SlideShare a Scribd company logo
1 of 1
Download to read offline
Case Story
                                                                TM
                Dynamic Log Analysis


Denial is not a river in Colleyville.
                                                      TM
                 “Dynamic Log Analysis undeniably revealed
                  1000+ system infiltration attempts each hour!”
                              -- Chris Pena, IS Director, City of Colleyville                                  The Customer:
                                                                                                               City of Colleyville

Located in the fourth largest Metropolitan Service Area in the United States, the City of
Colleyville is known for its small-town feel, luxurious homes, and lush topography. Money                      The Environment:
magazine named the city to its list of “Best 100 Places to Live in America.” Its residents take                • 31 - NT Servers
pride in knowing that their leaders and administrators provide and maintain a high level of                    • 74 Applications
service to every aspect of their community. As such, their schools, police and fire services,                  • 1 large custom application
library, parks, and water services operate with a focus on resident satisfaction.
                                                                                                               The Challenge:
                                                                                                               • Many heterogeneous
    The Challenge                                                                                                applications
Maintaining a high level of service requires a coordinated effort of the city’s administrators                 • Platinum-level service
and employees. The backbone of the coordination is their information systems infrastructure.                     standards
“Information services enables our departments to provide excellent resident service;                           • Limited IT resources
therefore, we need near-perfect uptime.” explains Chris Pena, the IS Director. As a result, the                • Internal and external
city is focused on proactively procuring productivity enhancing solutions that impact their                      security vulnerabilities
service level guarantee.
                                                                                                               The Solution:
For Chris, the city, and his team, purchasing a software solution that can do more for less is of              • Effortless agents for
utmost importance. “We are a team of two full-time and one part-time IS employees that                           unique applications
have to manage 31 servers, 74 applications, and over 400 desktops and devices. As a result,                    • Enabled real-time
we strive to standardize and simplify our use of software.”                                                      reaction to exploitations
                                                                                                               • Exponentially increased
                                                                                                               security risk mitigation
Chris knew that a security breach could potentially impact their service level guarantee.                      • Sealed -off security
However, he needed to first understand the city’s exposure to infiltration. “Even though our                     vulnerabilities
departments require near perfect uptime, I thought, like most of my colleagues in other city
governments, that a robust security solution was not necessary because most infiltrators
target national, state, and other corporate systems.”

    The Solution
To better understand the magnitude of their risk, Chris engaged the Clear Security Team to
complete a proof-of-concept. ”I was surprised to see the sheer number of attempts on our
systems,” stated Chris, “I could not deny the fact that our systems are flooded with over 1000
unmonitored hourly exploit attempts.”


After seeing the evidence, he quickly deduced that a robust security monitoring solution
was necessary, “…I realized that Dynamic Log Analysis ™ can help me to proactively,                              For more information
effortlessly, and perpetually assess and categorize calamitous risks to our systems...” Chris                  www.ClearTechnologies.net
also gained other benefits of purchasing Dynamic Log Analysis™. He stated, “I am able to                          or call 972.906.7500
do more than merely monitor and rapidly delineate a threat; I can monitor internal access,
usage, and the uptime of applications - that makes my job easier – I can truly do more, with
less…”


    About Us
Since 1993, our customers have relied on us to meet their hardware needs. Today, our customers
look to us to increase their organizational effectiveness by providing continuity, infrastructure, security,
and virtualization solutions.

                                    www.ClearTechnologies.net/DynamicLogAnalysis

More Related Content

Similar to Dynamic Log Analysis™ Case Story City of Colleyville

Corporate Ppt Mid Market V4
Corporate Ppt Mid Market V4Corporate Ppt Mid Market V4
Corporate Ppt Mid Market V4dchytraus
 
Disaster Communications and Operations Management (DCOMS)
Disaster Communications and Operations Management (DCOMS)Disaster Communications and Operations Management (DCOMS)
Disaster Communications and Operations Management (DCOMS)Jonathan Jones
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtimeAFCOM
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your BusinessAll Covered
 
The Digital Nuclear Workforce
The Digital Nuclear WorkforceThe Digital Nuclear Workforce
The Digital Nuclear WorkforceDataGlance
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUEDIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUEiQHub
 
CenturyLink - Life Lock Call Center Case Study
CenturyLink - Life Lock Call Center Case StudyCenturyLink - Life Lock Call Center Case Study
CenturyLink - Life Lock Call Center Case StudyJake Weaver
 
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...Avaya Inc.
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloudJulian Knight
 
Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing Janine Sneed
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsClear Technologies
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
 

Similar to Dynamic Log Analysis™ Case Story City of Colleyville (20)

Corporate Ppt Mid Market V4
Corporate Ppt Mid Market V4Corporate Ppt Mid Market V4
Corporate Ppt Mid Market V4
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
Disaster Communications and Operations Management (DCOMS)
Disaster Communications and Operations Management (DCOMS)Disaster Communications and Operations Management (DCOMS)
Disaster Communications and Operations Management (DCOMS)
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
Silver Peak Case Study
Silver Peak Case StudySilver Peak Case Study
Silver Peak Case Study
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
The Digital Nuclear Workforce
The Digital Nuclear WorkforceThe Digital Nuclear Workforce
The Digital Nuclear Workforce
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUEDIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
 
CenturyLink - Life Lock Call Center Case Study
CenturyLink - Life Lock Call Center Case StudyCenturyLink - Life Lock Call Center Case Study
CenturyLink - Life Lock Call Center Case Study
 
Cnr global business profile v2.8
Cnr global business profile v2.8Cnr global business profile v2.8
Cnr global business profile v2.8
 
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
 
Migrating to cloud
Migrating to cloudMigrating to cloud
Migrating to cloud
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 
Internap at a Glance
Internap at a GlanceInternap at a Glance
Internap at a Glance
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing Manage the Velocity of Change with Cloud Computing
Manage the Velocity of Change with Cloud Computing
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton Communications
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 

More from Clear Technologies

Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalClear Technologies
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 FrontClear Technologies
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™Clear Technologies
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™Clear Technologies
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™Clear Technologies
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide finalClear Technologies
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product GuideClear Technologies
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetClear Technologies
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil GodwinClear Technologies
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Clear Technologies
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim SheltonClear Technologies
 

More from Clear Technologies (11)

Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Final
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 Front
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide final
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product Guide
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value Sheet
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Dynamic Log Analysis™ Case Story City of Colleyville

  • 1. Case Story TM Dynamic Log Analysis Denial is not a river in Colleyville. TM “Dynamic Log Analysis undeniably revealed 1000+ system infiltration attempts each hour!” -- Chris Pena, IS Director, City of Colleyville The Customer: City of Colleyville Located in the fourth largest Metropolitan Service Area in the United States, the City of Colleyville is known for its small-town feel, luxurious homes, and lush topography. Money The Environment: magazine named the city to its list of “Best 100 Places to Live in America.” Its residents take • 31 - NT Servers pride in knowing that their leaders and administrators provide and maintain a high level of • 74 Applications service to every aspect of their community. As such, their schools, police and fire services, • 1 large custom application library, parks, and water services operate with a focus on resident satisfaction. The Challenge: • Many heterogeneous The Challenge applications Maintaining a high level of service requires a coordinated effort of the city’s administrators • Platinum-level service and employees. The backbone of the coordination is their information systems infrastructure. standards “Information services enables our departments to provide excellent resident service; • Limited IT resources therefore, we need near-perfect uptime.” explains Chris Pena, the IS Director. As a result, the • Internal and external city is focused on proactively procuring productivity enhancing solutions that impact their security vulnerabilities service level guarantee. The Solution: For Chris, the city, and his team, purchasing a software solution that can do more for less is of • Effortless agents for utmost importance. “We are a team of two full-time and one part-time IS employees that unique applications have to manage 31 servers, 74 applications, and over 400 desktops and devices. As a result, • Enabled real-time we strive to standardize and simplify our use of software.” reaction to exploitations • Exponentially increased security risk mitigation Chris knew that a security breach could potentially impact their service level guarantee. • Sealed -off security However, he needed to first understand the city’s exposure to infiltration. “Even though our vulnerabilities departments require near perfect uptime, I thought, like most of my colleagues in other city governments, that a robust security solution was not necessary because most infiltrators target national, state, and other corporate systems.” The Solution To better understand the magnitude of their risk, Chris engaged the Clear Security Team to complete a proof-of-concept. ”I was surprised to see the sheer number of attempts on our systems,” stated Chris, “I could not deny the fact that our systems are flooded with over 1000 unmonitored hourly exploit attempts.” After seeing the evidence, he quickly deduced that a robust security monitoring solution was necessary, “…I realized that Dynamic Log Analysis ™ can help me to proactively, For more information effortlessly, and perpetually assess and categorize calamitous risks to our systems...” Chris www.ClearTechnologies.net also gained other benefits of purchasing Dynamic Log Analysis™. He stated, “I am able to or call 972.906.7500 do more than merely monitor and rapidly delineate a threat; I can monitor internal access, usage, and the uptime of applications - that makes my job easier – I can truly do more, with less…” About Us Since 1993, our customers have relied on us to meet their hardware needs. Today, our customers look to us to increase their organizational effectiveness by providing continuity, infrastructure, security, and virtualization solutions. www.ClearTechnologies.net/DynamicLogAnalysis