Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

IdentifierQuestionSubmitted By
Q1

What specific use cases and cyber security domain problems are you trying to solve with Metron?

Dave Hirko
Q2

How would you prioritize, in terms of importance, the use cases and challenges below that the SOC is tasked to solve:

  • Malware Detection & Lateral Movement
  • Suspicious Behavior: User, Device, & Application
  • Fraud Detection
  • Account Hijacking & Privileged Account Abuse
  • IP Theft & Data Exfiltration
  • Virtual Container & Cloud Asset Compromise

 

Dave Hirko

 

Q3What are key challenges and limitations of the current SIEM and security analytics tools that you use today?George Vetticaden
Q4

How would you prioritize the challenges today with the existing security tooling you use:

  • To many alerts. There are no prioritization of alerts or the prioritization's/risk based alerts that are in use are not accurate or helpful to help me identify on what to focus on.
  • There are too many tools that I need to learn
  • I don't have a centralized view of my data
  • Most of my alerts are false positive
  • Managing static rules are too cumbersome. 
  • I have too many manual tasks. 
  • I cannot ingest and store all security/telemetry data based on cost. 
  • I need to discover bad stuff quicker

 

George Vetticaden
Q5

What analytical and/or correlation capabilities and features would you like Metron to support for the data:

  • You currently collect
  • You plan to collect in the future
David Hirko
Q6

How would you rate your SOC’s data science and analytical capabilities today?

David Hirko
Q7

Does your SOC have any plans to enhance its data science and analytical capabilities now or in the future?

David Hirko
Q8

What data retention capabilities do you require Metron to support?

David Hirko
Q9

What compliance regimes, if any, does your SOC tools and capabilities need to comply with to support the needs of your business?

David Hirko
Q10What are the key challenges with the collection, ingestion and storage of telemetry data with your current security tooling?George Vetticaden
Q11

What security/telemetry sources are important to stream into Metron Security Data Lake Platform? Supporting a device on the Metron platform means providing:

  • agent to collect data from the source
  • parser to parse the device data format into a normalized dataset
George Vetticaden
Q12

What type of enrichment would you like to do to the security telemetry data? (e.g: Geo, Whois)

George Vetticaden
Q13What type of enrichment capabilities does your current security tooling NOT provide? Is enrichment of the data in real-time a critical requirement? Is storing the enriched and raw data a critical requirement?George Vetticaden
Q14

What are the different threat intel feeds you subscribe to (public, private, tec..)? Which vendor do you get the feed from and what is the format. Supporting an out of the box threat intel feed means the following supporting parsers for the intel feed to persist the feed store in normalized form.

George Vetticaden
Q15What are critical requirements for threat intel feed integration with Metron? For example, is cross referencing your threat intel feeds against the original and enriched telemetry data a critical requirement? George Vetticaden
Q16What are the critical functions you would like to perform on the streaming security telemetry data as its coming in real-time in as opposed to after it lands?George Vetticaden
Q17Most the major security/SIEM vendors claim to have capabilities that reduce and prioritize the number of alerts. What has been your experience with these capabilities? Are risk/priority based correlation engines working to reduce the number of alerts? What are the challenges that you are experiencing? What are key requirements/capabilities that you would like to see in a next-gen correlation engine in Metron?George Vetticaden
Q19Most of the major security/SIEM vendors have static rules engine where an analyst can define simple static rules that get applied after the data has landed or been indexed. Do you feel Metron should provide similar functionality or rather focus its efforts on building relevancy/correlation data science engines/models that can create higher level meta alerts? Does Metron need to provide both? What is most important to build out first?George Vetticaden
Q20Do you envision Metron replacing your SIEM solution or complimenting it?George Vetticaden

Context for the Questions Above

...