Macnica Networks Corp. (hereinafter President to as Macnica networks, which analyzes threats targeting Japanese organizations on a daily basis and provides security solutions ) is now offering the "Cloud Security Monitoring App" for Splunk Enterprise.

Service name Cloud Security Monitoring App
Form of provision App and Service (Spot Contract)
Provided Companies using or considering Splunk Enterprise
Offer price
  • Simple package: 4.9 million yen (excluding tax)
  • Standard package: 7.8 million yen (excluding tax) * Details will be described later
Offer start date March 23, 2021
alliance partner Positka FSI Pte Ltd.

Recently, due to the spread of telework, the use of public cloud services such as AWS, Azure, and GCP is increasing. Along with this, cyberattacks that exploit cloud-specific APIs and sharing models with multiple users are increasing. For example, the characteristic of being able to use multiple services on the cloud with a single account means that if one account is hijacked, it will allow intrusion into multiple services, and there is a risk of causing a critical incident in business. In addition, there are many incidents such as information leaks due to user setting errors. Cloud security measures are now not only measures against external threats, but also management/monitoring of the cloud environment and users are important as measures against internal threats.
In terms of countermeasures, there are cloud-native security services provided by public cloud service providers, but in order to monitor multiple cloud services across multiple cloud services, it is necessary to monitor logs using SIEM and implement cloud security policies specific to your company. It is necessary to implement compliant rules, etc.

Macnica networks has recently released the "Cloud Security Monitoring App" for Splunk Enterprise, which is equipped with the functions and mechanisms required for SIEM in order to deal with the latest cyber-attacks on public cloud services, which are rapidly becoming more popular. SIEM-App. By using this app, you can implement and tune advanced detection rules, manage alerts, and conduct post-detection investigations, making it possible to quickly launch SIEM operations necessary for multi-cloud security measures. The following three features and three function groups are initially implemented in this App, which improves detection ability and operational efficiency.

feature

  1. Apps built for cloud-specific risk
    This App has been developed based on the risk countermeasures specific to cloud services, as described below, and implements countermeasures against not only external attacks but also incidents that may occur due to users.
    • account hijack
    • Vulnerable API use
    • Data exfiltration/exfiltration due to easy external data sharing model
    • Difficult to visualize with service provisioning model
  2. Integrated management of multi-cloud and hybrid environments
    In conventional security operations, alert management and monitoring were performed on the management screen of each product, but by utilizing Splunk, a single product can be used in a hybrid environment with multiple public cloud services and on-premises environments. Alert aggregation and integrated monitoring are possible, enabling efficient security operations.
    Integrated management of multi-cloud and hybrid environments
  3. Flexible customization of detection logic according to your requirements
    Since this App is developed based on Splunk Enterprise, it is possible to flexibly customize the detection logic and dashboard. It is possible to implement detection logic that responds to company-specific security risks that cannot be covered by cloud-native security services provided by public cloud service providers.

function

  1. Correlation detection rule
    Storage, compute, IAM, and network, which are the main services of public cloud services, hold a lot of important information such as account privileges, so it is necessary to prioritize security measures. This App develops correlation detection rules and dashboards for each of the above four major services.
  2. Alert response management mechanism
    Effective alert response management mechanisms and dashboards, such as alert tracking (owner assignment/status management, etc.) mechanisms, automatic assignment of alert priorities, and multi-faceted filtering, are used to quickly respond to alerts without waste. It is installed initially.
    Alert response management mechanism
  3. Detailed analysis dashboard group
    A number of dashboards are initially installed that enable analysis from various perspectives required for SOC operations.
    Detailed analysis dashboard group

price

This App will be provided as a package service that bundles initial installation work and first year support. The pricing model has the following characteristics:

  1. Pricing that does not depend on ingested log volume
    It is determined based on the number of correlation detection rules to be implemented and the number of target public clouds. Therefore, the log volume ingested is not linked to the price.
  2. 立ち上げ時の導入作業をバンドルした価格
    迅速なSIEM運用立ち上げのため、以下の導入/実装作業を弊社にて代行します。上記金額には各種作業代行費用が含まれています。

Simple package Standard package
menu
  • Select 10 from the monitoring rule list for one public cloud

  • Data integration from one public cloud

    • Azure (ASC, Activity Log, Azure AD)

    • AWS (Cloudtrail, AWS config, GuardDuty)

  • Implementation work period: 6-10 weeks

  • Select 10 from the list of monitoring rules for 2 public clouds

  • Data integration from two public clouds

    • Azure (ASC, Activity Log, Azure AD)

    • AWS (Cloudtrail, AWS config, GuardDuty)

  • Implementation work period: 8-12 weeks

standard price

4.9 million yen

*Includes first-year support and implementation agency fees

*Requires remote work.

7.8 million yen

*Includes first-year support and implementation agency fees

*Requires remote work.

  • Implementation of the monitoring solution

    • Cloud Security Overview Dashboard

    • アラートマネージャーApps

    • 10 selected monitoring rules

    • Initial tuning work for optimization of implemented rules

    • Provision of documents (system operation manuals)

  • Support contents of this service

    • Troubleshoot dashboards, alert managers, and rules

*The prices shown above do not include tax.

*The above prices are based on the premise of implementation for remote work (using VPN or remote desktop). (If on-site work is required, individual quotations will be provided.)

*App/solution customization is not included in the above services. (If necessary, please purchase the "Dashboard Creation Pack" separately.)

* Tuning of detection rules after completion of initial implementation and initial tuning is not included in the above service range. (If necessary, please purchase the "Dashboard Maintenance Pack" separately.)

Macnica networks will continue to work to help our customers improve their security measures.

*Overall image of Macnica networks' Splunk-related services

  • Macnica Splunk related services

Product Inquiries

株式会社マクニカ
Splunk 担当
TEL:045-476-2010
URL:https://www.macnica.co.jp/business/security/manufacturers/splunk/csma.html/

Media contact information

Macnicahttps://www.macnica.co.jp/

TEL: 045-476-2010
〒222-8562 横浜市港北区新横浜1-5-5
広報担当 磯崎(いそざき)

メールアドレス:macpr@macnica.co.jp

*Company names mentioned in the text are registered trademarks or trademarks of their respective companies.