I have to agree with Ron here. We've actually taken steps to bypass SIM solutions for _some_ functionality. SIMs do offer a lot of functionality beyond simply correlating Vulnerabilty information to IDS/IPS information. However, for customers who are using SIM solutions solely to correlate vulnerability and IDS/IPS data, we've simply integrated it into our Server software. So, customers can choose to run Nessus or Nevo, generate an .xml report from that product, and we'll do the correlation for them. i.e. when we see an attack, we'll correlate (without a SIM) with the output of the customers Nessus scan to figure out if they would have been vulnerable to that alert. This is particularly useful when our customers deploy us in inline IPS mode. They can go back to management and show them attacks that were stopped, that Nessus/Nevo said they were vulnerable to. This is the same type of functionality offered by an increasing number of our competitors.

Having said all this, I think SIM solutions definitely provide a service that we are NOT trying to fill. i.e. aggregation of data from many types of devices, and correlation of data across multiple logging devices. Often, a SIM can correlate a simple event (an event that neither a host based, nor network based product would have _alerted_ on), with other simple events, and determine that all these seemingling simple events are in fact something bigger. The basic aggregation of potentially benign data is, all by itself, very useful. The further correlation capabilities to look for things that your detection/prevention tools may have missed is also useful.

However, I believe more and more vendors, as they compete for the almighty dollar, will continue to look at their own products and see where they can add as much functionality as possible to provide their customers for the lowest price. The end result will be 95% solutions for 50% of the cost. The other 5% is going to end up costing you the other 50%. :)

-dave

Systems Engineer, NFR Security
http://www.nfr.com

Ron Gula wrote:

At 03:56 PM 1/5/2006, Raffael Marty wrote:

> On the subject of SIMs and vulnerability analysis scans...has anyone
> actually found this feature to be useful?
> 1) I can't even imaging letting my SIM scan the network in such an adhoc
> manner.  It doesn't help that none of the vendors seem to bother with
> providing much in the way of documentation of the process. I'm in a wacky > world where an outtage is almost never trivial;-) I've used Nessus enough
> to know that it WILL eventually cause an outtage.

I think you misunderstand what a SIM does with respect to vulnerability
scans. SIMs import scans from vulnerability scanners that you have
deployed. For example from Nessus. I think I remember that there is one
product (not even sure if it is a SIM) that does ad-hoc scans for events
it gets. That's just not a good idea, introduces a lot of latency (so
doesn't scale) and has the problems you outline. Again. In general, SIMs
import vuln-scans, they don't scan themselves.


One of the reasons we design Tenable's products as a blend of SIM and VM
is because this import function is a leap of faith. Too often, I see great
SIM products loaded with last year's vuln data, or vuln data that didn't
have the proper credentials or vuln data that was only a discovery scan.

With Tenable's products, you can do SIM and VM at the same time with one
product set. If scanning too often is an issue, we can also sniff network
traffic with NeVO to find new hosts, applications and vulnerabilities.

Having accurate vulnerability data makes any SIM process (incident response,
VA/IDS correlation, updated Asset inventory, .etc) much more relevant.

Ron Gula, CTO
Tenable Network Security

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more.
------------------------------------------------------------------------


------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more.
------------------------------------------------------------------------

Reply via email to