Process Description
Data Flow
Once the data arrives at the Avalanchio platform from various data sources, it follows a simple dataflow pipeline as shown in the diagram below. We take a great degree of care to keep simplicity or data flow while retaining the flexibility of controlling the data flow for various security analytics needs. The data flow is configurable to allow integration with upstream and downstream applications. The platform has three key pillars that are used to create security use cases.
Parser: Security analytics requires data from hundreds of sources ranging from proxy server logs, application logs, AD server logs, even, HR data. The Avalanchio platform allows you to define a data model and extract the relevant data points from the raw data format. The data models
Rule Engine: The rule engine allows you to trigger certain actions such as sending out an email notification or creating a case if a condition is met as the data arrives. Rules can be a simple conditional check on the event data, or it can be complex behavioral or anomaly detection techniques or a combination of both.
Search: The Avalanchio platform provides a powerful search platform that every SOC (Security Operation Center) team requires – threat hunting and scheduled reports. The platform supports two search query languages – a DSL that we call AQL (Avalanchio Query Language) and SQL. AQL provides 100+ operators for a wide range of security-specific use cases. SQL is widely used in the industry for general purpose analytics and its adoption is growing among SOC analysts as well. You can store data for a long time ranges for compliance needs and query the data without complex SOP of hot/cold data swapping.
Look at the out of the box solutions available on the platform out of the box usecases
A Little Background of today's Security Analytics at Enterprises
Below diagram shows the perimeter of the current security analytics. The security analytics not only based on the data available from well known sources such as servers, applications and switches, but also, those from third party sources (TPI) and HR (Human Resource) database. You would need a platform that provides out of the use cases, intelligent defaults, additionally, provides a simple platform that SOC analyst can use to define and test the rule without writing code or going to application backend. The Availanchio platform provides a great balance to achieve these objectives.
Data Source
INFRASTRUCTURE
APPLICATION
NETWORK
ENDPOINTS
CLOUD
TIP
AD/IAM/HR
VULNERABILITY
IOT
Application Areas
INSIDER THREATS
HPA
ACCESS
CYBER
APPLICATION
CLOUD
NETWORK
CYBER FRAUD
Analytics Techniques
COMMON DATA MODEL
PARSE,ENRICH,JOIN
ML & AI
USE CASES
RULE BASED
UEBA
KILL CHAIN
FEATURES
ENGINEERING
MITRE ATT&CK
RISK/ THREAT MODELING
Features
SOC COCKPIT
WORK FLOW
REPORTS
DASHBOARDS
THREAT HUNTING
ORCHESTRATION
DATA RETENTION
REGULATORY COMPLIANCE
RUN BOOKS
SELF LEARNING SYSTEM