SlideShare a Scribd company logo
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
GTRI & Splunk Case Studies
Presented by Taylor Williams
December 8, 2015
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security/Compliance
Customer:
Multi-national systems and (cloud) services-provider with 140,000+ employees and
140 data centers globally.
Challenge:
Many different services within corporation with proprietary and shared compliance
and security concerns with no structured or centralized log management solution in
place. Various missing components company-wide:
• Accountability and Audit
• Purchasing and Healthcare Compliance (PCI, HIPPA, etc.)
• Network and System Security
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security/Compliance
Solution Process:
Phased approach for requirements gathering, proof of concept, pilot rollout, and a
production rollout. RFP released for solution proposal (not specific to Splunk) awarded
to GTRI for depth of Splunk practice and solutions provided.
• Phase 1: Requirements gathering for use cases in 8 defined data centers out of 140
• Phase 2: Proof of Concept of solution for approximately 10% subset of data
• Phase 3: Pilot Rollout of solution to all use cases for 8 defined data centers
• Phase 4: Production Rollout to data centers globally
Project currently nearing conclusion of Phase 2 with use cases met by viability of data
thus far collected and indexed into Splunk
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security/Compliance
GTRI Solution:
Scalable and repeatable Splunk solution designed for implementation on Cisco
Flexpod solution(s). Designed for scalability to data centers beyond original 8
proposed with standard operating procedures (SOPs) defined for both Splunk
operations as well as hardware. Overall project inclusions:
• Full “ground-up” Splunk Architectural design
• Multi-site solution
• Repeatable philosophy in architecture and deployment
• Standard operating procedures and staffing plan for full 24x7 management
• GTRI Splunk Managed Service
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security
Customer:
Private aerospace and engineering firm that designs and launches next generation
rockets and propulsion systems. Data centers located in Denver and various launch
locations across the US.
Challenge:
No central security incident and event management (SIEM) solution in place to have
holistic view of network security posture from all data centers. Security concerns are
great especially in monitoring those central to launch locations.
• Create a centrally deployed and managed SIEM
• Filter and fine-tune system to only see events deemed critical
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security
Solution Process:
RFP released for vendors to propose a security solution inclusive of full design and
deployment methodologies to be enacted upon after award and project execution.
Discovery stage included to assess and capture complete security use case, inclusive of
relevant and irrelevant network sources to the central SIEM. Steps:
1. Design multi-site Splunk architecture. Two main data center locations for storage
of logs, fully replicated for redundancy between each.
2. Execute on validated design, deploying Splunk Enterprise servers to all proposed
locations
3. Ingest of logs from all validated sources
4. Filter nearly 1800+ hosts into a 200GB Splunk solution
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: Multi-Site Security
GTRI Solution:
Fully executed multi-site SIEM solution using Splunk and the Splunk App for Enterprise
security. Security requirements and objectives met and exceeded using this solution
and its fully executed design. Work continues today with full time GTRI Splunk
Certified Architect on-site to manage solution. Overall project inclusions:
• Full “ground-up” Splunk Architectural design
• Multi-site solution
• Assessment of all relevant use cases to meet licensing threshold
• Splunk Enterprise Security Application installation and managed service
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: SOC Staffing and Managed Service
Customer:
Self-funding not-for-profit US federal agency part of the United States Department of
Energy. Main location(s) located in the US Pacific Northwest region.
Challenge:
No SIEM in place to manage and monitor the agency’s overall network security
posture. Security operations in place, but incident management and response was
lacking and without use of proper tools. Customer needed to:
• Create a centrally deployed and managed SIEM
• Develop and deploy a 24x7 staffing model to fully staff and enable Security
Operations Center with Splunk
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: SOC Staffing and Managed Service
Solution Process:
RFP released for vendors to propose a security solution inclusive of full design and
deployment methodologies, as well as a proposed staffing model to fully enable
customer SOC with use of the proposed tool. Phased approach to execution of project
included:
1. Execute on validated design, deploying Splunk App for Enterprise Security within
the deployed architecture for SIEM enablement
2. Propose finalized staffing model to customer for approval. Once approved, source,
hire, and train staff on use of Splunk and ES
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Case Study: SOC Staffing and Managed Service
GTRI Solution:
Staffing model to manage 24x7 security operations: Shift times proposed for all
personnel
• SOC-specific personnel to be network security subject matter experts used for
incident response and resolution.
– SOC Manager (1)
– Security – Lead Analyst (1)
– Security – Senior Analyst (3)
– Security – Analyst (9)
• Splunk Operations personnel, to be used to manage to integrity of the Splunk
architecture and be first tier for SOC personnel in event mining.
– Operations Manager (1 per site)
– Operations Architect (1 FTE)
– Operations Data Scientist (1 per site and 1 FTE)
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Additional Case Studies
Denver Water:
Use Splunk for overall service health dashboards. A deluge of machine data from logs
and databases overwhelmed IT administrators, hampering efforts to pinpoint
problems when users notified the help desk.
• Monitor and maintain applications
– Asset management, customer information, geospatial, mobile, Web services, REST services
• Dashboards provide visibility into:
– Current performance and availability
– Historical performance trending and availability
– Average daily performance
– Recent issues (uptime and failures)
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents
herein contain confidential information not to be copied.
Additional Case Studies
The University of Texas at Austin:
• Began using Splunk for security forensics
• Now using Splunk for identification and control, outbreak management, and
visibility of 120,000+ network devices
The City and County of San Francisco:
• Using Splunk for network security services to become proactive versus reactive
• Help identify what is/isn’t normal for web traffic to City and County’s website
• “With Splunk, instead of spending 40% of an FTE’s day to understand what the
web filters are telling us, we now just look at the dashboards to show us
abnormalities”
© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
Questions?

More Related Content

What's hot

Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013
Austin Scott
 
One neck case study v1 ge
One neck case study v1 geOne neck case study v1 ge
One neck case study v1 ge
dvalentine81
 

What's hot (20)

Enabling DataOps with Unified Data Lineage
Enabling DataOps with Unified Data LineageEnabling DataOps with Unified Data Lineage
Enabling DataOps with Unified Data Lineage
 
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and DevelopersThe DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
The DevSecOps Showdown: How to Bridge the Gap Between Security and Developers
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
 
Supply Chain Visualization
Supply Chain VisualizationSupply Chain Visualization
Supply Chain Visualization
 
Practical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief KarfiantoPractical DevSecOps - Arief Karfianto
Practical DevSecOps - Arief Karfianto
 
ICIC 2014 Panel: Mobile Apps for Patent Searchers
ICIC 2014 Panel: Mobile Apps for Patent SearchersICIC 2014 Panel: Mobile Apps for Patent Searchers
ICIC 2014 Panel: Mobile Apps for Patent Searchers
 
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CDSynopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
Synopsys Security Event Israel Presentation: Making AppSec Testing Work in CI/CD
 
Pipeline analytics concept for posting
Pipeline analytics concept for postingPipeline analytics concept for posting
Pipeline analytics concept for posting
 
From rogue one to rebel alliance by Peter Chestna
From rogue one to rebel alliance by Peter ChestnaFrom rogue one to rebel alliance by Peter Chestna
From rogue one to rebel alliance by Peter Chestna
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management Teams
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013Synergist SCADA Introduction Slide Deck 2013
Synergist SCADA Introduction Slide Deck 2013
 
One neck case study v1 ge
One neck case study v1 geOne neck case study v1 ge
One neck case study v1 ge
 
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
 
Cross Section and Deep Dive into GE Predix
Cross Section and Deep Dive into GE PredixCross Section and Deep Dive into GE Predix
Cross Section and Deep Dive into GE Predix
 
A modern approach to cloud computing
A modern approach to cloud computing A modern approach to cloud computing
A modern approach to cloud computing
 
Il paradigma DevOps e Continuous Delivery Automation
Il paradigma DevOps e Continuous Delivery AutomationIl paradigma DevOps e Continuous Delivery Automation
Il paradigma DevOps e Continuous Delivery Automation
 
Splunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk OverviewSplunk Discovery: Milan 2018 - Splunk Overview
Splunk Discovery: Milan 2018 - Splunk Overview
 

Viewers also liked

Cerner at SplunkLive! Minneapolis
Cerner at SplunkLive! MinneapolisCerner at SplunkLive! Minneapolis
Cerner at SplunkLive! Minneapolis
Splunk
 
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
CEE-SEC(R)
 
Synergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtubeSynergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtube
Ketan Chandarana
 

Viewers also liked (20)

SplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak HostingSplunkLive! Customer Presentation – Peak Hosting
SplunkLive! Customer Presentation – Peak Hosting
 
Cerner at SplunkLive! Minneapolis
Cerner at SplunkLive! MinneapolisCerner at SplunkLive! Minneapolis
Cerner at SplunkLive! Minneapolis
 
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
Легкие мобильные приложения – альтернатива традиционной экосистемной модели?
 
SplunkLive! London 2016 - BBC Worldwide
SplunkLive! London 2016 - BBC WorldwideSplunkLive! London 2016 - BBC Worldwide
SplunkLive! London 2016 - BBC Worldwide
 
Splunk for Online Services Event featuring Groupon
Splunk for Online Services Event featuring GrouponSplunk for Online Services Event featuring Groupon
Splunk for Online Services Event featuring Groupon
 
Splunk in Target: Internet of Things (Robot Analytics)
Splunk in Target: Internet of Things (Robot Analytics)Splunk in Target: Internet of Things (Robot Analytics)
Splunk in Target: Internet of Things (Robot Analytics)
 
Integra Customer Presentation
Integra Customer PresentationIntegra Customer Presentation
Integra Customer Presentation
 
SIEM
SIEMSIEM
SIEM
 
Splunk live! Italy 2015
Splunk live! Italy 2015Splunk live! Italy 2015
Splunk live! Italy 2015
 
SplunkLive! London 2016 - John Lewis
SplunkLive! London 2016 - John LewisSplunkLive! London 2016 - John Lewis
SplunkLive! London 2016 - John Lewis
 
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
SplunkLive! London 2016 - HSCIC / NHS Digital / Spine 2
 
SplunkLive! London 2016 - Shazam
SplunkLive! London 2016 - ShazamSplunkLive! London 2016 - Shazam
SplunkLive! London 2016 - Shazam
 
How to Create an Effective RFP for your LMS Project
How to Create an Effective RFP for your LMS ProjectHow to Create an Effective RFP for your LMS Project
How to Create an Effective RFP for your LMS Project
 
Periodo de entreguerras
Periodo de entreguerrasPeriodo de entreguerras
Periodo de entreguerras
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
T-Mobile Customer Presentation
T-Mobile Customer PresentationT-Mobile Customer Presentation
T-Mobile Customer Presentation
 
SplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRASplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRA
 
Synergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtubeSynergy Global Sourcing_India_Engineering_June2016_youtube
Synergy Global Sourcing_India_Engineering_June2016_youtube
 
Decision Ready Data: Power Your Analytics with Great Data
Decision Ready Data: Power Your Analytics with Great DataDecision Ready Data: Power Your Analytics with Great Data
Decision Ready Data: Power Your Analytics with Great Data
 

Similar to GTRI Splunk Case Studies - Splunk Tech Day

Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Zivaro Inc
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
Erik Giles
 
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
Splunk
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Anitha_Resume_BigData
Anitha_Resume_BigDataAnitha_Resume_BigData
Anitha_Resume_BigData
Anitha Bade
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 

Similar to GTRI Splunk Case Studies - Splunk Tech Day (20)

Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech DaySplunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
Splunk Fundamentals: Investigations with Core Splunk - Splunk Tech Day
 
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...
 
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn'tSingle Glass of Pain: See Your World, Maybe You Wish You Hadn't
Single Glass of Pain: See Your World, Maybe You Wish You Hadn't
 
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
DO5T17S_T5 Thur 430 GilesE_BR_20151114_012422
 
Splunk and Cisco UCS Breakout Session
Splunk and Cisco UCS Breakout SessionSplunk and Cisco UCS Breakout Session
Splunk and Cisco UCS Breakout Session
 
Case Study: University of Chicago Achieves High Availability through a Centr...
Case Study:  University of Chicago Achieves High Availability through a Centr...Case Study:  University of Chicago Achieves High Availability through a Centr...
Case Study: University of Chicago Achieves High Availability through a Centr...
 
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogic
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogicWebinar: Improve Splunk Analytics and Automate Processes with SnapLogic
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogic
 
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
SplunkLive! Zurich 2018: Legacy SIEM to Splunk, How to Conquer Migration and ...
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS) Splunk in the Cisco Unified Computing System (UCS)
Splunk in the Cisco Unified Computing System (UCS)
 
Splunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk MINT and Stream Breakout
Splunk MINT and Stream Breakout
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Anitha_Resume_BigData
Anitha_Resume_BigDataAnitha_Resume_BigData
Anitha_Resume_BigData
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 

More from Zivaro Inc

More from Zivaro Inc (20)

How to Rightsize Your Citrix Investment
How to Rightsize Your Citrix InvestmentHow to Rightsize Your Citrix Investment
How to Rightsize Your Citrix Investment
 
On-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration ShowdownOn-Prem vs. Cloud Collaboration Showdown
On-Prem vs. Cloud Collaboration Showdown
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security Technologies
 
Big Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better TogetherBig Data Workshop: Splunk and Dell EMC...Better Together
Big Data Workshop: Splunk and Dell EMC...Better Together
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change Management
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 
Denver Big Data Analytics Day
Denver Big Data Analytics DayDenver Big Data Analytics Day
Denver Big Data Analytics Day
 
Support Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network ArchitectureSupport Software Defined Networking with Dynamic Network Architecture
Support Software Defined Networking with Dynamic Network Architecture
 
Cisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined NetworkingCisco ACI: A New Approach to Software Defined Networking
Cisco ACI: A New Approach to Software Defined Networking
 
Software Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology BriefSoftware Defined Networking (SDN) Technology Brief
Software Defined Networking (SDN) Technology Brief
 
Software Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSXSoftware Defined Networking (SDN) with VMware NSX
Software Defined Networking (SDN) with VMware NSX
 
Splunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech DaySplunk Enterprise 6.3 - Splunk Tech Day
Splunk Enterprise 6.3 - Splunk Tech Day
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech Day
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Successfully Deploying IPv6
Successfully Deploying IPv6Successfully Deploying IPv6
Successfully Deploying IPv6
 
Using Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced ThreatsUsing Big Data to Counteract Advanced Threats
Using Big Data to Counteract Advanced Threats
 
IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013IPv6 Security - Hacker Halted 2013
IPv6 Security - Hacker Halted 2013
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

GTRI Splunk Case Studies - Splunk Tech Day

  • 1. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.© 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. GTRI & Splunk Case Studies Presented by Taylor Williams December 8, 2015
  • 2. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security/Compliance Customer: Multi-national systems and (cloud) services-provider with 140,000+ employees and 140 data centers globally. Challenge: Many different services within corporation with proprietary and shared compliance and security concerns with no structured or centralized log management solution in place. Various missing components company-wide: • Accountability and Audit • Purchasing and Healthcare Compliance (PCI, HIPPA, etc.) • Network and System Security
  • 3. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security/Compliance Solution Process: Phased approach for requirements gathering, proof of concept, pilot rollout, and a production rollout. RFP released for solution proposal (not specific to Splunk) awarded to GTRI for depth of Splunk practice and solutions provided. • Phase 1: Requirements gathering for use cases in 8 defined data centers out of 140 • Phase 2: Proof of Concept of solution for approximately 10% subset of data • Phase 3: Pilot Rollout of solution to all use cases for 8 defined data centers • Phase 4: Production Rollout to data centers globally Project currently nearing conclusion of Phase 2 with use cases met by viability of data thus far collected and indexed into Splunk
  • 4. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security/Compliance GTRI Solution: Scalable and repeatable Splunk solution designed for implementation on Cisco Flexpod solution(s). Designed for scalability to data centers beyond original 8 proposed with standard operating procedures (SOPs) defined for both Splunk operations as well as hardware. Overall project inclusions: • Full “ground-up” Splunk Architectural design • Multi-site solution • Repeatable philosophy in architecture and deployment • Standard operating procedures and staffing plan for full 24x7 management • GTRI Splunk Managed Service
  • 5. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security Customer: Private aerospace and engineering firm that designs and launches next generation rockets and propulsion systems. Data centers located in Denver and various launch locations across the US. Challenge: No central security incident and event management (SIEM) solution in place to have holistic view of network security posture from all data centers. Security concerns are great especially in monitoring those central to launch locations. • Create a centrally deployed and managed SIEM • Filter and fine-tune system to only see events deemed critical
  • 6. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security Solution Process: RFP released for vendors to propose a security solution inclusive of full design and deployment methodologies to be enacted upon after award and project execution. Discovery stage included to assess and capture complete security use case, inclusive of relevant and irrelevant network sources to the central SIEM. Steps: 1. Design multi-site Splunk architecture. Two main data center locations for storage of logs, fully replicated for redundancy between each. 2. Execute on validated design, deploying Splunk Enterprise servers to all proposed locations 3. Ingest of logs from all validated sources 4. Filter nearly 1800+ hosts into a 200GB Splunk solution
  • 7. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: Multi-Site Security GTRI Solution: Fully executed multi-site SIEM solution using Splunk and the Splunk App for Enterprise security. Security requirements and objectives met and exceeded using this solution and its fully executed design. Work continues today with full time GTRI Splunk Certified Architect on-site to manage solution. Overall project inclusions: • Full “ground-up” Splunk Architectural design • Multi-site solution • Assessment of all relevant use cases to meet licensing threshold • Splunk Enterprise Security Application installation and managed service
  • 8. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied.
  • 9. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: SOC Staffing and Managed Service Customer: Self-funding not-for-profit US federal agency part of the United States Department of Energy. Main location(s) located in the US Pacific Northwest region. Challenge: No SIEM in place to manage and monitor the agency’s overall network security posture. Security operations in place, but incident management and response was lacking and without use of proper tools. Customer needed to: • Create a centrally deployed and managed SIEM • Develop and deploy a 24x7 staffing model to fully staff and enable Security Operations Center with Splunk
  • 10. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: SOC Staffing and Managed Service Solution Process: RFP released for vendors to propose a security solution inclusive of full design and deployment methodologies, as well as a proposed staffing model to fully enable customer SOC with use of the proposed tool. Phased approach to execution of project included: 1. Execute on validated design, deploying Splunk App for Enterprise Security within the deployed architecture for SIEM enablement 2. Propose finalized staffing model to customer for approval. Once approved, source, hire, and train staff on use of Splunk and ES
  • 11. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Case Study: SOC Staffing and Managed Service GTRI Solution: Staffing model to manage 24x7 security operations: Shift times proposed for all personnel • SOC-specific personnel to be network security subject matter experts used for incident response and resolution. – SOC Manager (1) – Security – Lead Analyst (1) – Security – Senior Analyst (3) – Security – Analyst (9) • Splunk Operations personnel, to be used to manage to integrity of the Splunk architecture and be first tier for SOC personnel in event mining. – Operations Manager (1 per site) – Operations Architect (1 FTE) – Operations Data Scientist (1 per site and 1 FTE)
  • 12. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Additional Case Studies Denver Water: Use Splunk for overall service health dashboards. A deluge of machine data from logs and databases overwhelmed IT administrators, hampering efforts to pinpoint problems when users notified the help desk. • Monitor and maintain applications – Asset management, customer information, geospatial, mobile, Web services, REST services • Dashboards provide visibility into: – Current performance and availability – Historical performance trending and availability – Average daily performance – Recent issues (uptime and failures)
  • 13. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Additional Case Studies The University of Texas at Austin: • Began using Splunk for security forensics • Now using Splunk for identification and control, outbreak management, and visibility of 120,000+ network devices The City and County of San Francisco: • Using Splunk for network security services to become proactive versus reactive • Help identify what is/isn’t normal for web traffic to City and County’s website • “With Splunk, instead of spending 40% of an FTE’s day to understand what the web filters are telling us, we now just look at the dashboards to show us abnormalities”
  • 14. © 2015 Global Technology Resources, Inc. All Rights Reserved. Contents herein contain confidential information not to be copied. Questions?