Book description
Security Monitoring with Cisco Security MARS
Threat mitigation system deployment
Gary Halleen
Greg Kellogg
Networks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worms and viruses stress the same devices. The sheer volume of log messages or events generated by these attacks and probes, combined with the complexity of an analyst needing to use multiple monitoring tools, often makes it impossible to adequately investigate what is happening.
Cisco® Security Monitoring, Analysis, and Response System (MARS) is a next-generation Security Threat Mitigation system (STM). Cisco Security MARS receives raw network and security data and performs correlation and investigation of host and network information to provide you with actionable intelligence. This easy-to-use family of threat mitigation appliances enables you to centralize, detect, mitigate, and report on priority threats by leveraging the network and security devices already deployed in a network, even if the devices are from multiple vendors.
Security Monitoring with Cisco Security MARS helps you plan a MARS deployment and learn the installation and administration tasks you can expect to face. Additionally, this book teaches you how to use the advanced features of the product, such as the custom parser, Network Admission Control (NAC), and global controller operations. Through the use of real-world deployment examples, this book leads you through all the steps necessary for proper design and sizing, installation and troubleshooting, forensic analysis of security events, report creation and archiving, and integration of the appliance with Cisco and third-party vulnerability assessment tools.
“In many modern enterprise networks, Security Information Management tools are crucial in helping to manage, analyze, and correlate a mountain of event data. Greg Kellogg and Gary Halleen have distilled an immense amount of extremely valuable knowledge in these pages. By relying on the wisdom of Kellogg and Halleen embedded in this book, you will vastly improve your MARS deployment.”
—Ed Skoudis, Vice President of Security Strategy, Predictive Systems
Gary Halleen is a security consulting systems engineer with Cisco. He has in-depth knowledge of security systems as well as remote-access and routing/switching technology. Gary is a CISSP and ISSAP. His diligence was responsible for the first successful computer crimes conviction in the state of Oregon. Gary is a regular speaker at security events and presents at Cisco Networkers conferences.
Greg Kellogg is the vice president of security solutions for Calence, LLC. He is responsible for managing the company’s overall security strategy. Greg has more than 15 years of networking industry experience, including serving as a senior security business consultant for the Cisco Enterprise Channel organization. Additionally, Greg worked for Protego Networks, Inc. (where MARS was originally developed). There he was responsible for developing channel partner programs and helped solution providers increase their security revenue.
Learn the differences between various log aggregation and correlation systems
Examine regulatory and industry requirements
Evaluate various deployment scenarios
Properly size your deployment
Protect the Cisco Security MARS appliance from attack
Generate reports, archive data, and implement disaster recovery plans
Investigate incidents when Cisco Security MARS detects an attack
Troubleshoot Cisco Security MARS operation
Integrate Cisco Security MARS with Cisco Security Manager, NAC, and third-party devices
Manage groups of MARS controllers with global controller operations
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Category: Cisco Press—Security
Covers: Security Threat Mitigation
Table of contents
- Title Page
- Copyright Page
- About the Authors
- About the Technical Reviewers
- Dedications
- Acknowledgments
- Contents at a Glance
- Contents
- Icons Used in This Book
- Command Syntax Conventions
- Foreword
- Introduction
- Goals and Methods
- This Book’s Audience
- How This Book Is Organized
- Part I. Introduction to CS-MARS and Security Threat Mitigation
- Part II. CS-MARS Operations and Forensics
- Part III. CS-MARS Advanced Topics
- Part IV. Appendixes
- Index
Product information
- Title: Security Monitoring with Cisco Security MARS
- Author(s):
- Release date: July 2007
- Publisher(s): Cisco Press
- ISBN: 9781587052705
You might also like
book
Security Threat Mitigation and Response: Understanding Cisco Security MARS
Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale …
book
Cisco Access Control Security: AAA Administrative Services
Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework …
book
Inside Network Security Assessment: Guarding Your IT Infrastructure
As an IT professional, you need to know how to perform network security assessments. Inside Network …
book
Network Security Hacks
To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network …