SlideShare a Scribd company logo
1 of 14
Copyright	©	2014	Splunk	Inc.	
Providing	First-Rate	
Security	Services	With	
AnalyCcs-Driven	Security	
Stephen	Fisher,	CISO	
Integra
About	Integra	
!   Integra	is	one	of	the	largest	regional	faciliCes-based	providers	of	carrier-
grade	networking,	communicaCons	and	technology	soluCons	in	the	
western	United	States.	Through	our	business	units,	Electric	Lightwave	
and	Integra	Business,	we	provide	criCcal	connecCvity,	Unified	
CommunicaCons,	managed	and	cloud	services,	and	security	services	to	
domesCc	and	internaConal	customers,	including	large	enterprises,	
government	customers,	wholesale	customers	and	regional	business	
customers.
Challenges	We	Faced	
!   Wide	Range	of	Security	Requirements	
–  Internal	audits	(Financial,	PCI)	
–  Contractual	security	program	requirements	with	customers	
–  Internal	informaCon	and	asset	protecCon	
–  Security	products	(Cloud	Firewall/DDoS)	
!   Cultural	and	OrganizaConal	Challenges	
–  Security	not	a	priority	for	everyone	
–  Outsourced	security	operaCons	
–  Limited	resources	
–  Data	not	available	for	security	operaCons	
ê  InformaCon	hoarders	and	data	silos
Mission:	
ü  Create	security	program	valuing	transparency,	accountability	and	oversight	
ü  Ensure	the	success	of	the	company’s	mission		
ü  Support	the	missions	of	our	customers	
Create	a	comprehensive	balanced	informaCon	security	program	with	
management,	operaConal	and	technical	security	controls.	
ü  Secure	Integra’s	informaCon/assets	
ü  Enable	security	products	to	be	secure	
An	AmbiCous	Goal
Our	Plan	to	Cross	the	Chasm	
•  Build	a	SOC	in	eight	months	
•  Buy	the	right	tools	and	implement		
the	ones	we	have!	
•  Break	down	the	silos	
•  Don’t	just	idenCfy	problems	–		
solve	them	
•  Don’t	repeat	past	mistakes
Build	a	SOC	in	8	Months	
6	
+  Why	we	insourced	a	SOC	
	Needed	to	change	the	culture	
	Needed	control	to	get	things	done	
	Needed	a	evangelist	for	security	
+  Building	the	SOC	
+  Find	a	locaCon	
+  Procure	&	setup	SIEM	infrastructure		
+  Redirect	all	logs	to	SIEM	
+  Re-allocate	resources	
+  Hire	addiConal	staff	
+  Train	staff	
+  Define	SOC	incident	response	
policies	and	procedures	
+  TransiCon	from	outsourced	SOC
Buy	the	Right	Tools	–	We	Chose	Splunk	
!   Meets	all	of	our	requirements:	
–  Supports	our	security	and	non-security	needs	
–  Provides	visibility	across	the	organizaCon	
–  Delivers	immediate	value	
–  Meets	our	longer	term	goals	to	be	proacCve	and	predicCve	
!   Solves	many	organizaConal	challenges:	
–  Gives	the	organizaCon	a	reason	to	care	(break	the	silos)	
–  Increases	visibility	sold	them	on	insourcing	
–  Fast	Cme	to	value	and	low	TCO	jusCfies	the	investment	
7
Break	Down	the	Silos	
!   Support	the	needs	of	individual	stakeholders	
!   Show	them	a	beder	place	to	put	their	data	
!   Solve	their	use	cases	
!   Sell	the	value	of	sharing!
Splunk	Engagement	&	Architecture		
Engaged	Splunk	Professional	Services:	
•  Interview	key	stake	holders	(data	owners)	
•  IdenCfy	and	prioriCze	the	data	sources	
•  Document	findings	in	a	priority	matrix	
•  Deliver	an	overall	architecture	
All	Virtualized	–	RHEV	with	RHEL	
9	
10	Heavy	Forwarders	
1	SNMP	Forwarder	
1	NetApp	VM	Ware	Forwarder	
7	Indexers	
1	Search	Head	Cluster	(3	Search	Heads)	+	
2	User	Specific	Search	Heads		+	1	Deployment	Server	
1	Enterprise	Security	Search	Head
Use	Case	#1	
Security	Challenge:	
!   DetecCon	and	response	to	possible		
brute	force	adacks	
–  Check	for	brute	force	paderns	from	logon	events		
ê  AcCve	Directory	
ê  Win:	Security	logs	
ê  Cisco	Secure	ACS	logs	
ê  Unix	authenCcaCon	logs	
	
How	Splunk	Helped:	
!   Facilitated	rapid	detecCon	and		
deep	invesCgaCon	
–  Enabled	SecOps	to	detect	the	adempts	
–  Provided	substanCal	forensic	data		
ê  Determined	source	of	the	adack		
ê  IdenCfied	compromised	systems	
10
Use	Case	#2	
Security	Challenge:	
!   DetecCon	and	response	to	web	applicaCon	
security	
–  Aggregate	and	correlate	logs	from	web	
applicaCon	systems		
ê  WAF	
ê  SQL	servers	
ê  web	servers	
	
How	Splunk	Helped:	
!   Enabled	detecCon	of	potenCal	web	
applicaCon	adacks	
–  SQL	injecCon	
–  Cross	site	scripCng	
–  Buffer	overflow	adempts	
11
Use	Case	#3	
Security	Challenge:	
!   DetecCon	of	suspicious	behavior	from	log	
sources	
–  CorrelaCon	of	organizaCon-wide	machine	data	
–  Analysis	of	security	and	non-security	data	
	
How	Splunk	Helped:	
!   Discovered	compromised	JetDirect	cards	
–  Able	to	index,	correlate	and	analyze	data	from	all	
device	types	
–  Rapidly	discovered	common	paderns	and	trends	
12
Use	Case	#4	
Security	Challenge:	
!   DetecCon	and	response	to	malware	
–  AnC-malware	alone	is	insufficient	
How	Splunk	Helped:	
!   Able	to	ingest	and	correlate	all	log	
data	–	from	perimeter	to	endpoints	
–  Enabled	rapid	malware	detecCon	
–  Facilitated	rapid	threat	miCgaCon	
13
Key	Takeaways	
!   Engage	and	enable	the	business	
!   Create	a	balanced	informaCon	security	program	
!   Employ	a	solid	foundaCon	of	security		
controls	first	
!   Don’t	be	overwhelmed	–	take	one	step	at	a	Cme	
!   Create	security	program	valuing	transparency,	
accountability	&	oversight	
!   Remove	the	limits	of	outsourced		
security	operaCons	
14

More Related Content

What's hot

ICS-Brochure-Web PRD 2016
ICS-Brochure-Web PRD 2016ICS-Brochure-Web PRD 2016
ICS-Brochure-Web PRD 2016
Stephen Wertz
 
Extreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation ChallengeExtreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation Challenge
US-Ignite
 

What's hot (20)

IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Webinar: Adaptive Security
Webinar: Adaptive SecurityWebinar: Adaptive Security
Webinar: Adaptive Security
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
ICS-Brochure-Web PRD 2016
ICS-Brochure-Web PRD 2016ICS-Brochure-Web PRD 2016
ICS-Brochure-Web PRD 2016
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
EENA 2021 - User Experience and User Interface (UX/UI) design (3/3)
EENA 2021 - User Experience and User Interface (UX/UI) design (3/3)EENA 2021 - User Experience and User Interface (UX/UI) design (3/3)
EENA 2021 - User Experience and User Interface (UX/UI) design (3/3)
 
Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 
Spo2 r33
Spo2 r33Spo2 r33
Spo2 r33
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway Cybersecurity
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
Extreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation ChallengeExtreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation Challenge
 

Viewers also liked

Cerner at SplunkLive! Minneapolis
Cerner at SplunkLive! MinneapolisCerner at SplunkLive! Minneapolis
Cerner at SplunkLive! Minneapolis
Splunk
 
SplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow JonesSplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow Jones
Splunk
 

Viewers also liked (16)

Vertu
VertuVertu
Vertu
 
SplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak HostingSplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak Hosting
 
Cerner at SplunkLive! Minneapolis
Cerner at SplunkLive! MinneapolisCerner at SplunkLive! Minneapolis
Cerner at SplunkLive! Minneapolis
 
DevOps and Splunk
DevOps and SplunkDevOps and Splunk
DevOps and Splunk
 
SplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow JonesSplunkLive! Customer Presentation - Dow Jones
SplunkLive! Customer Presentation - Dow Jones
 
Computing DevOps Summit, London, July 5, 2016
Computing DevOps Summit, London, July 5, 2016Computing DevOps Summit, London, July 5, 2016
Computing DevOps Summit, London, July 5, 2016
 
Ecetera uses Splunk to facilitate DevOps in forex
Ecetera uses Splunk to facilitate DevOps in forexEcetera uses Splunk to facilitate DevOps in forex
Ecetera uses Splunk to facilitate DevOps in forex
 
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
T-Mobile Customer Presentation
T-Mobile Customer PresentationT-Mobile Customer Presentation
T-Mobile Customer Presentation
 
SplunkLive! Utrecht 2016 - Exact
SplunkLive! Utrecht 2016 - ExactSplunkLive! Utrecht 2016 - Exact
SplunkLive! Utrecht 2016 - Exact
 
DevOps with Sec-ops
DevOps with Sec-opsDevOps with Sec-ops
DevOps with Sec-ops
 
Splunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better CodeSplunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better Code
 
AWS on Splunk, Splunk on AWS
AWS on Splunk, Splunk on AWSAWS on Splunk, Splunk on AWS
AWS on Splunk, Splunk on AWS
 
Vertu - Luxury Mobile Phone (consumer buying behavior)
Vertu - Luxury Mobile Phone (consumer buying behavior)Vertu - Luxury Mobile Phone (consumer buying behavior)
Vertu - Luxury Mobile Phone (consumer buying behavior)
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech Day
 

Similar to Integra Customer Presentation

GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
Tawnia Beckwith
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
finance40
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
bryanpsu
 
NCB PROFILE - with vocational training
NCB PROFILE - with vocational trainingNCB PROFILE - with vocational training
NCB PROFILE - with vocational training
rsadekar
 
Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015
Melissa Bulluck
 
SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015
Shahid Navas
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
Company profile 2 optimized
Company profile 2 optimizedCompany profile 2 optimized
Company profile 2 optimized
huzzee21
 

Similar to Integra Customer Presentation (20)

GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Optix company profile
Optix company profileOptix company profile
Optix company profile
 
SNIS PROFILE
SNIS PROFILESNIS PROFILE
SNIS PROFILE
 
Snis profile
Snis profileSnis profile
Snis profile
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
NCB PROFILE - with vocational training
NCB PROFILE - with vocational trainingNCB PROFILE - with vocational training
NCB PROFILE - with vocational training
 
Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015Orion Management_Slick Sheet_5 Oct 2015
Orion Management_Slick Sheet_5 Oct 2015
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015
 
SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015SIBCA_Brochure_Apr2015
SIBCA_Brochure_Apr2015
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Company profile 2 optimized
Company profile 2 optimizedCompany profile 2 optimized
Company profile 2 optimized
 
LIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILELIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILE
 
LIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILELIGHTHOUSE INTEGRATED PROFILE
LIGHTHOUSE INTEGRATED PROFILE
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 

More from Splunk

More from Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Integra Customer Presentation

Editor's Notes

  1. Yeah, the way we got started is we had a number of different homegrown log aggregation processes that were in place that were fairly absent of any kind of UI or analytics capability. It was typical log collection onto a central server using command line tools to do some analysis, et cetera. We also had some managed service providers that were giving us some very, very basic analytics by also aggregating some of our log information into some of their tools. It wasn't really delivering the kind of service and capability we were looking for. It was very slow, very reactive, not a lot of ability to do any kind of trend analysis. We went down a path to evaluate where do we want to be from a log collection and analytics standpoint. Obviously, we went down the path of looking at a number of the SIEM tools available in the market and give an evaluation of the typical players like QRadar, ArcSight. We really found that while a lot of them had a good SIEM profile, they weren't really designed to be log archive tools. In order to use them as a log archives tool you had to invest a tremendous amount of overhead in storage, processing power, et cetera. Once you try to use those platforms as aggregators for any kind of real historic data, they just went to a crawl from a usability perspective. We were much more interested in doing deep, historical forensic analysis, and analytics than we were in having a real‑time dashboard of things that were going on because most of that work we view as we want to outsource that to somebody who can staff an eyes on glass capability in a much more 24/7 way. We want the internal platform to really be about how do we go back to six months ago and understand what happened from a security forensic stand‑point or how do we do trend analytics on potential events or that type of activity. We quickly eliminated some of the tools that were much more focused on what I'll call security operations type users and started to look for tools that were much more of a log aggregation type platform. We looked at a couple of different options there, and that how we ended up with Splunk. Really, one of the deciding factors was we wanted something that would scale to be able to collect data, not just security data, but data from the whole organization, so that we weren't buying one platform for security and then buying another platform for normal IT operations because the view was, if we don't comingle all the data together, the value of that analysis is reduced.
  2. showed how they can bring security and non-security value through visibility —> gave the org more reason to care (FUNDAMENTAL!) could sell the org to care about it in a fundamentally different way —> everybody cared about their data security was no longer the only reason - but allowed them to get what they needed (sold non-sec use cases to get the data so that they could solve their security use cases) let me give you what you really need/want, and a side benefit is that I get what I need …’