SlideShare a Scribd company logo
1 of 4
Download to read offline
IDCCS01V
I D C C U S T O M E R S P O T L I G H T
HPArcSight ESM Solution Helps City University
to Safely Increase Student Numbers by a Third
While Going Mobile
July 2013
Sponsored by HP
Introduction
City University of Hong Kong is a public research
university founded in 1984 as City Polytechnic of Hong
Kong and became a fully accredited university in 1994.
City University offers more than 130 bachelor degree
programs in six schools and colleges and a community
college, covering a wide range of subjects from the
arts to science and engineering.
There are approximately 34,000 students, with around
13,000 undergraduates in the university itself and
6,000 students in the community college.
The university has around 3,500 staff members, of
which almost 1,000 are academic or teaching support.
City University also supports over one hundred
thousand alumni with access to services.
Since its inception City University has been at the
forefront of technology adoption, implementing an
ERP platform over a decade ago, and was among the
first to use elearning management solutions.
Technology plays an integral part of both operations
and education delivery at City University. CIO Dr Andy
Chun describes the approach as "a unique discovery-
enriched curriculum to encourage our students to
innovate and make original discoveries, and to learn
what it means to create new knowledge, communicate
it, curate it, and cultivate it to benefit society.
Technology plays a very important role in the
discovery and learning process."
Challenges and Solution
City University was faced with two major challenges in delivering information
technology services to students and staff across the organization.
The first was to adapt to the new ways in which students and staff are
interacting with IT services. In 2010, almost all access used desktop or
notebook PCs and there was almost no remote or mobile learning. In just two
years this situation has completely reversed so that over 70% of students and
staff now use mobile devices such as smartphones or tablets in addition to a
PC to access services via mobile services or remotely. In the last year alone,
IDCEMEA,389ChiswickHighRoad,London,W44AE,U.K.Tel.+44.20.8987.7100www.idc.com
Snapshot
Organization: City University of Hong
Kong
Operational Challenge: Handle a move
to mobile services access and increase
undergraduate numbers by a third while
increasing service quality.
Solution: HP ArcSight Express
Project Duration: From concept to
production, first implementation phase
took six weeks.
Benefit: Investigations into suspicious
activities dropped from weeks to hours,
freeing up skilled resources to work on
IT service delivery.
 
2 ©2013 IDC
over 130,000 individual wireless devices connected to City University's WiFi
network.
In addition, City University has a large pool of loan notebooks that are made
available to students to work on projects or deliverables if they don't have a
PC or mobile device of their own to use.
The second challenge was a change in undergraduate degree courses from
three years to four years. As there was no real change in the number of
students enrolling per year, this resulted in the number of undergraduate
students swelling by a third due to the extra year, all of whom need access to
services.
The end result was a vast increase in the number of users and devices
accessing services, which all needed to be secured and protected. Dr Chun
realized that growth was challenging existing security operations, which were
starting to be overwhelmed. He identified a number of areas that were
particularly challenging:
 City University has a large number of security devices and tools in
place to enforce security policies and protect users, but each has its
own logging format and monitoring tools.
 Identifying anomalous behavior, such as malware infections, hacking
attacks or security breaches, was proving to be unworkable due to the
millions of log entries from multiple sources being returned, all of
which would have to be analyzed to try to pinpoint attacks because
there was no linkage or correlation between them.
 It was difficult to extract trend information from events and it was
impossible to relate the events from the various infrastructure
components into an application or business service oriented view.
This made it difficult to report to senior management on what had
occurred.
 Changes in the infrastructure meant laborious work to reconfigure the
event collection connectors.
After analysis of the problem and advice from third parties, City University
determined that a central monitoring system would be needed to get on top of
the challenges. There was already a log management solution in place that
had been developed to secure a number of UNIX servers in the datacenter,
but this was proving to be difficult to adapt to the new requirements. It could
not easily process logs from multiple sources, and could not deal with log files
that have multiline entries. It would also frequently return false positives,
which would divert limited resources from dealing with real issues.
City University therefore looked for dedicated security incident and event
management (SIEM) solutions and invited two vendors to propose proof of
concept (PoC) along with requirements and internal test cases that made up
the success criteria. Within a week, HP ArcSight delivered a working PoC that
satisfied the success criteria and in particular the multiline log event
processing capability. Compared with the competition, HP ArcSight had very
knowledgeable implementation and support engineers that formed a good
relationship with City University, giving them the confidence to move forward
into production.
 
©2013 IDC 3
Implementation
Once the PoC was successfully demonstrated and HP ArcSight Security
Intelligence Platform was selected, sign-off was given to implement the
solution. The plan involved the following steps:
 Deploying ArcSight Express
 Integrating logs from multiple sources including active directory
services, routers, and security devices
 Generating reports of critical events
 Implementing a Service Monitoring Dashboard
Because the initial success criteria included many test cases that were daily
operations processes for City University, the implementation ran smoothly
overall and slightly ahead of plan.
There were some issues to resolve during the implementation around the
integration of some devices and applications, such as firewalls and
networking devices with particular configurations. The problems were
identified and the solution took a few days of development to implement and
the overall solution was in production within six weeks.
Benefits and Challenges
Once operational, the HP ArcSight Express started to provide immediate
benefits. The most immediate and noticeable benefit was a marked reduction
in manpower requirements, particularly around troubleshooting issues as they
arose. In the past, this would involve mobilizing many teams of people to work
through the various systems individually, but this now automated centrally.
With City University facing budget and manpower freezes, this adds a lot of
value by freeing up skilled people to work on other initiatives.
Turnaround times when investigating anomalies have also improved
dramatically. Previously it would take up to a month to be able to gather all the
logs together and then organize staff to analyze them. With HP ArcSight, this
now takes hours to do as the system stores the logs and joins them together
to allow automated correlation across multiple systems.
The platform also allows new rules to be easily introduced to catch future
incidents in progress rather than detecting them afterwards and having to
spend time and money remedying the problem.
Despite the success of the implementation, there is still more to be done.
Budget, resources, and skills have meant that the existing implementation is
not yet where City University needs to be. Two further implementation phases
are planned to make more use of the capabilities of the platform. Phase two is
already underway, and is a shorter term optimization project to build out log
storage and develop management dashboards.
Phase three, planned for the next academic year, will involve upgrading the
platform to HP ArcSight Enterprise Security Manager (ESM) and extending
coverage even further into IT service delivery. This will include datacenter
environment monitoring such as power, temperature, and humidity as well as
end-to-end IT service monitoring and linking to the CMDB.
City University's SIEM solution is a unique approach that pushes the
boundaries of the HP ArcSight capabilities. The result is an SLA dashboard
that makes use of artificial intelligence (AI) techniques for intelligent threat
correlation. This is used to create a "causal network" that defines relationships
 
4 ©2013 IDC
and hierarchies among various devices. The system is able to sort through
and make sense of multiple logs and log entries to intelligently pinpoint
attackers or source of problems; thus reducing human processing time during
emergency situations.
Conclusion
The ability of HP ArcSight Express to gather log and event information across
multiple sources and to handle the most complex information has enabled
City University to gain invaluable insight into activities across the entire IT
infrastructure while cutting the manpower required to do so. This has allowed
IT service quality to improve even with a sharp increase in demand for access
to services.
These improvements in security and service quality have helped towards City
University receiving ISO/IEC 27001:2005 Information Security Management
Systems Certification from the British Standards Institution in 2013; the first
University in Hong Kong to do so. The University was also named a 2013
Computerworld Honors Laureate for its Sustainability Project that created a
greener campus by providing a highly secured environment to archive
university personnel and financial documents.
Methodology
The project and company information contained in this paper was obtained
from multiple sources, including information supplied by HP and questions
posed by IDC directly to City University of Hong Kong employees.
A B O U T T H I S P U B L I C A T I O N
This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results
presented herein are drawn from more detailed research and analysis independently conducted and published by
IDC, unless specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a
wide range of formats for distribution by various companies. A license to distribute IDC content does not imply
endorsement of or opinion about the licensee.
C O P Y R I G H T A N D R E S T R I C T I O N S
Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials
requires prior written approval from IDC. For permission requests, contact the GMS information line at 508-988-
7610 or gms@idc.com.
Translation and/or localization of this document requires an additional license from IDC.
For more information on IDC, visit www.idc.com. For more information on IDC GMS, visit www.idc.com/gms.
Global Headquarters:
5 Speen Street
Framingham, MA 01701 USA
P.508.872.8200
F.508.935.4015
www.idc.com

More Related Content

What's hot

IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET Journal
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index ReportAndrew James
 
AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...CARLOS III UNIVERSITY OF MADRID
 
Academic Resources Architecture Framework Planning using ERP in Cloud Computing
Academic Resources Architecture Framework Planning using ERP in Cloud ComputingAcademic Resources Architecture Framework Planning using ERP in Cloud Computing
Academic Resources Architecture Framework Planning using ERP in Cloud ComputingIRJET Journal
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudyScalar Decisions
 
State of the IT Training Industry
State of the IT Training IndustryState of the IT Training Industry
State of the IT Training IndustryCompTIA
 
Cloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyCloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyIMC Institute
 
Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...CARLOS III UNIVERSITY OF MADRID
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)AIRCC Publishing Corporation
 
Oxford AI Society Brainstorm
Oxford AI Society BrainstormOxford AI Society Brainstorm
Oxford AI Society BrainstormSean Barry
 
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTechnology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTELKOMNIKA JOURNAL
 
Future of energy 4.0 artificial intelligence and operational efficiency Ams...
Future of energy 4.0 artificial intelligence and operational efficiency   Ams...Future of energy 4.0 artificial intelligence and operational efficiency   Ams...
Future of energy 4.0 artificial intelligence and operational efficiency Ams...EPCConferenceAmsterd
 
CS_NW_Magazine_Israeli_MoJ
CS_NW_Magazine_Israeli_MoJCS_NW_Magazine_Israeli_MoJ
CS_NW_Magazine_Israeli_MoJRonnen Brunner
 
Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...CARLOS III UNIVERSITY OF MADRID
 
Brace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is ComingBrace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is ComingCherwell Software
 

What's hot (20)

IRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional ComputingIRJET - Cloud Computing Over Traditional Computing
IRJET - Cloud Computing Over Traditional Computing
 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 
2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report2019 Enterprise Cloud Index Report
2019 Enterprise Cloud Index Report
 
AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...AI4SE: Challenges and opportunities in the integration of Systems Engineering...
AI4SE: Challenges and opportunities in the integration of Systems Engineering...
 
Academic Resources Architecture Framework Planning using ERP in Cloud Computing
Academic Resources Architecture Framework Planning using ERP in Cloud ComputingAcademic Resources Architecture Framework Planning using ERP in Cloud Computing
Academic Resources Architecture Framework Planning using ERP in Cloud Computing
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case Study
 
IBM Think Milano
IBM Think MilanoIBM Think Milano
IBM Think Milano
 
State of the IT Training Industry
State of the IT Training IndustryState of the IT Training Industry
State of the IT Training Industry
 
Cloud computing in Thailand readiness survey
Cloud computing in Thailand readiness surveyCloud computing in Thailand readiness survey
Cloud computing in Thailand readiness survey
 
Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...Challenges in the integration of Systems Engineering and the AI/ML model life...
Challenges in the integration of Systems Engineering and the AI/ML model life...
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
Oxford AI Society Brainstorm
Oxford AI Society BrainstormOxford AI Society Brainstorm
Oxford AI Society Brainstorm
 
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTechnology organization environment framework in cloud computing
Technology organization environment framework in cloud computing
 
Future of energy 4.0 artificial intelligence and operational efficiency Ams...
Future of energy 4.0 artificial intelligence and operational efficiency   Ams...Future of energy 4.0 artificial intelligence and operational efficiency   Ams...
Future of energy 4.0 artificial intelligence and operational efficiency Ams...
 
CS_NW_Magazine_Israeli_MoJ
CS_NW_Magazine_Israeli_MoJCS_NW_Magazine_Israeli_MoJ
CS_NW_Magazine_Israeli_MoJ
 
Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...Sailing the V: Engineering digitalization through task automation and reuse i...
Sailing the V: Engineering digitalization through task automation and reuse i...
 
Brace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is ComingBrace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is Coming
 
Iot vijaya priya r cat1
Iot vijaya priya r cat1Iot vijaya priya r cat1
Iot vijaya priya r cat1
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Evanta 2018 msp big 3 tech
Evanta 2018 msp big 3 techEvanta 2018 msp big 3 tech
Evanta 2018 msp big 3 tech
 

Viewers also liked

Developments in Victims rights for Law Society
Developments in Victims rights for Law SocietyDevelopments in Victims rights for Law Society
Developments in Victims rights for Law Societyshane kilcommins
 
Presentazione Ortofrutta Basilicata - Pechino
Presentazione Ortofrutta Basilicata - PechinoPresentazione Ortofrutta Basilicata - Pechino
Presentazione Ortofrutta Basilicata - PechinoLuca Braia
 
tyvek wristband instruction-Guangzhou Aide
tyvek wristband instruction-Guangzhou Aidetyvek wristband instruction-Guangzhou Aide
tyvek wristband instruction-Guangzhou AideLynn Zeng
 
Amigo MGA LLC: Best Practices - Email Marketing
Amigo MGA LLC: Best Practices - Email MarketingAmigo MGA LLC: Best Practices - Email Marketing
Amigo MGA LLC: Best Practices - Email MarketingAmigo MGA
 
Presentation cim1309 v cat 3.0 operating a v-mware cloud
Presentation   cim1309 v cat 3.0 operating a v-mware cloudPresentation   cim1309 v cat 3.0 operating a v-mware cloud
Presentation cim1309 v cat 3.0 operating a v-mware cloudsolarisyourep
 
Tara J Walshe cv
Tara J Walshe cvTara J Walshe cv
Tara J Walshe cvTara walsh
 
introduction of surgical site infections
introduction of surgical site infectionsintroduction of surgical site infections
introduction of surgical site infectionsSujith Jose
 
Harvie Morris Pty Ltd
Harvie Morris Pty LtdHarvie Morris Pty Ltd
Harvie Morris Pty LtdJason Bielak
 
Дошкольное образование
Дошкольное образованиеДошкольное образование
Дошкольное образованиеInna19721994
 

Viewers also liked (14)

Developments in Victims rights for Law Society
Developments in Victims rights for Law SocietyDevelopments in Victims rights for Law Society
Developments in Victims rights for Law Society
 
Chationary
ChationaryChationary
Chationary
 
Booknontext 2
Booknontext 2Booknontext 2
Booknontext 2
 
Presentazione Ortofrutta Basilicata - Pechino
Presentazione Ortofrutta Basilicata - PechinoPresentazione Ortofrutta Basilicata - Pechino
Presentazione Ortofrutta Basilicata - Pechino
 
Strokkur geyser
Strokkur geyserStrokkur geyser
Strokkur geyser
 
tyvek wristband instruction-Guangzhou Aide
tyvek wristband instruction-Guangzhou Aidetyvek wristband instruction-Guangzhou Aide
tyvek wristband instruction-Guangzhou Aide
 
Amigo MGA LLC: Best Practices - Email Marketing
Amigo MGA LLC: Best Practices - Email MarketingAmigo MGA LLC: Best Practices - Email Marketing
Amigo MGA LLC: Best Practices - Email Marketing
 
Presentation cim1309 v cat 3.0 operating a v-mware cloud
Presentation   cim1309 v cat 3.0 operating a v-mware cloudPresentation   cim1309 v cat 3.0 operating a v-mware cloud
Presentation cim1309 v cat 3.0 operating a v-mware cloud
 
Tara J Walshe cv
Tara J Walshe cvTara J Walshe cv
Tara J Walshe cv
 
introduction of surgical site infections
introduction of surgical site infectionsintroduction of surgical site infections
introduction of surgical site infections
 
Harvie Morris Pty Ltd
Harvie Morris Pty LtdHarvie Morris Pty Ltd
Harvie Morris Pty Ltd
 
Дошкольное образование
Дошкольное образованиеДошкольное образование
Дошкольное образование
 
CGE Proof-1
CGE Proof-1CGE Proof-1
CGE Proof-1
 
Logo_print
Logo_printLogo_print
Logo_print
 

Similar to HP ArcSight ESM Helps City University Increase Student Numbers by a Third

A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...ijccsa
 
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...ijccsa
 
Streamline your digital transformation for a future ready venture.
Streamline your digital transformation for a future ready venture.Streamline your digital transformation for a future ready venture.
Streamline your digital transformation for a future ready venture.LCDF
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemWilliam Roberts
 
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDYMIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDYcseij
 
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDYMIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDYcseij
 
Loughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloudLoughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloudJohn Davis
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsnooriasukmaningtyas
 
A survey on software defined networking
A survey on software defined networkingA survey on software defined networking
A survey on software defined networkingredpel dot com
 
IRJET- Virtual Community Using Cloud Technology “Unitalk”
IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”
IRJET- Virtual Community Using Cloud Technology “Unitalk”IRJET Journal
 
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sCloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sThe Kalgidar Society - Baru Sahib
 
Smudie case study
Smudie case studySmudie case study
Smudie case studyTony Toole
 
PRIVACY AWRE PERSONAL DATA STORAGE
PRIVACY AWRE PERSONAL DATA STORAGEPRIVACY AWRE PERSONAL DATA STORAGE
PRIVACY AWRE PERSONAL DATA STORAGEantony420421
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
 

Similar to HP ArcSight ESM Helps City University Increase Student Numbers by a Third (20)

Conf report
Conf reportConf report
Conf report
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
 
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
USERS’ PERCEPTION TOWARDS CLOUD COMPUTING: A CASE OF DEPARTMENT STATISTIC SOU...
 
Streamline your digital transformation for a future ready venture.
Streamline your digital transformation for a future ready venture.Streamline your digital transformation for a future ready venture.
Streamline your digital transformation for a future ready venture.
 
The Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital EcosystemThe Roadmap to a Lifesaving Digital Ecosystem
The Roadmap to a Lifesaving Digital Ecosystem
 
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDYMIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
 
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDYMIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
MIGRATING IN-HOUSE DATA CENTER TO PRIVATE CLOUD: A CASE STUDY
 
Loughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloudLoughborough university launches byod to complement cloud
Loughborough university launches byod to complement cloud
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
 
ICT_Strategic_Plan-2013-17
ICT_Strategic_Plan-2013-17ICT_Strategic_Plan-2013-17
ICT_Strategic_Plan-2013-17
 
A survey on software defined networking
A survey on software defined networkingA survey on software defined networking
A survey on software defined networking
 
IRJET- Virtual Community Using Cloud Technology “Unitalk”
IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”IRJET-  	  Virtual Community Using Cloud Technology “Unitalk”
IRJET- Virtual Community Using Cloud Technology “Unitalk”
 
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sCloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO's
 
Billing project
Billing projectBilling project
Billing project
 
Smudie case study
Smudie case studySmudie case study
Smudie case study
 
PRIVACY AWRE PERSONAL DATA STORAGE
PRIVACY AWRE PERSONAL DATA STORAGEPRIVACY AWRE PERSONAL DATA STORAGE
PRIVACY AWRE PERSONAL DATA STORAGE
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
 

More from at MicroFocus Italy ❖✔

Bper services Case Study Application Delivery Management
Bper services Case Study Application Delivery ManagementBper services Case Study Application Delivery Management
Bper services Case Study Application Delivery Managementat MicroFocus Italy ❖✔
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyat MicroFocus Italy ❖✔
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationat MicroFocus Italy ❖✔
 
HPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMailHPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMailat MicroFocus Italy ❖✔
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...at MicroFocus Italy ❖✔
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentat MicroFocus Italy ❖✔
 
HPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 DecemberHPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 Decemberat MicroFocus Italy ❖✔
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Mobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectationsMobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectationsat MicroFocus Italy ❖✔
 
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiSicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiat MicroFocus Italy ❖✔
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 

More from at MicroFocus Italy ❖✔ (20)

Bper services Case Study Application Delivery Management
Bper services Case Study Application Delivery ManagementBper services Case Study Application Delivery Management
Bper services Case Study Application Delivery Management
 
Configuration Management in a Multi-Cloud Era
Configuration Management in a Multi-Cloud EraConfiguration Management in a Multi-Cloud Era
Configuration Management in a Multi-Cloud Era
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economy
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformation
 
HPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMailHPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMail
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
 
HPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 DecemberHPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 December
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Mobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectationsMobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectations
 
Privacy e recupero crediti il vademecum
Privacy e recupero crediti   il vademecumPrivacy e recupero crediti   il vademecum
Privacy e recupero crediti il vademecum
 
Threat report 2015_v1
Threat report 2015_v1Threat report 2015_v1
Threat report 2015_v1
 
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiSicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
 
PCI COMPLIANCE REPORT
PCI COMPLIANCE REPORTPCI COMPLIANCE REPORT
PCI COMPLIANCE REPORT
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 

Recently uploaded

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 

Recently uploaded (20)

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

HP ArcSight ESM Helps City University Increase Student Numbers by a Third

  • 1. IDCCS01V I D C C U S T O M E R S P O T L I G H T HPArcSight ESM Solution Helps City University to Safely Increase Student Numbers by a Third While Going Mobile July 2013 Sponsored by HP Introduction City University of Hong Kong is a public research university founded in 1984 as City Polytechnic of Hong Kong and became a fully accredited university in 1994. City University offers more than 130 bachelor degree programs in six schools and colleges and a community college, covering a wide range of subjects from the arts to science and engineering. There are approximately 34,000 students, with around 13,000 undergraduates in the university itself and 6,000 students in the community college. The university has around 3,500 staff members, of which almost 1,000 are academic or teaching support. City University also supports over one hundred thousand alumni with access to services. Since its inception City University has been at the forefront of technology adoption, implementing an ERP platform over a decade ago, and was among the first to use elearning management solutions. Technology plays an integral part of both operations and education delivery at City University. CIO Dr Andy Chun describes the approach as "a unique discovery- enriched curriculum to encourage our students to innovate and make original discoveries, and to learn what it means to create new knowledge, communicate it, curate it, and cultivate it to benefit society. Technology plays a very important role in the discovery and learning process." Challenges and Solution City University was faced with two major challenges in delivering information technology services to students and staff across the organization. The first was to adapt to the new ways in which students and staff are interacting with IT services. In 2010, almost all access used desktop or notebook PCs and there was almost no remote or mobile learning. In just two years this situation has completely reversed so that over 70% of students and staff now use mobile devices such as smartphones or tablets in addition to a PC to access services via mobile services or remotely. In the last year alone, IDCEMEA,389ChiswickHighRoad,London,W44AE,U.K.Tel.+44.20.8987.7100www.idc.com Snapshot Organization: City University of Hong Kong Operational Challenge: Handle a move to mobile services access and increase undergraduate numbers by a third while increasing service quality. Solution: HP ArcSight Express Project Duration: From concept to production, first implementation phase took six weeks. Benefit: Investigations into suspicious activities dropped from weeks to hours, freeing up skilled resources to work on IT service delivery.
  • 2.   2 ©2013 IDC over 130,000 individual wireless devices connected to City University's WiFi network. In addition, City University has a large pool of loan notebooks that are made available to students to work on projects or deliverables if they don't have a PC or mobile device of their own to use. The second challenge was a change in undergraduate degree courses from three years to four years. As there was no real change in the number of students enrolling per year, this resulted in the number of undergraduate students swelling by a third due to the extra year, all of whom need access to services. The end result was a vast increase in the number of users and devices accessing services, which all needed to be secured and protected. Dr Chun realized that growth was challenging existing security operations, which were starting to be overwhelmed. He identified a number of areas that were particularly challenging:  City University has a large number of security devices and tools in place to enforce security policies and protect users, but each has its own logging format and monitoring tools.  Identifying anomalous behavior, such as malware infections, hacking attacks or security breaches, was proving to be unworkable due to the millions of log entries from multiple sources being returned, all of which would have to be analyzed to try to pinpoint attacks because there was no linkage or correlation between them.  It was difficult to extract trend information from events and it was impossible to relate the events from the various infrastructure components into an application or business service oriented view. This made it difficult to report to senior management on what had occurred.  Changes in the infrastructure meant laborious work to reconfigure the event collection connectors. After analysis of the problem and advice from third parties, City University determined that a central monitoring system would be needed to get on top of the challenges. There was already a log management solution in place that had been developed to secure a number of UNIX servers in the datacenter, but this was proving to be difficult to adapt to the new requirements. It could not easily process logs from multiple sources, and could not deal with log files that have multiline entries. It would also frequently return false positives, which would divert limited resources from dealing with real issues. City University therefore looked for dedicated security incident and event management (SIEM) solutions and invited two vendors to propose proof of concept (PoC) along with requirements and internal test cases that made up the success criteria. Within a week, HP ArcSight delivered a working PoC that satisfied the success criteria and in particular the multiline log event processing capability. Compared with the competition, HP ArcSight had very knowledgeable implementation and support engineers that formed a good relationship with City University, giving them the confidence to move forward into production.
  • 3.   ©2013 IDC 3 Implementation Once the PoC was successfully demonstrated and HP ArcSight Security Intelligence Platform was selected, sign-off was given to implement the solution. The plan involved the following steps:  Deploying ArcSight Express  Integrating logs from multiple sources including active directory services, routers, and security devices  Generating reports of critical events  Implementing a Service Monitoring Dashboard Because the initial success criteria included many test cases that were daily operations processes for City University, the implementation ran smoothly overall and slightly ahead of plan. There were some issues to resolve during the implementation around the integration of some devices and applications, such as firewalls and networking devices with particular configurations. The problems were identified and the solution took a few days of development to implement and the overall solution was in production within six weeks. Benefits and Challenges Once operational, the HP ArcSight Express started to provide immediate benefits. The most immediate and noticeable benefit was a marked reduction in manpower requirements, particularly around troubleshooting issues as they arose. In the past, this would involve mobilizing many teams of people to work through the various systems individually, but this now automated centrally. With City University facing budget and manpower freezes, this adds a lot of value by freeing up skilled people to work on other initiatives. Turnaround times when investigating anomalies have also improved dramatically. Previously it would take up to a month to be able to gather all the logs together and then organize staff to analyze them. With HP ArcSight, this now takes hours to do as the system stores the logs and joins them together to allow automated correlation across multiple systems. The platform also allows new rules to be easily introduced to catch future incidents in progress rather than detecting them afterwards and having to spend time and money remedying the problem. Despite the success of the implementation, there is still more to be done. Budget, resources, and skills have meant that the existing implementation is not yet where City University needs to be. Two further implementation phases are planned to make more use of the capabilities of the platform. Phase two is already underway, and is a shorter term optimization project to build out log storage and develop management dashboards. Phase three, planned for the next academic year, will involve upgrading the platform to HP ArcSight Enterprise Security Manager (ESM) and extending coverage even further into IT service delivery. This will include datacenter environment monitoring such as power, temperature, and humidity as well as end-to-end IT service monitoring and linking to the CMDB. City University's SIEM solution is a unique approach that pushes the boundaries of the HP ArcSight capabilities. The result is an SLA dashboard that makes use of artificial intelligence (AI) techniques for intelligent threat correlation. This is used to create a "causal network" that defines relationships
  • 4.   4 ©2013 IDC and hierarchies among various devices. The system is able to sort through and make sense of multiple logs and log entries to intelligently pinpoint attackers or source of problems; thus reducing human processing time during emergency situations. Conclusion The ability of HP ArcSight Express to gather log and event information across multiple sources and to handle the most complex information has enabled City University to gain invaluable insight into activities across the entire IT infrastructure while cutting the manpower required to do so. This has allowed IT service quality to improve even with a sharp increase in demand for access to services. These improvements in security and service quality have helped towards City University receiving ISO/IEC 27001:2005 Information Security Management Systems Certification from the British Standards Institution in 2013; the first University in Hong Kong to do so. The University was also named a 2013 Computerworld Honors Laureate for its Sustainability Project that created a greener campus by providing a highly secured environment to archive university personnel and financial documents. Methodology The project and company information contained in this paper was obtained from multiple sources, including information supplied by HP and questions posed by IDC directly to City University of Hong Kong employees. A B O U T T H I S P U B L I C A T I O N This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee. C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For permission requests, contact the GMS information line at 508-988- 7610 or gms@idc.com. Translation and/or localization of this document requires an additional license from IDC. For more information on IDC, visit www.idc.com. For more information on IDC GMS, visit www.idc.com/gms. Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com