGY Atlassian JIRA • Add comment SERVICE MANAGEMENT (ITSM) • Re-assign ticket • Close ticket • Get ticket • Delete ticket • Change ticket Status • Create ticket ServiceNow • Create ticket • Update ticket • Comment on ticket • Close ticket MALWARE SCANNING Yara • Scan file • Scan text MOBILE DEVICE MANAGEMENT Duo • Send 2FA (two factor authentication) push (MDM) • Get user information • Enable user account • Disable user account • Change user password MESSENGER Slack • Send message Exabeam Security Management Platform Integrations 6 PRODUCT AREA PRODUCT ACTIONS SANDBOX Cuckoo, FireEye AX, • Detonate file in sandbox Hybrid Analysis VxStream, • Detonate URL Joe Security Cloud Quicksand, PaloAlto Wildfire, • Detonate file in sandbox Cisco ThreatGrid, Payload Security VxStream SECURITY INCIDENT AND EVENT Arcsight • Run query MANAGEMENT (SIEM) ElasticSearch • Run query • List collections IBM QRadar