SlideShare ist ein Scribd-Unternehmen logo
1 von 14
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
GTRI & Splunk Case Studies
Presented by Taylor Williams
December 8, 2015
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security/Compliance
Customer:
Multi-national systems and (cloud) services-provider with 140,000+ employees and
140 data centers globally.
Challenge:
Many different services within corporation with proprietary and shared compliance
and security concerns with no structured or centralized log management solution in
place. Various missing components company-wide:
• Accountability and Audit
• Purchasing and Healthcare Compliance (PCI, HIPPA, etc.)
• Network and System Security
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security/Compliance
Solution Process:
Phased approach for requirements gathering, proof of concept, pilot rollout, and a
production rollout. RFP released for solution proposal (not specific to Splunk) awarded
to GTRI for depth of Splunk practice and solutions provided.
• Phase 1: Requirements gathering for use cases in 8 defined data centers out of 140
• Phase 2: Proof of Concept of solution for approximately 10% subset of data
• Phase 3: Pilot Rollout of solution to all use cases for 8 defined data centers
• Phase 4: Production Rollout to data centers globally
Project currently nearing conclusion of Phase 2 with use cases met by viability of data
thus far collected and indexed into Splunk
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security/Compliance
GTRI Solution:
Scalable and repeatable Splunk solution designed for implementation on Cisco
Flexpod solution(s). Designed for scalability to data centers beyond original 8
proposed with standard operating procedures (SOPs) defined for both Splunk
operations as well as hardware. Overall project inclusions:
• Full “ground-up” Splunk Architectural design
• Multi-site solution
• Repeatable philosophy in architecture and deployment
• Standard operating procedures and staffing plan for full 24x7 management
• GTRI Splunk Managed Service
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security
Customer:
Private aerospace and engineering firm that designs and launches next generation
rockets and propulsion systems. Data centers located in Denver and various launch
locations across the US.
Challenge:
No central security incident and event management (SIEM) solution in place to have
holistic view of network security posture from all data centers. Security concerns are
great especially in monitoring those central to launch locations.
• Create a centrally deployed and managed SIEM
• Filter and fine-tune system to only see events deemed critical
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security
Solution Process:
RFP released for vendors to propose a security solution inclusive of full design and
deployment methodologies to be enacted upon after award and project execution.
Discovery stage included to assess and capture complete security use case, inclusive of
relevant and irrelevant network sources to the central SIEM. Steps:
1. Design multi-site Splunk architecture. Two main data center locations for storage
of logs, fully replicated for redundancy between each.
2. Execute on validated design, deploying Splunk Enterprise servers to all proposed
locations
3. Ingest of logs from all validated sources
4. Filter nearly 1800+ hosts into a 200GB Splunk solution
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security
GTRI Solution:
Fully executed multi-site SIEM solution using Splunk and the Splunk App for Enterprise
security. Security requirements and objectives met and exceeded using this solution
and its fully executed design. Work continues today with full time GTRI Splunk
Certified Architect on-site to manage solution. Overall project inclusions:
• Full “ground-up” Splunk Architectural design
• Multi-site solution
• Assessment of all relevant use cases to meet licensing threshold
• Splunk Enterprise Security Application installation and managed service
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: SOC Staffing and Managed Service
Customer:
Self-funding not-for-profit US federal agency part of the United States Department of
Energy. Main location(s) located in the US Pacific Northwest region.
Challenge:
No SIEM in place to manage and monitor the agency’s overall network security
posture. Security operations in place, but incident management and response was
lacking and without use of proper tools. Customer needed to:
• Create a centrally deployed and managed SIEM
• Develop and deploy a 24x7 staffing model to fully staff and enable Security
Operations Center with Splunk
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: SOC Staffing and Managed Service
Solution Process:
RFP released for vendors to propose a security solution inclusive of full design and
deployment methodologies, as well as a proposed staffing model to fully enable
customer SOC with use of the proposed tool. Phased approach to execution of project
included:
1. Execute on validated design, deploying Splunk App for Enterprise Security within
the deployed architecture for SIEM enablement
2. Propose finalized staffing model to customer for approval. Once approved, source,
hire, and train staff on use of Splunk and ES
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: SOC Staffing and Managed Service
GTRI Solution:
Staffing model to manage 24x7 security operations: Shift times proposed for all
personnel
• SOC-specific personnel to be network security subject matter experts used for
incident response and resolution.
– SOC Manager (1)
– Security – Lead Analyst (1)
– Security – Senior Analyst (3)
– Security – Analyst (9)
• Splunk Operations personnel, to be used to manage to integrity of the Splunk
architecture and be first tier for SOC personnel in event mining.
– Operations Manager (1 per site)
– Operations Architect (1 FTE)
– Operations Data Scientist (1 per site and 1 FTE)
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Additional Case Studies
Denver Water:
Use Splunk for overall service health dashboards. A deluge of machine data from logs
and databases overwhelmed IT administrators, hampering efforts to pinpoint
problems when users notified the help desk.
• Monitor and maintain applications
– Asset management, customer information, geospatial, mobile, Web services, REST services
• Dashboards provide visibility into:
– Current performance and availability
– Historical performance trending and availability
– Average daily performance
– Recent issues (uptime and failures)
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Additional Case Studies
The University of Texas at Austin:
• Began using Splunk for security forensics
• Now using Splunk for identification and control, outbreak management, and
visibility of 120,000+ network devices
The City and County of San Francisco:
• Using Splunk for network security services to become proactive versus reactive
• Help identify what is/isn’t normal for web traffic to City and County’s website
• “With Splunk, instead of spending 40% of an FTE’s day to understand what the
web filters are telling us, we now just look at the dashboards to show us
abnormalities”
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Enabling DataOps with Unified Data Lineage
Enabling DataOps with Unified Data LineageEnabling DataOps with Unified Data Lineage
Enabling DataOps with Unified Data LineageMANTA
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersDevOps.com
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersITpreneurs
 
Supply Chain Visualization
Supply Chain VisualizationSupply Chain Visualization
Supply Chain VisualizationSreenivasa Setty
 
Practical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief KarfiantoPractical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief Karfiantoidsecconf
 
ICIC 2014 Panel: Mobile Apps for Patent Searchers
ICIC 2014 Panel: Mobile Apps for Patent SearchersICIC 2014 Panel: Mobile Apps for Patent Searchers
ICIC 2014 Panel: Mobile Apps for Patent SearchersDr. Haxel Consult
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Software Integrity Group
 
Pipeline analytics concept for posting
Pipeline analytics concept for postingPipeline analytics concept for posting
Pipeline analytics concept for postingMark Peco
 
From rogue one to rebel alliance by Peter Chestna
From rogue one to rebel alliance by Peter ChestnaFrom rogue one to rebel alliance by Peter Chestna
From rogue one to rebel alliance by Peter ChestnaDevSecCon
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementHCL Technologies
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsDeborah Schalm
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramDeborah Schalm
 
Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013Austin Scott
 
One neck case study v1 ge
One neck case study v1 geOne neck case study v1 ge
One neck case study v1 gedvalentine81
 
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...Splunk
 
Cross Section and Deep Dive into GE Predix
Cross Section and Deep Dive into GE PredixCross Section and Deep Dive into GE Predix
Cross Section and Deep Dive into GE PredixAltoros
 
Il paradigma DevOps e Continuous Delivery Automation
Il paradigma DevOps e Continuous Delivery AutomationIl paradigma DevOps e Continuous Delivery Automation
Il paradigma DevOps e Continuous Delivery AutomationHP Enterprise Italia
 
Splunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk OverviewSplunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk OverviewSplunk
 

Was ist angesagt? (20)

Enabling DataOps with Unified Data Lineage
Enabling DataOps with Unified Data LineageEnabling DataOps with Unified Data Lineage
Enabling DataOps with Unified Data Lineage
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
 
Supply Chain Visualization
Supply Chain VisualizationSupply Chain Visualization
Supply Chain Visualization
 
Practical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief KarfiantoPractical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief Karfianto
 
ICIC 2014 Panel: Mobile Apps for Patent Searchers
ICIC 2014 Panel: Mobile Apps for Patent SearchersICIC 2014 Panel: Mobile Apps for Patent Searchers
ICIC 2014 Panel: Mobile Apps for Patent Searchers
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
 
Pipeline analytics concept for posting
Pipeline analytics concept for postingPipeline analytics concept for posting
Pipeline analytics concept for posting
 
From rogue one to rebel alliance by Peter Chestna
From rogue one to rebel alliance by Peter ChestnaFrom rogue one to rebel alliance by Peter Chestna
From rogue one to rebel alliance by Peter Chestna
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management Teams
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013
 
One neck case study v1 ge
One neck case study v1 geOne neck case study v1 ge
One neck case study v1 ge
 
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
 
Cross Section and Deep Dive into GE Predix
Cross Section and Deep Dive into GE PredixCross Section and Deep Dive into GE Predix
Cross Section and Deep Dive into GE Predix
 
A modern approach to cloud computing
A modern approach to cloud computing A modern approach to cloud computing
A modern approach to cloud computing
 
Il paradigma DevOps e Continuous Delivery Automation
Il paradigma DevOps e Continuous Delivery AutomationIl paradigma DevOps e Continuous Delivery Automation
Il paradigma DevOps e Continuous Delivery Automation
 
Splunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk OverviewSplunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk Overview
 

Andere mochten auch

SplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak HostingSplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak HostingSplunk
 
Cerner at SplunkLive! Minneapolis
Cerner at SplunkLive! MinneapolisCerner at SplunkLive! Minneapolis
Cerner at SplunkLive! MinneapolisSplunk
 
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?CEE-SEC(R)
 
SplunkLive! London 2016 - BBC Worldwide
SplunkLive! London 2016 - BBC WorldwideSplunkLive! London 2016 - BBC Worldwide
SplunkLive! London 2016 - BBC WorldwideSplunk
 
Splunk for Online Services Event featuring Groupon
Splunk for Online Services Event featuring GrouponSplunk for Online Services Event featuring Groupon
Splunk for Online Services Event featuring GrouponSplunk
 
Splunk in Target: Internet of Things (Robot Analytics)
Splunk in Target: Internet of Things (Robot Analytics)Splunk in Target: Internet of Things (Robot Analytics)
Splunk in Target: Internet of Things (Robot Analytics)Timur Bagirov
 
Integra Customer Presentation
Integra Customer PresentationIntegra Customer Presentation
Integra Customer PresentationSplunk
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015Georg Knon
 
SplunkLive! London 2016 - John Lewis
SplunkLive! London 2016 - John LewisSplunkLive! London 2016 - John Lewis
SplunkLive! London 2016 - John LewisSplunk
 
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2Splunk
 
SplunkLive! London 2016 - Shazam
SplunkLive! London 2016 - ShazamSplunkLive! London 2016 - Shazam
SplunkLive! London 2016 - ShazamSplunk
 
How to Create an Effective RFP for your LMS Project
How to Create an Effective RFP for your LMS ProjectHow to Create an Effective RFP for your LMS Project
How to Create an Effective RFP for your LMS ProjectDoceboElearning
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunk
 
T-Mobile Customer Presentation
T-Mobile Customer PresentationT-Mobile Customer Presentation
T-Mobile Customer PresentationSplunk
 
SplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRASplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRASplunk
 
Synergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtubeSynergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtubeKetan Chandarana
 
Decision Ready Data: Power Your Analytics with Great Data
Decision Ready Data: Power Your Analytics with Great DataDecision Ready Data: Power Your Analytics with Great Data
Decision Ready Data: Power Your Analytics with Great DataDLT Solutions
 

Andere mochten auch (20)

SplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak HostingSplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak Hosting
 
Cerner at SplunkLive! Minneapolis
Cerner at SplunkLive! MinneapolisCerner at SplunkLive! Minneapolis
Cerner at SplunkLive! Minneapolis
 
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
 
SplunkLive! London 2016 - BBC Worldwide
SplunkLive! London 2016 - BBC WorldwideSplunkLive! London 2016 - BBC Worldwide
SplunkLive! London 2016 - BBC Worldwide
 
Splunk for Online Services Event featuring Groupon
Splunk for Online Services Event featuring GrouponSplunk for Online Services Event featuring Groupon
Splunk for Online Services Event featuring Groupon
 
Splunk in Target: Internet of Things (Robot Analytics)
Splunk in Target: Internet of Things (Robot Analytics)Splunk in Target: Internet of Things (Robot Analytics)
Splunk in Target: Internet of Things (Robot Analytics)
 
Integra Customer Presentation
Integra Customer PresentationIntegra Customer Presentation
Integra Customer Presentation
 
SIEM
SIEMSIEM
SIEM
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015
 
SplunkLive! London 2016 - John Lewis
SplunkLive! London 2016 - John LewisSplunkLive! London 2016 - John Lewis
SplunkLive! London 2016 - John Lewis
 
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
 
SplunkLive! London 2016 - Shazam
SplunkLive! London 2016 - ShazamSplunkLive! London 2016 - Shazam
SplunkLive! London 2016 - Shazam
 
How to Create an Effective RFP for your LMS Project
How to Create an Effective RFP for your LMS ProjectHow to Create an Effective RFP for your LMS Project
How to Create an Effective RFP for your LMS Project
 
Periodo de entreguerras
Periodo de entreguerrasPeriodo de entreguerras
Periodo de entreguerras
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
T-Mobile Customer Presentation
T-Mobile Customer PresentationT-Mobile Customer Presentation
T-Mobile Customer Presentation
 
SplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRASplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRA
 
Synergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtubeSynergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtube
 
Decision Ready Data: Power Your Analytics with Great Data
Decision Ready Data: Power Your Analytics with Great DataDecision Ready Data: Power Your Analytics with Great Data
Decision Ready Data: Power Your Analytics with Great Data
 

Ähnlich wie GTRI Case Studies: Log Management & Security

Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DayZivaro Inc
 
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...Splunk
 
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tZivaro Inc
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422Erik Giles
 
Splunk and Cisco UCS Breakout Session
Splunk and Cisco UCS Breakout SessionSplunk and Cisco UCS Breakout Session
Splunk and Cisco UCS Breakout SessionSplunk
 
Case Study: University of Chicago Achieves High Availability through a Centr...
Case Study:  University of Chicago Achieves High Availability through a Centr...Case Study:  University of Chicago Achieves High Availability through a Centr...
Case Study: University of Chicago Achieves High Availability through a Centr...CA Technologies
 
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogic
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogicWebinar: Improve Splunk Analytics and Automate Processes with SnapLogic
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogicSnapLogic
 
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...Splunk
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365 Splunk
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS) Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS) Splunk
 
Splunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteSplunk
 
Anitha_Resume_BigData
Anitha_Resume_BigDataAnitha_Resume_BigData
Anitha_Resume_BigDataAnitha Bade
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestAvere Systems
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...Splunk
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Splunk
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessSplunk
 

Ähnlich wie GTRI Case Studies: Log Management & Security (20)

Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
 
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
 
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
 
Splunk and Cisco UCS Breakout Session
Splunk and Cisco UCS Breakout SessionSplunk and Cisco UCS Breakout Session
Splunk and Cisco UCS Breakout Session
 
Case Study: University of Chicago Achieves High Availability through a Centr...
Case Study:  University of Chicago Achieves High Availability through a Centr...Case Study:  University of Chicago Achieves High Availability through a Centr...
Case Study: University of Chicago Achieves High Availability through a Centr...
 
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogic
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogicWebinar: Improve Splunk Analytics and Automate Processes with SnapLogic
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogic
 
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS) Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS)
 
Splunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk MINT and Stream Breakout
Splunk MINT and Stream Breakout
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Anitha_Resume_BigData
Anitha_Resume_BigDataAnitha_Resume_BigData
Anitha_Resume_BigData
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 

Mehr von Zivaro Inc

How to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentHow to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentZivaro Inc
 
On-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownOn-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownZivaro Inc
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesZivaro Inc
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherZivaro Inc
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change ManagementZivaro Inc
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101Zivaro Inc
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 
Denver Big Data Analytics Day
Denver Big Data Analytics DayDenver Big Data Analytics Day
Denver Big Data Analytics DayZivaro Inc
 
Support Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureSupport Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureZivaro Inc
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingZivaro Inc
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefZivaro Inc
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXZivaro Inc
 
Splunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DaySplunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DayZivaro Inc
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayZivaro Inc
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6Zivaro Inc
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013Zivaro Inc
 

Mehr von Zivaro Inc (20)

How to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentHow to Rightsize Your Citrix Investment
How to Rightsize Your Citrix Investment
 
On-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownOn-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration Showdown
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security Technologies
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better Together
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change Management
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Denver Big Data Analytics Day
Denver Big Data Analytics DayDenver Big Data Analytics Day
Denver Big Data Analytics Day
 
Support Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureSupport Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network Architecture
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
Splunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DaySplunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech Day
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech Day
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013
 

Kürzlich hochgeladen

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Kürzlich hochgeladen (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

GTRI Case Studies: Log Management & Security

  • 1. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. GTRI & Splunk Case Studies Presented by Taylor Williams December 8, 2015
  • 2. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security/Compliance Customer: Multi-national systems and (cloud) services-provider with 140,000+ employees and 140 data centers globally. Challenge: Many different services within corporation with proprietary and shared compliance and security concerns with no structured or centralized log management solution in place. Various missing components company-wide: • Accountability and Audit • Purchasing and Healthcare Compliance (PCI, HIPPA, etc.) • Network and System Security
  • 3. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security/Compliance Solution Process: Phased approach for requirements gathering, proof of concept, pilot rollout, and a production rollout. RFP released for solution proposal (not specific to Splunk) awarded to GTRI for depth of Splunk practice and solutions provided. • Phase 1: Requirements gathering for use cases in 8 defined data centers out of 140 • Phase 2: Proof of Concept of solution for approximately 10% subset of data • Phase 3: Pilot Rollout of solution to all use cases for 8 defined data centers • Phase 4: Production Rollout to data centers globally Project currently nearing conclusion of Phase 2 with use cases met by viability of data thus far collected and indexed into Splunk
  • 4. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security/Compliance GTRI Solution: Scalable and repeatable Splunk solution designed for implementation on Cisco Flexpod solution(s). Designed for scalability to data centers beyond original 8 proposed with standard operating procedures (SOPs) defined for both Splunk operations as well as hardware. Overall project inclusions: • Full “ground-up” Splunk Architectural design • Multi-site solution • Repeatable philosophy in architecture and deployment • Standard operating procedures and staffing plan for full 24x7 management • GTRI Splunk Managed Service
  • 5. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security Customer: Private aerospace and engineering firm that designs and launches next generation rockets and propulsion systems. Data centers located in Denver and various launch locations across the US. Challenge: No central security incident and event management (SIEM) solution in place to have holistic view of network security posture from all data centers. Security concerns are great especially in monitoring those central to launch locations. • Create a centrally deployed and managed SIEM • Filter and fine-tune system to only see events deemed critical
  • 6. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security Solution Process: RFP released for vendors to propose a security solution inclusive of full design and deployment methodologies to be enacted upon after award and project execution. Discovery stage included to assess and capture complete security use case, inclusive of relevant and irrelevant network sources to the central SIEM. Steps: 1. Design multi-site Splunk architecture. Two main data center locations for storage of logs, fully replicated for redundancy between each. 2. Execute on validated design, deploying Splunk Enterprise servers to all proposed locations 3. Ingest of logs from all validated sources 4. Filter nearly 1800+ hosts into a 200GB Splunk solution
  • 7. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security GTRI Solution: Fully executed multi-site SIEM solution using Splunk and the Splunk App for Enterprise security. Security requirements and objectives met and exceeded using this solution and its fully executed design. Work continues today with full time GTRI Splunk Certified Architect on-site to manage solution. Overall project inclusions: • Full “ground-up” Splunk Architectural design • Multi-site solution • Assessment of all relevant use cases to meet licensing threshold • Splunk Enterprise Security Application installation and managed service
  • 8. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
  • 9. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: SOC Staffing and Managed Service Customer: Self-funding not-for-profit US federal agency part of the United States Department of Energy. Main location(s) located in the US Pacific Northwest region. Challenge: No SIEM in place to manage and monitor the agency’s overall network security posture. Security operations in place, but incident management and response was lacking and without use of proper tools. Customer needed to: • Create a centrally deployed and managed SIEM • Develop and deploy a 24x7 staffing model to fully staff and enable Security Operations Center with Splunk
  • 10. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: SOC Staffing and Managed Service Solution Process: RFP released for vendors to propose a security solution inclusive of full design and deployment methodologies, as well as a proposed staffing model to fully enable customer SOC with use of the proposed tool. Phased approach to execution of project included: 1. Execute on validated design, deploying Splunk App for Enterprise Security within the deployed architecture for SIEM enablement 2. Propose finalized staffing model to customer for approval. Once approved, source, hire, and train staff on use of Splunk and ES
  • 11. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: SOC Staffing and Managed Service GTRI Solution: Staffing model to manage 24x7 security operations: Shift times proposed for all personnel • SOC-specific personnel to be network security subject matter experts used for incident response and resolution. – SOC Manager (1) – Security – Lead Analyst (1) – Security – Senior Analyst (3) – Security – Analyst (9) • Splunk Operations personnel, to be used to manage to integrity of the Splunk architecture and be first tier for SOC personnel in event mining. – Operations Manager (1 per site) – Operations Architect (1 FTE) – Operations Data Scientist (1 per site and 1 FTE)
  • 12. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Additional Case Studies Denver Water: Use Splunk for overall service health dashboards. A deluge of machine data from logs and databases overwhelmed IT administrators, hampering efforts to pinpoint problems when users notified the help desk. • Monitor and maintain applications – Asset management, customer information, geospatial, mobile, Web services, REST services • Dashboards provide visibility into: – Current performance and availability – Historical performance trending and availability – Average daily performance – Recent issues (uptime and failures)
  • 13. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Additional Case Studies The University of Texas at Austin: • Began using Splunk for security forensics • Now using Splunk for identification and control, outbreak management, and visibility of 120,000+ network devices The City and County of San Francisco: • Using Splunk for network security services to become proactive versus reactive • Help identify what is/isn’t normal for web traffic to City and County’s website • “With Splunk, instead of spending 40% of an FTE’s day to understand what the web filters are telling us, we now just look at the dashboards to show us abnormalities”
  • 14. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Questions?