Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Incident Response

Cisco Releases OpenSOC Security Analytics Framework as Open Source

OpenSOC Big Data Security Analytics Framework Consumes and Monitors Network Traffic and Machine Exhaust Data of a Data Center

OpenSOC Big Data Security Analytics Framework Consumes and Monitors Network Traffic and Machine Exhaust Data of a Data Center

In an effort to help organizations create an incident investigation tool that meets their specific requirements, Cisco announced on Monday the availability of the company’s OpenSOC big data security analytics framework as an open source solution.

Recent data breaches have resulted in a large number of organizations having customer details and intellectual property compromised. The incident investigation process of such breaches can be time-consuming when traditional techniques are used. The OpenSOC framework can speed up the process by providing data breach victims with all the tools and information they need in a single platform, Cisco said.

“The OpenSOC framework helps organizations make big data part of their technical security strategy by providing a platform for the application of anomaly detection and incident forensics to the data loss problem,” Cisco’s Pablo Salazar wrote in a blog post.

“By integrating numerous elements of the Hadoop ecosystem such as Storm, Kafka, and Elasticsearch, OpenSOC provides a scalable platform incorporating capabilities such as full-packet capture indexing, storage, data enrichment, stream processing, batch processing, real-time search, and telemetry aggregation. It also provides a centralized platform to effectively enable security analysts to rapidly detect and respond to advanced security threats,” Salazar added.

You May LikeBigger Data, Smaller Problems: Taking Hadoop Security to the Next Level

According to Cisco, OpenSOC can provide three key elements for security analytics. First of all, it captures, stores and normalizes security telemetry at high rates, providing organizations the visibility and information required for investigating and remediating an incident.

The framework processes and applies information such as geolocation, DNS data, and threat intelligence in real time to provide context and situational awareness which, according to Cisco, are critical for a detailed and timely investigation.

Advertisement. Scroll to continue reading.

OpenSOC’s interface provides alert summaries, advanced search capabilities, and full packet-extraction tools, the company said.

“The framework is highly extensible: any organization can customize their incident investigation process. It can be tailored to ingest and view any type of telemetry, whether it is for specialized medical equipment or custom-built point of sale devices. By leveraging Hadoop, OpenSOC also has the foundational building blocks to horizontally scale the amount of data it collects, stores, and analyzes based on the needs of the network,” explained Salazar.

By releasing OpenSOC as an open source solution, Cisco hopes the framework will continue to evolve, allowing organizations to improve their ability to handle incident response.

OpenSOC is not the first tool released by Cisco as an open source solution. In September 2013, the company announced the availability of Kvasir, a tool that allows penetration testers to use and share vulnerability data from multiple sources, including vulnerability scanners and exploitation frameworks. The company also runs 

Related Reading: Big Data Security Challenge: Integrating Multiple Data Sources

Related Reading: The Role of Big Data in Security

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Register

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

Orchid Security has appointed a new Chief Product Officer and three advisors.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.