How It Works
SIEM comes with a built-in library of plugins that feed data into the system from a variety of sources. SIEM then classifies, normalizes, and analyzes the data according to customized defense models and the MITRE ATT&CKTM framework, using patented technology only available in SIEM.
SIEM – built on Elastic
SIEM platforms need to collect large volumes of IT data from installed sensors in the organization, process it and provide rapid access into it. To streamline this process RECANS has partnered with Elastic, the leader in data search with over 300 million users. empow’s patented technology, integrated into the Elastic framework,allows unparalleled database search capabilities, on top of a long-term retention data lake. Customers can take advantage of the full Elastic Platinum Node features (including alerting, monitoring, reporting, machine learning, canvas, Elastic Search SQL, graph algorithms & others) included by RECANS as part of SIEM.
In the figure below, we show how SIEM takes advantage of Elastic's Logstash, Beats and Kibana tools to create a more eective SIEM solution. Beginning at the bottom of the pyramid, RECANS enriches every security event with the attacker intent during data ingestion. A fter processing, these enriched logs are then stored in Elasticsearch, allowing analysts to conduct much more efficient investigations and forensics operations. SIEM then applies cause & effect intelligence, which automatically correlates all classified events and prioritizes the attacks and entities as real risks. At the top of the pyramid, RECANS utilizes the Kibana framework to clearly deliver visualizations and dashboards of high risk attacks and entities, allowing easy drill-down into the most relevant data. This integrated combination delivers automation, predictive analytics, and long-term retention to enterprises and service providers in a scalable, security-optimized solution. The overall solution provides a top-down analysis experience for identifying attacks, all without manually generated rules.
Defense Models
SIEM provides pre-built, customizable, defense models that allow organizations to define what risks and compliance requirements are in focus, enabling SIEM to optimally detect attacks with the relevant malicious intents, and orchestrate investigation and response accordingly. SIEM enables users to define models by using the MITRE ATT&CKTM language, making classification unified and translatable.
Security Models can be easily downloaded from empow’s security use cases library and implemented in minutes. Pre-built models cover both basic and advanced security use cases including: Insider threats, data exfiltration, privilege escalation, identity theft and account take over (ATO), phishing and social attack campaigns, various investigation flows, and more. Each model is capable of detecting and responding to advanced threats, including: