COGITO – An introduction to NG-SIEM

By Ateeq Shahzad, Consultant Techaccess Pakistan 

Responding to security incidents and discrepancies is a continuing process. Reacting too slowly to a critical incident is directly proportional to bearing severe costs. When teams are usually under skilled and understaffed, yet bombarded by magnitude of SOC alerts, integration, filtration along with correlation,  COGITO can provide enormous benefits by making these teams more efficient and able to respond more quickly.

In such circumstances, you may need to improve your cyber resilience and vulnerability management while speeding up response time. You can build and enhance your cyber resilience by achieving operational agility, prioritize remediation and staying informed with your security posture. Cogito is a next generation security information and event management (SIEM) tool which brings in security and vulnerability data from your IT infrastructure and uses intelligent collection workflows, automation, and a deep connection with IT to streamline security responses. With Cogito, you can identify, prioritize, and respond to threats quickly to reduce risk.

As Security Operations (SecOps) is popular among Infosec platform, blue teams can leverage our integrated platform to map threats, security incidents, and vulnerabilities to your business services with complete IT infrastructure. This mapping enables behavior profiling and risk scoring based on business impact, ensuring your security teams are focused on what is most critical to your business. Working in a single platform also makes handing off tasks to IT simple and adds the benefits of visibility, reduced response time, and live collaboration tools. The following used cases will give you a better understanding of how you can benefit from the workflows and automation of SecOps for faster security response.

· Automating threat analysis

· Phishing and botnets remediation

· Responding to misconfigured software

· Identifying a high-risk user or entity

· Malicious or compromised insider

· Behavioral anomaly detection

· Data Exfiltration

Security incident triage and analysis is a necessary step in the response process to reduce false positives, and to determine how best to contain and remediate an incident. SANS reports the median time from detection to containment being 6 to 24 hours. We use renowned threat intelligence feeds as part of incident prioritization and response process. Correlating that information automatically and leveraging threat enrichment from SIEM tool can dramatically reduce the time spent on analysis.

Cogito User and Entity Behavioral Analytics (UEBA) enables security teams to proactively monitor for high-risk behavior inside the enterprise. Our security analytics platform provides unparalleled context by fusing structured and unstructured data to identify and disrupt malicious, compromised, and negligent users. We uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud. We are built to scale while helping security teams:

• Reduce the time to detect insider attacks

• Surface relevant alerts at a time when security teams are drowning in noise

• Get granular about insider activity, going beyond SIEM and other tools in your stack

• Improve investigation efficiency for incident response and post-breach forensics

Cogito Behavioral Analytics uniquely delivers visibility into employee activities, behaviors, and relationships by integrating network packet data, context-rich data streams with structured data. Our analytic models allow entities and events to be scored and prioritized through multiple lenses across all data streams. We also integrate with active directory, sysmon, endpoints, and key data sources to offer true situational awareness and a powerful forensic platform that radically enhances internal investigations. 

Our feature list is as follows:

Behavioral insights: Identify changes in behavior that may indicate current or potential illegal, unwanted or non-compliant activity by employees using sentiment and content analysis.

Intelligent prioritization: Prioritize events of interest and alerts based on the analysis of content and metadata patterns.

Natural Language Processing (NLP): Significantly reduce false positives through a smart, practical application of NLP, complex lexicons for any language, and text identification technology that recognizes disclaimers and quoted text from threaded emails.

Custom Visualizations: Visualizations specifically developed to unlock an analyst’s own inference capabilities and deliver maximum context around relevant activities. Quickly understand the who, what, when, and how of employee actions.

Content Filtering: Cogito’s content filtering component is deployed to identify and filter out non-relevant communications like bulk mail, third-party mailers and more by implementing black-lists & white-lists.

Cogito User Behavior Solution learns normal and abnormal behavior. It examines broad spectrum of data from verity of sources to determine a user’s baseline or behavior profile. For example, the system monitors a user and see at what time they arrive to work which system they log into, what websites they visit, how often and what size of files they move across the network. Precisely analyze inbound and outbound traffic and may other data points that define the user’s normal behavior”.

When there is deviation from the baseline, the system adds to the risk score of the user or entity. The more unusual the behavior, the higher the risk score. As more and more suspicious behavior accumulates, the risk score increases, causing it to be escalated to an analyst for investigation.

Cogito does not only rely or require static predefined rules to detect threats, and can therefore evolve along with new techniques enabling SIEM to be much more efficient and effective.