SlideShare a Scribd company logo
Case Story
             Dynamic Log Analysis
                                                      TM




Guarded Communication

        “Dynamic Log AnalysisTM enabled us to cost-effectively
             realize large enterprise security benefits.”
                     -- Shane, CIO, Hutton Communications                                      The Customer:
                                                                                               Hutton Communications
Founded in 1969 in Dallas, Texas, Hutton Communications, Inc. is a distributor of              The Environment:
commercial wireless communications infrastructure with 12 offices throughout the               • 40 - NT Servers
United States and Canada. Their value-added services are relied upon by Fortune                • 2 - RS6000 AIX Servers
100 Telecommunication companies that include cellular and radio communications
dealers, wireless communications carriers, and self-maintained end users of                    The Challenge:
communications systems.                                                                        • Limited IT resources
                                                                                               • Internal and external
                                                                                                 security vulnerabilities
   The Challenge                                                                               • Lacked real-time
As a small-to-medium sized business, Hutton Communication’s information                          notification of exploits
technology group is perpetually stretched for dollars, time, and resources. “We are
in a highly competitive business amongst a small group of strong companies”. said              The Solution:
Jerry McDonald, Manger of Technical Services and eBusiness, “If our systems were               • Enhanced IT productivity
compromised due to a security breach, we would lose the confidence of our                      • Closed security
customers which would have a devastating impact on our business. We have                         vulnerabilities
limited budgets and even less time to really get a true grip on our server and                 • Enabled real-time
network vulnerabilities. We’ve recently brought on new customers and are in the                  response to exploitations
process of opening new offices…it seems like security is becoming more complex
day by day.”
Tom Novak, their LAN Administrator stated “Security has been at the top of our list
for a long time, however because I am a jack-of-all-trades, I don’t have the time
to sift through network and firewall logs, nor do I have the security expertise to
identify threats in time to do anything about it. One virus could cause our business
to halt for up to seven days, which would have a devastating impact on our
business.”
                                         TM




   The Solution
Clear’s security team performed a penetration test to identify gaps in Hutton’s
security posture and provided recommendations on how to fill those gaps. “Clear’s
security assessment helped us realize how susceptible we were to a major security
breach.” said Shane Hofer, CIO, “I knew we needed to improve our security
strategy moving forward.” Clear’s Dynamic Log Analysis™ solution gave Hutton the                  For more information
security monitoring and alerting capabilities of an enterprise level solution at a small        www.ClearTechnologies.net
fraction of the cost. “I saw immediate value in the insight Dynamic Log AnalysisTM                 or call 972.906.7500
provides.” said Hofer, “My team’s productivity has increased exponentially. This
frees them up to focus on other initiatives within our department, and frees me from
adding headcount.”
                                                                                                                             TM




   About Us
Since 1993, our customers have relied on us to meet their hardware needs. Today, our
                                                                                                                             MT




customers look to us to increase their organizational effectiveness by providing continuity,
infrastructure, security, and virtualization solutions.



                                         www.ClearTechnologies.net/DynamicLogAnalysis

More Related Content

What's hot

Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
EQS Group
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
DFLABS SRL
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
Michele Chubirka
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
South Tyrol Free Software Conference
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
Intel IT Center
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Gary Bahadur
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
Janine Anthony Bowen, Esq.
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
tbeckwith
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
Dekkinga, Ewout
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
ReadWrite
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
DFLABS SRL
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 

What's hot (20)

Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 

Viewers also liked

Trial Strategy: When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
Trial Strategy:  When Will a U.S. Court Assert Jurisdiction Over a Foreign In...Trial Strategy:  When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
Trial Strategy: When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
NationalUnderwriter
 
Seminário de Segurança em Informática - Symatec
Seminário de Segurança em Informática - SymatecSeminário de Segurança em Informática - Symatec
Seminário de Segurança em Informática - Symatec
Fiesp Federação das Indústrias do Estado de SP
 
What do people think
What do people thinkWhat do people think
What do people think
Estefania Gutierrez
 
Prezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorimPrezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorimElena Zvarici
 
Что необходимо знать о песочной церемонии
Что необходимо знать о песочной церемонииЧто необходимо знать о песочной церемонии
Что необходимо знать о песочной церемонии
Ekaterina Kalache
 
Tech data - Reduce server downtime
Tech data - Reduce server downtimeTech data - Reduce server downtime
Tech data - Reduce server downtime
hudsonmw
 
Get ready for_2013
Get ready for_2013Get ready for_2013
Get ready for_2013
Jacqueline Lawson
 
Dynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureDynamic Log Analysis - The Future
Dynamic Log Analysis - The Future
Clear Technologies
 

Viewers also liked (10)

Agenda IGF.RO
Agenda IGF.ROAgenda IGF.RO
Agenda IGF.RO
 
Inscrição pct
Inscrição pctInscrição pct
Inscrição pct
 
Trial Strategy: When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
Trial Strategy:  When Will a U.S. Court Assert Jurisdiction Over a Foreign In...Trial Strategy:  When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
Trial Strategy: When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
 
Seminário de Segurança em Informática - Symatec
Seminário de Segurança em Informática - SymatecSeminário de Segurança em Informática - Symatec
Seminário de Segurança em Informática - Symatec
 
What do people think
What do people thinkWhat do people think
What do people think
 
Prezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorimPrezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorim
 
Что необходимо знать о песочной церемонии
Что необходимо знать о песочной церемонииЧто необходимо знать о песочной церемонии
Что необходимо знать о песочной церемонии
 
Tech data - Reduce server downtime
Tech data - Reduce server downtimeTech data - Reduce server downtime
Tech data - Reduce server downtime
 
Get ready for_2013
Get ready for_2013Get ready for_2013
Get ready for_2013
 
Dynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureDynamic Log Analysis - The Future
Dynamic Log Analysis - The Future
 

Similar to Dynamic Log Analysis™ Case Story Hutton Communications

Centuric Overview
Centuric OverviewCenturic Overview
Centuric OverviewCenturic
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 
Transcend United Tech Overview
Transcend United Tech OverviewTranscend United Tech Overview
Transcend United Tech Overviewjasonjking
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce CyberRecruit
 
Security and Risk Mitigation
Security and Risk MitigationSecurity and Risk Mitigation
Security and Risk Mitigation
haydenchamber
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
adeel hamid
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
Gabe Schurman
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
David Bustin
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
lynotts
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
Mint Group
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 

Similar to Dynamic Log Analysis™ Case Story Hutton Communications (20)

Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Transcend United Tech Overview
Transcend United Tech OverviewTranscend United Tech Overview
Transcend United Tech Overview
 
NJVC Brochure
NJVC BrochureNJVC Brochure
NJVC Brochure
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce
 
Security and Risk Mitigation
Security and Risk MitigationSecurity and Risk Mitigation
Security and Risk Mitigation
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Munawwar Khan
Munawwar KhanMunawwar Khan
Munawwar Khan
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 

More from Clear Technologies

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideClear Technologies
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalClear Technologies
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 FrontClear Technologies
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™Clear Technologies
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™Clear Technologies
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™Clear Technologies
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide finalClear Technologies
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product GuideClear Technologies
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleClear Technologies
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetClear Technologies
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil GodwinClear Technologies
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Clear Technologies
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Clear Technologies
 

More from Clear Technologies (14)

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product Guide
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Final
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 Front
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide final
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product Guide
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of Colleyville
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value Sheet
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Dynamic Log Analysis™ Case Story Hutton Communications

  • 1. Case Story Dynamic Log Analysis TM Guarded Communication “Dynamic Log AnalysisTM enabled us to cost-effectively realize large enterprise security benefits.” -- Shane, CIO, Hutton Communications The Customer: Hutton Communications Founded in 1969 in Dallas, Texas, Hutton Communications, Inc. is a distributor of The Environment: commercial wireless communications infrastructure with 12 offices throughout the • 40 - NT Servers United States and Canada. Their value-added services are relied upon by Fortune • 2 - RS6000 AIX Servers 100 Telecommunication companies that include cellular and radio communications dealers, wireless communications carriers, and self-maintained end users of The Challenge: communications systems. • Limited IT resources • Internal and external security vulnerabilities The Challenge • Lacked real-time As a small-to-medium sized business, Hutton Communication’s information notification of exploits technology group is perpetually stretched for dollars, time, and resources. “We are in a highly competitive business amongst a small group of strong companies”. said The Solution: Jerry McDonald, Manger of Technical Services and eBusiness, “If our systems were • Enhanced IT productivity compromised due to a security breach, we would lose the confidence of our • Closed security customers which would have a devastating impact on our business. We have vulnerabilities limited budgets and even less time to really get a true grip on our server and • Enabled real-time network vulnerabilities. We’ve recently brought on new customers and are in the response to exploitations process of opening new offices…it seems like security is becoming more complex day by day.” Tom Novak, their LAN Administrator stated “Security has been at the top of our list for a long time, however because I am a jack-of-all-trades, I don’t have the time to sift through network and firewall logs, nor do I have the security expertise to identify threats in time to do anything about it. One virus could cause our business to halt for up to seven days, which would have a devastating impact on our business.” TM The Solution Clear’s security team performed a penetration test to identify gaps in Hutton’s security posture and provided recommendations on how to fill those gaps. “Clear’s security assessment helped us realize how susceptible we were to a major security breach.” said Shane Hofer, CIO, “I knew we needed to improve our security strategy moving forward.” Clear’s Dynamic Log Analysis™ solution gave Hutton the For more information security monitoring and alerting capabilities of an enterprise level solution at a small www.ClearTechnologies.net fraction of the cost. “I saw immediate value in the insight Dynamic Log AnalysisTM or call 972.906.7500 provides.” said Hofer, “My team’s productivity has increased exponentially. This frees them up to focus on other initiatives within our department, and frees me from adding headcount.” TM About Us Since 1993, our customers have relied on us to meet their hardware needs. Today, our MT customers look to us to increase their organizational effectiveness by providing continuity, infrastructure, security, and virtualization solutions. www.ClearTechnologies.net/DynamicLogAnalysis