SlideShare a Scribd company logo
How Greenhouse Software Unlocked
the Power of Machine Data Analytics
with Sumo Logic on AWS
Today’s Presenters
David Potes, Manager, Solutions Architecture, Amazon Web Services
Dave Anderson, Director of Security & IT, Greenhouse Software
Kalyan Ramanathan, VP of Product Marketing, Sumo Logic
Today’s Agenda
• An overview of AWS and AWS Marketplace, with an emphasis on
machine data analytics & security
• The Greenhouse success story with AWS and Sumo Logic
• Q&A/Discussion
Learning Objectives
1. Understand the benefits of AWS-hosted machine data analytics
services
2. Ensure data protection and security in the AWS cloud
3. Understand best practices for leveraging machine learning analysis
to uncover real-time insights into application operations and security
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Introduction to AWS Security
Familiar Security
Model
Validated and driven by
customers’ security experts
Benefits all customers
PEOPLE & PROCESS
SYSTEM
NETWORK
PHYSICAL
Security is Job Zero
AWS Foundation Services
Compute Storage Database Networking
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
Network
Security
Identity &
Access
Control
Customer applications & content
You get to define
your controls IN
the Cloud
AWS takes care
of the security
OF the Cloud
You
AWS And You Share Responsibility for Security
Inventory &
Config
Data
Encryption
Key AWS Certifications and Assurance Programs
• You benefit from an environment built for the most security
sensitive organizations
• AWS manages 1800+ security controls so you don’t have to
• You get to define the right security controls for your workload
sensitivity
• You always have full ownership and control of your data
What This Means
AWS Security Tools & Features
Customer applications & content
Oversight & Monitoring
AWS and its partners offer over 700 security services, tools and features
Mirror the familiar controls you deploy within your on-prem environments
Network
Security
Identity &
Access
Control
Inventory &
Config
Data
Encryption
Monitoring in the Cloud is different
• Resources are elastic and ephemeral
• Infrastructure can have tightly coupled interaction to events
• Cost is now a concrete metric that can be tracked.
• Changes can be tracked.
• Access can be tracked.
Full visibility of your AWS environment
• CloudTrail will record access to API calls and save logs in your S3
buckets, no matter how those API calls were made
Who did what and when and from where (IP address)
• CloudTrail support for many AWS services and growing - includes
EC2, EBS, VPC, RDS, IAM and RedShift
• Easily Aggregate all log information
Out of the box integration with log analysis tools from AWS
partners including SumoLogic
Monitoring: Get consistent visibility of logs
Getting the most out of logging
• Enable anything w/ audit or access log
• Tamper proof (and fail proof) your log
• Create and implement log lifecycle policies
• Use meaningful naming.
• Do something with them!
Sumo Logic
Confidential
Sumo Logic + AWS
• Sumo Logic is a secure, AWS-hosted machine data
analytics service that delivers real-time insights
from logs, metrics and event data across the entire
application lifecycle and stack, helping customers
build, run, and secure their modern (AWS)
applications.
• In addition, Sumo Logic supports SaaS Contracts
on AWS Marketplace making it easy for customers
to find, buy, and start using software and technical
services that run on AWS with a single click.
Sumo Logic
Confidential
Greenhouse Software
Application Analytics
Sumo Logic
Confidential
Who is Greenhouse Software?
● Recruitment optimization platform delivered as SaaS
● From job application through onboarding companies run their entire
hiring process on top of Greenhouse
● Founded in 2012, 200 employees, offices in NY and SF
● Nearly two thousand customers and growing
Dave Anderson, Director of Security & IT, Greenhouse Software
• Background in systems/network/security engineering
• Long-time Sumo Logic customer
Sumo Logic
Confidential
Greenhouse Infrastructure: Past and Present
• Initially deployed on Heroku’s PaaS
offering
• Operated for a while in a hybrid
Heroku + AWS environment to
support services Heroku could not
• Containerized most everything:
– Already containerized at
Heroku
– Docker was natural choice
– Mesos and Marathon for
container orchestration
– Moving to Kubernetes
• All running on AWS:
– EC2
– ELB and Autoscaling
– RDS databases
– Cloudtrail for auditing
In the Past Present
Sumo Logic
Confidential
Management Through Data
• Logs everywhere
• Initial log management was mostly manual
– Mostly in-house solutions
– Lots of greps/manual hunt-and-peck
ELB VPC
Flowlogs
CloudTrail Containers Orchestration Apps
Sumo Logic
Confidential
Issues with “un-consolidated” Log Management
• Engineers must have good
Unix/Linux skills.
• Data is harder to access.
• Getting context requires multiple
iterations.
• Correlation is manual.
• Reporting and visualization requires
separate tools.
• Limited app visibility
• Challenges in meeting KPI’s
– Long MTTI/MTTR
• Challenges in ensuring app security
• Team productivity and focus issues
Issues Impact
Sumo Logic
Confidential
What did we want in an analytics solution?
• Scales well
– Future proof for Greenhouse growth
• Fast time to value
– Get up and running and show tangible value quickly
– Support AWS services out of the box
• Fully managed & secure
– Don’t spend resources to manage “management” solution
– Should come with right security certifications
Sumo Logic
Confidential
Why Sumo Logic?
• Easy to get started.
– Hosted collectors and installed collectors
– Full support for AWS with apps and dashboards
• Very scalable solution.
– High performance and redundancy
– Zero upgrade costs
• Security and compliance of platform.
– SOC 2, ISO 27001, EU GDPR, PCI
• Low TCO.
– SaaS offering - no management required
Sumo Logic
Confidential
Sumo Logic at Greenhouse
1. Proactive app performance management
2. Fast application troubleshooting
3. Proactively identify AWS infrastructure security
4. Ensure application security
5. Monitor AWS VPC network activity
Key use cases that enable app performance and security
Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 1: Proactive performance management
• Identify performance issues
before customers are
affected
Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 2: Resolve performance management quickly
• Leverage Sumo Logic
machine learning to
identify outliers
• Utilize features like
LogCompare and
LogReduce to focus on
relevant events
Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 3: Proactively manage AWS/infrastructure security
• Monitor Cloudtrail
security activity
• Set alerts for known
bad activity
Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 4: Proactively manage application security
• We have created searches
and dashboards for
common security events in
our application
Sumo Logic
Confidential
Sumo Logic at Greenhouse
Use case 5: Monitor AWS resources
• Monitor traffic in/out of our
VPC
• Identify busy network
resources and bottlenecks
• Unusual outliers are typically
worth investigation
Sumo Logic
Confidential
Sumo Logic Results:
Impact on Greenhouse operations and productivity
• Ease of use leads to faster issue resolution
• Saved searches help new engineers
• Dashboards provide useful visualizations
• Alerts on unusual behavior
• Self-healing automation based on log data
99.9% SLA
MTTI/MTTR of minutes
Sumo Logic
Confidential
What’s Next?
Greenhouse, Sumo Logic + AWS
• More security automation and dashboards
• Integration with other tools
– Slack for notifications
• “Single pane of glass” for security
– Feed data from other tools in to Sumologic to power security dashboards
Sumo Logic
Confidential
What We Learned
Best practices to succeed
• Implement solutions that help you sleep better
– Leverage experts and expert solutions
– Don’t try to solve it all in-house
– Don’t reinvent the wheel
• Easy to get started with in-house solutions
– But it is much more effort when it comes to bulletproofing it
• Sumo Logic and AWS
– Great services and solutions to solve your application analytics
needs and more.
Sumo Logic
Confidential
Sumo Logic Machine Data Analytics
Sumo Logic Confidential
1200+
Customers
2-4x lifetime expand
1.
20 Million +
Searches performed daily
100 PB +
Data analyzed daily
300+ Trillion
Records queried daily
Tier-1 Investors
Service Scale
No limits
Leading Machine Data Analytics Service
Sumo Logic
Confidential
33
Unified Machine Data Platform
1.
Unified Machine
Data Analytics
Log, Metrics & Events
Machine Learning
Scalable & Elastic
Modern
Application
Track End to End Performance
Full Stack Visibility
Real-Time Insights
Fast troubleshooting and
root-cause analysis
Sumo Logic
Confidential
34
Sumo Logic: How It Works
Monitor
Dashboard & Alert
Troubleshoot
Analyze & Correlate
Optimize
Trend & predict
Sumo Logic
Confidential
Amazon CloudFront
AWS Lambda
Amazon Inspector
AWS VPC Flow Amazon S3
AWS Elastic Load Balancing
AWS CloudTrail
AWS Config
Native AWS Integrations
Sumo Logic
Confidential
36
Zero Management SaaS Service
Only approach to manage volume + variety of machine data
High TCO & Long TTV
Limited flexibility & scalability
Security as afterthought
Legacy On Prem or Single-Tenant
ZERO Deploy &
Upgrade times
Reduce Time to Value by 90%
No Management
Overhead
Reduce TCO > 50%
Fully Elastic
On Demand
Agility, Scale,
Performance
Always Available
4 Geos, 12AZs, 6 X
Replication
Superior
Performance
Guaranteed SLAs
Secure by
Design
Industry’s Most Secure
Platform
Next Generation Multi-tenant SaaS
“The unique combination of Sumo Logic’s SaaS architecture demonstrated that we would obtain the fast time-to-value & scalability”
Sumo Logic
Confidential
Industry’s Most Secure
Cloud-Native
Analytics Service
Fully Secure
Protecting Customer Data with Best-in-Class Security
• PCI/DSS 3.2 Service Provider Level 1 Certified
• SOC 2 Type attestation
• ISO 27001 certified
• CSA Star certified
• HIPAA-HITECH compliance
• U.S. – EU Privacy Shield
• AES 256-bit encryption at rest
• TLS encryption in transit
• FIPS 140-2 compliant
Sumo Logic
Confidential
38
Comprehensive app visibility
Cloud Native Secure Architecture
Machine learning for faster MTTI/MTTR
Unified Logs & Metrics Data
Why Sumo Logic?
Available in AWS Marketplace
• Buy on AWS Marketplace:
– https://aws.amazon.com/marketplace/pp/B01N06ZS84
• Learn more about Sumo Logic on AWS:
– https://www.sumologic.com/aws/
• Try AWS for free:
– https://aws.amazon.com/
Next steps and further information
Sumo Logic
Confidential
Q&A

More Related Content

What's hot

AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
Amazon Web Services
 
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)
Amazon Web Services
 
SMC302 Building Serverless Web Applications
SMC302 Building Serverless Web ApplicationsSMC302 Building Serverless Web Applications
SMC302 Building Serverless Web Applications
Amazon Web Services
 
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...
Amazon Web Services
 
The State of Serverless Computing | AWS Public Sector Summit 2017
The State of Serverless Computing | AWS Public Sector Summit 2017The State of Serverless Computing | AWS Public Sector Summit 2017
The State of Serverless Computing | AWS Public Sector Summit 2017
Amazon Web Services
 
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...Application Lifecycle Management in a Serverless World | AWS Public Sector Su...
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...
Amazon Web Services
 
SEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) ScaleSEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) Scale
Amazon Web Services
 
AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)
AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)
AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)
Amazon Web Services
 
(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics
(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics
(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics
Amazon Web Services
 
Rackspace Best Practices for DevOps on AWS
Rackspace Best Practices for DevOps on AWSRackspace Best Practices for DevOps on AWS
Rackspace Best Practices for DevOps on AWS
Amazon Web Services
 
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
Amazon Web Services
 
Advanced AWS techniques from the trenches of the Enterprise – Sourced Group
Advanced AWS techniques from the trenches of the Enterprise – Sourced GroupAdvanced AWS techniques from the trenches of the Enterprise – Sourced Group
Advanced AWS techniques from the trenches of the Enterprise – Sourced Group
Amazon Web Services
 
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech Talks
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech TalksDesign, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech Talks
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech Talks
Amazon Web Services
 
Application Migrations at Scale
Application Migrations at ScaleApplication Migrations at Scale
Application Migrations at Scale
Amazon Web Services
 
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
Amazon Web Services
 
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)
Amazon Web Services
 
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...
Amazon Web Services
 
SEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOpsSEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOps
Amazon Web Services
 
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...
Amazon Web Services
 
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)
Amazon Web Services
 

What's hot (20)

AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
 
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)
AWS re:Invent 2016: Getting Started with Serverless Architectures (CMP211)
 
SMC302 Building Serverless Web Applications
SMC302 Building Serverless Web ApplicationsSMC302 Building Serverless Web Applications
SMC302 Building Serverless Web Applications
 
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...
ENT312 NEW LAUNCH! Better Software Procurement and Management Using AWS Marke...
 
The State of Serverless Computing | AWS Public Sector Summit 2017
The State of Serverless Computing | AWS Public Sector Summit 2017The State of Serverless Computing | AWS Public Sector Summit 2017
The State of Serverless Computing | AWS Public Sector Summit 2017
 
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...Application Lifecycle Management in a Serverless World | AWS Public Sector Su...
Application Lifecycle Management in a Serverless World | AWS Public Sector Su...
 
SEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) ScaleSEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) Scale
 
AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)
AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)
AWS re:Invent 2016: What’s New with AWS Lambda (SVR202)
 
(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics
(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics
(BDT307) Zero Infrastructure, Real-Time Data Collection, and Analytics
 
Rackspace Best Practices for DevOps on AWS
Rackspace Best Practices for DevOps on AWSRackspace Best Practices for DevOps on AWS
Rackspace Best Practices for DevOps on AWS
 
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
 
Advanced AWS techniques from the trenches of the Enterprise – Sourced Group
Advanced AWS techniques from the trenches of the Enterprise – Sourced GroupAdvanced AWS techniques from the trenches of the Enterprise – Sourced Group
Advanced AWS techniques from the trenches of the Enterprise – Sourced Group
 
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech Talks
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech TalksDesign, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech Talks
Design, Deploy, and Optimize SQL Server on AWS - June 2017 AWS Online Tech Talks
 
Application Migrations at Scale
Application Migrations at ScaleApplication Migrations at Scale
Application Migrations at Scale
 
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
 
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)
AWS re:Invent 2016: Real-time Data Processing Using AWS Lambda (SVR301)
 
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...
NEW LAUNCH! Delivering Powerful Graphics-Intensive Applications from the AWS ...
 
SEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOpsSEC303 Automating Security in Cloud Workloads with DevSecOps
SEC303 Automating Security in Cloud Workloads with DevSecOps
 
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...
AWS re:Invent 2016: 6 Million New Registrations in 30 Days: How the Chick-fil...
 
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)
AWS re:Invent 2016: Wild Rydes Takes Off – The Dawn of a New Unicorn (SVR309)
 

Similar to How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sumo Logic on AWS

AWS Webcast - Sumo Logic
AWS Webcast - Sumo LogicAWS Webcast - Sumo Logic
AWS Webcast - Sumo Logic
Amazon Web Services
 
Scaling Your Tools for Your Modern Application
Scaling Your Tools for Your Modern ApplicationScaling Your Tools for Your Modern Application
Scaling Your Tools for Your Modern Application
Sumo Logic
 
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Amazon Web Services
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Amazon Web Services
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Sumo Logic
 
Security Requires Visibility-Turn Data Into Security Insight
Security Requires Visibility-Turn Data Into Security InsightSecurity Requires Visibility-Turn Data Into Security Insight
Security Requires Visibility-Turn Data Into Security Insight
Amazon Web Services
 
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
Sumo Logic
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
Amazon Web Services
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
Amazon Web Services
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
Amazon Web Services
 
Developing a Continuous Automated Approach to Cloud Security
 Developing a Continuous Automated Approach to Cloud Security Developing a Continuous Automated Approach to Cloud Security
Developing a Continuous Automated Approach to Cloud Security
Amazon Web Services
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
Faiza Mehar
 
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
Amazon Web Services Korea
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
Amazon Web Services
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
Amazon Web Services
 
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
Amazon Web Services Korea
 
Neev cloud services with AWS
Neev cloud services with AWSNeev cloud services with AWS
Neev cloud services with AWS
Neev Technologies
 
Using AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics ServiceUsing AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics Service
Christian Beedgen
 

Similar to How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sumo Logic on AWS (20)

AWS Webcast - Sumo Logic
AWS Webcast - Sumo LogicAWS Webcast - Sumo Logic
AWS Webcast - Sumo Logic
 
Scaling Your Tools for Your Modern Application
Scaling Your Tools for Your Modern ApplicationScaling Your Tools for Your Modern Application
Scaling Your Tools for Your Modern Application
 
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
 
Security Requires Visibility-Turn Data Into Security Insight
Security Requires Visibility-Turn Data Into Security InsightSecurity Requires Visibility-Turn Data Into Security Insight
Security Requires Visibility-Turn Data Into Security Insight
 
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
AWS and Sumo Logic Webinar: Simplify Compliance with Proactive Machine Data A...
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Developing a Continuous Automated Approach to Cloud Security
 Developing a Continuous Automated Approach to Cloud Security Developing a Continuous Automated Approach to Cloud Security
Developing a Continuous Automated Approach to Cloud Security
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
[AWS에서의 미디어 및 엔터테인먼트] 클라우드에서의 브로드캐스팅 서비스
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나  Moving Core B...
Moving Core Business to the Cloud -이덕성 대표 :: AWS 파트너 테크시프트 세미나 Moving Core B...
 
Neev cloud services with AWS
Neev cloud services with AWSNeev cloud services with AWS
Neev cloud services with AWS
 
Using AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics ServiceUsing AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics Service
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 

Recently uploaded (20)

Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 

How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sumo Logic on AWS

  • 1. How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sumo Logic on AWS
  • 2. Today’s Presenters David Potes, Manager, Solutions Architecture, Amazon Web Services Dave Anderson, Director of Security & IT, Greenhouse Software Kalyan Ramanathan, VP of Product Marketing, Sumo Logic
  • 3. Today’s Agenda • An overview of AWS and AWS Marketplace, with an emphasis on machine data analytics & security • The Greenhouse success story with AWS and Sumo Logic • Q&A/Discussion
  • 4. Learning Objectives 1. Understand the benefits of AWS-hosted machine data analytics services 2. Ensure data protection and security in the AWS cloud 3. Understand best practices for leveraging machine learning analysis to uncover real-time insights into application operations and security
  • 5. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Introduction to AWS Security
  • 6. Familiar Security Model Validated and driven by customers’ security experts Benefits all customers PEOPLE & PROCESS SYSTEM NETWORK PHYSICAL Security is Job Zero
  • 7. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Network Security Identity & Access Control Customer applications & content You get to define your controls IN the Cloud AWS takes care of the security OF the Cloud You AWS And You Share Responsibility for Security Inventory & Config Data Encryption
  • 8. Key AWS Certifications and Assurance Programs
  • 9. • You benefit from an environment built for the most security sensitive organizations • AWS manages 1800+ security controls so you don’t have to • You get to define the right security controls for your workload sensitivity • You always have full ownership and control of your data What This Means
  • 10. AWS Security Tools & Features Customer applications & content Oversight & Monitoring AWS and its partners offer over 700 security services, tools and features Mirror the familiar controls you deploy within your on-prem environments Network Security Identity & Access Control Inventory & Config Data Encryption
  • 11. Monitoring in the Cloud is different • Resources are elastic and ephemeral • Infrastructure can have tightly coupled interaction to events • Cost is now a concrete metric that can be tracked. • Changes can be tracked. • Access can be tracked.
  • 12. Full visibility of your AWS environment • CloudTrail will record access to API calls and save logs in your S3 buckets, no matter how those API calls were made Who did what and when and from where (IP address) • CloudTrail support for many AWS services and growing - includes EC2, EBS, VPC, RDS, IAM and RedShift • Easily Aggregate all log information Out of the box integration with log analysis tools from AWS partners including SumoLogic Monitoring: Get consistent visibility of logs
  • 13. Getting the most out of logging • Enable anything w/ audit or access log • Tamper proof (and fail proof) your log • Create and implement log lifecycle policies • Use meaningful naming. • Do something with them!
  • 14. Sumo Logic Confidential Sumo Logic + AWS • Sumo Logic is a secure, AWS-hosted machine data analytics service that delivers real-time insights from logs, metrics and event data across the entire application lifecycle and stack, helping customers build, run, and secure their modern (AWS) applications. • In addition, Sumo Logic supports SaaS Contracts on AWS Marketplace making it easy for customers to find, buy, and start using software and technical services that run on AWS with a single click.
  • 16. Sumo Logic Confidential Who is Greenhouse Software? ● Recruitment optimization platform delivered as SaaS ● From job application through onboarding companies run their entire hiring process on top of Greenhouse ● Founded in 2012, 200 employees, offices in NY and SF ● Nearly two thousand customers and growing Dave Anderson, Director of Security & IT, Greenhouse Software • Background in systems/network/security engineering • Long-time Sumo Logic customer
  • 17. Sumo Logic Confidential Greenhouse Infrastructure: Past and Present • Initially deployed on Heroku’s PaaS offering • Operated for a while in a hybrid Heroku + AWS environment to support services Heroku could not • Containerized most everything: – Already containerized at Heroku – Docker was natural choice – Mesos and Marathon for container orchestration – Moving to Kubernetes • All running on AWS: – EC2 – ELB and Autoscaling – RDS databases – Cloudtrail for auditing In the Past Present
  • 18. Sumo Logic Confidential Management Through Data • Logs everywhere • Initial log management was mostly manual – Mostly in-house solutions – Lots of greps/manual hunt-and-peck ELB VPC Flowlogs CloudTrail Containers Orchestration Apps
  • 19. Sumo Logic Confidential Issues with “un-consolidated” Log Management • Engineers must have good Unix/Linux skills. • Data is harder to access. • Getting context requires multiple iterations. • Correlation is manual. • Reporting and visualization requires separate tools. • Limited app visibility • Challenges in meeting KPI’s – Long MTTI/MTTR • Challenges in ensuring app security • Team productivity and focus issues Issues Impact
  • 20. Sumo Logic Confidential What did we want in an analytics solution? • Scales well – Future proof for Greenhouse growth • Fast time to value – Get up and running and show tangible value quickly – Support AWS services out of the box • Fully managed & secure – Don’t spend resources to manage “management” solution – Should come with right security certifications
  • 21. Sumo Logic Confidential Why Sumo Logic? • Easy to get started. – Hosted collectors and installed collectors – Full support for AWS with apps and dashboards • Very scalable solution. – High performance and redundancy – Zero upgrade costs • Security and compliance of platform. – SOC 2, ISO 27001, EU GDPR, PCI • Low TCO. – SaaS offering - no management required
  • 22. Sumo Logic Confidential Sumo Logic at Greenhouse 1. Proactive app performance management 2. Fast application troubleshooting 3. Proactively identify AWS infrastructure security 4. Ensure application security 5. Monitor AWS VPC network activity Key use cases that enable app performance and security
  • 23. Sumo Logic Confidential Sumo Logic at Greenhouse Use case 1: Proactive performance management • Identify performance issues before customers are affected
  • 24. Sumo Logic Confidential Sumo Logic at Greenhouse Use case 2: Resolve performance management quickly • Leverage Sumo Logic machine learning to identify outliers • Utilize features like LogCompare and LogReduce to focus on relevant events
  • 25. Sumo Logic Confidential Sumo Logic at Greenhouse Use case 3: Proactively manage AWS/infrastructure security • Monitor Cloudtrail security activity • Set alerts for known bad activity
  • 26. Sumo Logic Confidential Sumo Logic at Greenhouse Use case 4: Proactively manage application security • We have created searches and dashboards for common security events in our application
  • 27. Sumo Logic Confidential Sumo Logic at Greenhouse Use case 5: Monitor AWS resources • Monitor traffic in/out of our VPC • Identify busy network resources and bottlenecks • Unusual outliers are typically worth investigation
  • 28. Sumo Logic Confidential Sumo Logic Results: Impact on Greenhouse operations and productivity • Ease of use leads to faster issue resolution • Saved searches help new engineers • Dashboards provide useful visualizations • Alerts on unusual behavior • Self-healing automation based on log data 99.9% SLA MTTI/MTTR of minutes
  • 29. Sumo Logic Confidential What’s Next? Greenhouse, Sumo Logic + AWS • More security automation and dashboards • Integration with other tools – Slack for notifications • “Single pane of glass” for security – Feed data from other tools in to Sumologic to power security dashboards
  • 30. Sumo Logic Confidential What We Learned Best practices to succeed • Implement solutions that help you sleep better – Leverage experts and expert solutions – Don’t try to solve it all in-house – Don’t reinvent the wheel • Easy to get started with in-house solutions – But it is much more effort when it comes to bulletproofing it • Sumo Logic and AWS – Great services and solutions to solve your application analytics needs and more.
  • 31. Sumo Logic Confidential Sumo Logic Machine Data Analytics
  • 32. Sumo Logic Confidential 1200+ Customers 2-4x lifetime expand 1. 20 Million + Searches performed daily 100 PB + Data analyzed daily 300+ Trillion Records queried daily Tier-1 Investors Service Scale No limits Leading Machine Data Analytics Service
  • 33. Sumo Logic Confidential 33 Unified Machine Data Platform 1. Unified Machine Data Analytics Log, Metrics & Events Machine Learning Scalable & Elastic Modern Application Track End to End Performance Full Stack Visibility Real-Time Insights Fast troubleshooting and root-cause analysis
  • 34. Sumo Logic Confidential 34 Sumo Logic: How It Works Monitor Dashboard & Alert Troubleshoot Analyze & Correlate Optimize Trend & predict
  • 35. Sumo Logic Confidential Amazon CloudFront AWS Lambda Amazon Inspector AWS VPC Flow Amazon S3 AWS Elastic Load Balancing AWS CloudTrail AWS Config Native AWS Integrations
  • 36. Sumo Logic Confidential 36 Zero Management SaaS Service Only approach to manage volume + variety of machine data High TCO & Long TTV Limited flexibility & scalability Security as afterthought Legacy On Prem or Single-Tenant ZERO Deploy & Upgrade times Reduce Time to Value by 90% No Management Overhead Reduce TCO > 50% Fully Elastic On Demand Agility, Scale, Performance Always Available 4 Geos, 12AZs, 6 X Replication Superior Performance Guaranteed SLAs Secure by Design Industry’s Most Secure Platform Next Generation Multi-tenant SaaS “The unique combination of Sumo Logic’s SaaS architecture demonstrated that we would obtain the fast time-to-value & scalability”
  • 37. Sumo Logic Confidential Industry’s Most Secure Cloud-Native Analytics Service Fully Secure Protecting Customer Data with Best-in-Class Security • PCI/DSS 3.2 Service Provider Level 1 Certified • SOC 2 Type attestation • ISO 27001 certified • CSA Star certified • HIPAA-HITECH compliance • U.S. – EU Privacy Shield • AES 256-bit encryption at rest • TLS encryption in transit • FIPS 140-2 compliant
  • 38. Sumo Logic Confidential 38 Comprehensive app visibility Cloud Native Secure Architecture Machine learning for faster MTTI/MTTR Unified Logs & Metrics Data Why Sumo Logic? Available in AWS Marketplace
  • 39. • Buy on AWS Marketplace: – https://aws.amazon.com/marketplace/pp/B01N06ZS84 • Learn more about Sumo Logic on AWS: – https://www.sumologic.com/aws/ • Try AWS for free: – https://aws.amazon.com/ Next steps and further information

Editor's Notes

  1. <INTRO> Today we’re going to talk about how we think about security at AWS, and how we believe that your security posture actually improved by deploying workloads in AWS
  2. At AWS security is a top priority. We build our security program on many of the same tenets as you do. Our data centers are designed with the highest physical security requirements in mind, and access to those data centers is restricted to a very small number of individuals. In our data center we have very strict segregation of duties to ensure that out data center technicians have on the most minimal accesses they need to do their jobs. In the same way you do, we lock down our network and systems, and have well defined processes and people controls to make sure our data centers operate in an efficient and secure manner. Our security measures have been driven by security experts from across our largest, most advanced customers, including Shell, NASDAQ, and GE, and have been validated by a wide range of security experts and accreditation bodies. These organizations with very high security standards set the bar for AWS security, but the great thing about security in AWS is that everyone gets to benefit from the security controls that we have put in place. Whether you are a small startup, a mid sized enterprise, or the largest company you get to take advantage of the security controls that we have put in place to satisfy <IF THE CUSTOMER ASKS ABOUT SPECIFIC CONTROLS WE HAVE IN PLACE, DIRECT THEM TOWARDS OUR SECURITY WHITEPAPER, RISK AND COMPLIANCE WHITEPAPER AND SOC 2 REPORTS THAT WE CAN MAKE AVAIALABLE>
  3. At AWS we have a shared security model, where we are responsible for some aspects of security, whereas you get to choose other security measures you put in place. As AWS we are responsible for the security of the underlying infrastructure . That of course include physical security across our regions, our data centers, our availability zones, our edge locations. We are also responsible for the security of the foundation services that underpin the AWS environment. This includes the infrastructure that supports our compute, storage, database and networking services. As a customer, then, you have a choice of what security controls you choose to deploy to protect your virtual networks, servers, your data and what access control policies you wish to put in place. For highly sensitive content and applications you may want to put very stringent controls in place. For less sensitive applications, you may want to dial security back – you get to choose.
  4. We are also certified and accredited by a wide range of regulators and industry bodies. Here is a list of key bodies that have either certified us, or we have a workbook of guidance showing you how to validate an AWS environment against these standards. Top Row (left to right) ISO 27001 Information Security Management ISO 9001 Quality Management Systems Requirements American Institute of Certified Professional Accounts (SOC 1, SOC 2, SOC 3 reports) Payment Card Industry Data Security Standard (PCI-DSS) Federal Information Security Management Cloud Security Alliance Middle Row: TUV Trust IT – independent certification body for the German Federal Office for Information Security (BSI) IT Baseline protection methodology (IT Grundschutz) UK G-Cloud Digital Marketplace HIPAA (Health Information Portability and Accountability Act) Federal Information Processing Standards 140-2 Americans with Disabilities Act Section 508 Motion Pictures of America Association Bottom Row: US International Traffic in Arms Regulations Department of Defense Cloud Security Model Criminal Justice Information Systems (CJIS) Security Policy Federal Risk Authorization Management Program (FedRAMP) Australian Information Risk Assurance Program US Department of Education (FERPA) <FOR MORE IN DEPTH QUESTIONS REFER THE CUSTOMER TO http://aws.amazon.com/compliance FOR MORE DETAILS>
  5. What does this mean for you, the customer? First of all, no matter who you are, you get to benefit from all the controls we put in place for the largest, most security sensitive organizations in the world. You get this at no extra cost, you don’t have to do anything to get this – it’s just all part of the service Also, performing audits is a time consuming and expensive affair. We validate our environment against over 1800 security controls – we also get audited by third parties. If you want to see those controls and how we’re managing against them, we can make our SOC 2 report available to you under NDA. SOC 2 is a reporting standard of the American Institute of Certified Public Accountants, and is a widely recognized reporting standard. As we’ve said, you get to the flexibility to define what are the right set of security controls for your workload. More sensitive workloads will demand more stringent controls, less sensitive workloads will demand less. At the same time you remain in full control and have full ownership of your data. You decide where it goes, where it is stored, where it gets processed and how it gets transmitted.
  6. In addition to the security of our environment, we make a wide range of security tools and features available to you our customers. Depending on the security of the application or the content you choose to deploy, AWS and its partners offer over 700 tools and features to help you to meet your security objectives. These tools mirror the familiar controls you deploy within your on-premises environments. This means that you can deploy a wide range of security controls in your AWS environment without the capital outlay. Also, many AWS security features are free, and those you do pay for you only pay for exactly what you need, when you need it. This means you can do this at a much lower cost than similar controls in an on-premises environment. AWS provides security-specific tools and features across Network Security, Server Security, Access Control and Data Security. Also AWS provides oversight and monitoring tools so that you can detect problems quickly and remediate them before they impact the business.
  7. Because the cloud is on-demand resources are elastic and ephemeral This means that events can drive quantity and scale of deploy infrastructure for instance end user demand increases and the web tier is triggered to a a few more servers then demand wanes and the fleet shrinks back down. Cost is now a concrete metric that can be tracked. All changes can be tracked. All access can be tracked.
  8. We also have a number of tools for monitoring activity in the environment. CloudTrail is our service that logs all API calls, including console activities, command line instructions. It logs exactly who did what, when and from where. That means you have full visibility into and accesses, changes or activity within your AWS environment. You can save these logs into your S3 buckets, and the only cost to you is the cost of that storage. A growing number of AWS services are CloudTrail enabled including EC2, EBS, VPC IAM and RedShift. This means that you can easily aggregate logs and track activity If you already have a SIEM or log management solution, then a growing number of them support collecting CloudTrail logs. This includes Splunk, AlertLogic and SumoLogic
  9. Let’s start with a very general view of logging, and then we are going to focus in on some of the specifics Enable audit and access logging capabilities wherever available. There a lot of ways to log, and we’ll look at that in a few minutes; do put in the effort to make sure you are collecting all logs. When we talked to AWS security, they were understandably cagey, but one of the key questions they want to be able to answer: Am I logging everything? If not.. Leverage secure, durable storage for log files to ensure log files are not accidentally lost, stolen, or tampered with. Use S3, arch for 11 9s of avail & make sure you have the right access policies set on your log bucket. Access to modify (and in some cases to view) should be restricted to authorized personnel. Recommend MFA-delete for stronger security (CLI API only) Create and implement log lifecycle policies for storing, aggregating, analyzing, archiving, and deleting log data. Your lifecycle policy can take older logs and move them to something like Glacier or even delete the files at the right time. Leverage meaningful names to organize log data when consolidating logs into a single location. Apply your naming convention on the S3 buckets as well as enforcing your tagging policy. Analyze logs, create actionable reports, and configure appropriate alerting to get the most out of log data. A partner solution can be a huge help with this stage.
  10. Sumo Logic ensures performance and availability of AWS applications and infrastructure. It also improves security and compliance posture of AWS application and infrastructure. PRIMARY USE CASES: Ensure performance and availability of AWS application and infrastructure Real-time monitoring with a unified view of logs and time-series metrics (including custom metrics) Troubleshooting and root-cause analysis for quickly getting to the sources of the problem Advanced analytics based on machine learning with pattern, anomaly and outlier detection. Improve security and compliance posture of AWS application and infrastructure Continuously demonstrate compliance and shorten audit cycles Uncover security events faster using machine learning to correlate security data rather than pre-defined rules Improve the security of your cloud application data (i.e. Office365, Salesforce, Box)
  11. [BEFORE PRESENTING SUMO, ASK THE CUSTOMER – WHAT ARE YOUR IT PRIORITIES? WHAT ARE YOUR BIG CHALLENGES? WHAT KEEPS YOU UP AT NIGHT? AND TIE THIS TO THE SLIDES IN THE DECK] Who is Sumo Logic? We are a cloud native machine data analytics company and we help our customers manage the operation and security of their mission critical applications. What is machine data it includes logs, metrics and events that are generated by apps and infrastructure. Sumo knows to ingest this data, Sumo knows to get insights from this data and leveraging this data, customers can deliver great apps to the end customers
  12. Greenhouse is an applicant tracking system and recruiting software designed to optimize your entire recruiting process. Find better candidates, conduct more focused interviews, and make data-driven hiring decisions.
  13. Like many startups, when Greenhouse started we chose to host the application on Heroku. As the application and features grew there were components that just couldn’t be supported on Heroku at the time. Our next step was to host some of these supporting services in a VPC at AWS. We lived with that environment for a while but were running up against limitations around security and cost inherent to their platform at the time. Since Heroku’s platform was based on the concept of containers already, and Docker was growing in popularity, we decided to build out a secure multi-tier containerized environment on AWS. Our infrastructure is build on top of EC2 utilizing many of the built-in AWS tools like ELBs, AutoScaling, and RDS. In the end we were able to create a secure multi-tier VPC which not only provided us with better security but also greatly reduced costs. Docker and other containerization technologies present an interesting challenge of managing where your containers run as well as deploying new code. To solve this challenge you typically need to implement some sort of container management and orchestration platform. Today AWS has the EC2 container service which solves this problem without having to build out something like Apache Mesos or Kubernetes. Since ECS did not exist at the time we chose Apache Mesos and Marathon since they were the most mature solution available. We are currently in the process of moving to Kubernetes, the open-source project from Google, since it better fits with our workflow.
  14. One of the challenges you have with a agile dynamic infrastructure is keeping tabs on all of the data being produced. Applications and systems produce gigabytes of data in log files. AWS infrastructure produces logs from your ELBs as well as security auditing data from Cloudtrail and VPC Flow logs. Collecting and processing the log data is critical to successfully managing your application. Bugs and data issues are inevitable and having your log data in a centralized and easily searchable format is incredibly helpful. Prior to Sumologic our log data was spread across several systems. We had an in-house developed solution that was adequate for a couple of use cases but we were quickly outgrowing it. The log files were still in a format where we had to do greps and get creative with how we extracted and correlated the data from the log files.
  15. One of the major issues you run into when you’re using traditional log files on a unix or linux system is that your engineers who are looking at the log data need to understand how to use the different commandline tools like grep, sort, uniq, as well as a good grasp on regular expressions. Even with the best commandline skills the data is still harder to sift through just by the limitation of the tools. Drilling down or getting contextual information can be extremely difficult and slow since you often have to run the tools over the same log data multiple times to extract out each piece of information. Reporting and visualization of the data is also a challenge as you often have to massage the data into a format that another tool, often Excel, can understand.
  16. One of the major issues you run into when you’re using traditional log files on a unix or linux system is that your engineers who are looking at the log data need to understand how to use the different commandline tools like grep, sort, uniq, as well as a good grasp on regular expressions. Even with the best commandline skills the data is still harder to sift through just by the limitation of the tools. Drilling down or getting contextual information can be extremely difficult and slow since you often have to run the tools over the same log data multiple times to extract out each piece of information. Reporting and visualization of the data is also a challenge as you often have to massage the data into a format that another tool, often Excel, can understand.
  17. My path to bringing Sumo Logic to Greenhouse is somewhat unique. My first exposure to Sumo was while I was working as a systems engineer for another SaaS startup six years ago. We had a lot of the same challenges that Greenhouse does as far as the proliferation of log data. We were also in a more traditional colocated data center environment so collection and management of the log data was not as much of a challenge but we still had the same search, reporting, and visualization challenges. We were exploring solutions to better handle our log data and everything we saw on the market at the time was beyond our budget and would require us to purchase and manage more hardware in both our primary and DR sites. We became acquainted with Sumo logic through a VC event and very quickly became Sumo Logic’s first paying customer. Greenhouse having been born on the cloud made Sumo Logic a natural choice to replace the current system we had. Sumo Logic already had support for getting log data from Heroku and AWS which made getting started a breeze. With Sumo Logic being a managed cloud based solution we never have to worry about managing and scaling our own infrastructure to handle both our volume of log data as well as our access to that data. Security is a huge deal at Greenhouse since we handle a great deal of personally identifiable information and hiring data that our customers want to keep confidential. We have to take great care in any of the third party systems that we utilize since some of this information can end up in our log files. The security of the Sumo Logic platform was a huge consideration when we decided to start using it.
  18. Next I’ll go over some of the key use cases of Sumologic here at Greenhouse and some of the performance and security metrics we monitor .
  19. Our log data is allows us to create a lot of different graphs and dashboards as well as generate alerts when certain conditions exist. Our platform is under constant development and we do several deploys a day. Even with our manual and automated testing sometimes performance related bugs slip through. While we use NewRelic for up to the minute directly instrumented performance management sometimes there are wider trends that make more sense to use log data to observe. There are also failovers of clustered server components that are most easily alerted to us through saved searches. Most of the time these are simply informational messages so we’re aware something happened but also help us quickly jump in to troubleshoot if something looks off.
  20. Using machine learning functionality lets us identify performance outliers quickly so we can quickly drill into performance issues Using LogCompare and LogReduce we’re able separate similar repetitive events so we can focus on what is truly relevant.
  21. We track a lot of security related metrics both in our logs as well as from AWS cloudtrail which gives us the ability to send off alerts for unusual or known bad activity. For example we have back-end applications that are used to administer the Greenhouse applications and we alert when we see logins from unusual places. To date these have just been employees working while traveling, but all warrant verification to be able to quickly respond to a compromised account. We also want to keep track of changes to things like security groups and policy violations so that we’re ensuring that our security posture doesn’t degrade over time.
  22. Controlling access to sensitive customer data is extremely important to us. We’re using Sumologic to track various metrics that matter to us around the activity of our customer success team as well as logins into sensitive applications from unusual places.
  23. VPC Flow logs give you insight into the traffic in and out of your VPC. Using flow logs you can identify hot resources, network layer attacks, as well as instances or applications that may be behaving badly.
  24. Learning the basics of searching for data in Sumo is pretty easy and there is a good amount of documentation as well as resources from the community. Over time our engineers have created saved searches and dashboards which enable us to get at relevant data faster than we ever could with manual solutions. We have also implemented alerts for suspicious behavior like logins to our backend administrative application, unusual AWS usage as reported by Cloudtrail, and even logins to Sumo logic itself. We also have self-healing automation in place to restart individual services if they get into a known bad state, which prevents our customers from ever noticing an issue.
  25. Some of the things we’re working on next are adding a lot more around security automation. We have other security tools that monitor various bits of the system and AWS activity. Given the abilities of Sumo Logic to provide dashboards, alerts, and event correlation we are envisioning that we can aggregate alerts and other interesting data into Sumo Logic dashboards by pulling data from our other security tools. Aggregating the data from all of these separate tools would bring us closer to that elusive single pane of glass that is often overpromised yet under delivers.
  26. [BEFORE PRESENTING SUMO, ASK THE CUSTOMER – WHAT ARE YOUR IT PRIORITIES? WHAT ARE YOUR BIG CHALLENGES? WHAT KEEPS YOU UP AT NIGHT? AND TIE THIS TO THE SLIDES IN THE DECK] Who is Sumo Logic? We are a cloud native machine data analytics company and we help our customers manage the operation and security of their mission critical applications. What is machine data it includes logs, metrics and events that are generated by apps and infrastructure. Sumo knows to ingest this data, Sumo knows to get insights from this data and leveraging this data, customers can deliver great apps to the end customers
  27. We have 1,200+ Enterprise Customers – and great brands at that We provide fast value to our customers. AirBnB is a great example where the customer started out managing their app security with us and soon deployed it to many of their mission critical applications [USE YOUR FAVORITE EXAMPLE CUSTOMER STORIES TO HIGHLIGHT OUR CUSTOMER VALUE] We have built a very scalable platform In one day Sumo Logic ingested over 100 TB data and users query/analyze across 300+ trillion records We are funded by Tier 1 investors who find and fund big ideas. And we are happy to have them support us
  28. There is a better way to manage your applications - and that is with a unified machine data analytics platform Your apps and infrastructure already generate lots of machine data (logs, metrics, events) If you can ingest this data and analyze this data (i.e correlate it, identify patterns in this data, be able to visualize and dashboard it), you can get lots of visibility into The full stack – from the app – infrastructure to the services The performance and availability of the application and infrastructure including proactively identifying issues Be able to manage the security of the application. Lastly, the platform should also be able to real-time data streams across all the dependent applications and infrastructures, and make sense of the volume of data collect, variety of the data, and variety of the data to provide real-time analytics to solve the problems that arise with this new architecture.
  29. How does Sumo Logic work? Sumo Logic offers a Cloud native SaaS service – so we manage the service for you. Sumo Logic offers locally deployed Collectors or Cloud API to ingest the machine data from apps and infrastructure. Once ingested, Sumpo logic will index the data and you can instantly start to query and analyze the data You can setup alerts which will instantly inform you when your thresholds have been breached. You can also create dashboards and reports and share it with your team.
  30. And in addition to what is on the other slide, here are the all the AWS apps we have……
  31. Why should you consider a Cloud-native SaaS service. The alternative is a on-prem or single instance model. Where you manage the analytics service. You are now responsible for Setting up the service Optimizing and scaling the service Upgrading the service And this is very cost and resource intensive (and also has long time to value) Sumo logic service is completely SaaS based. We manage the service for you – install, upgrade, optimization etc. Its available in many AWS zones And we have built in security from the get-go – so that you don’t have to worry about it.
  32. Speaker’s Notes: Sumo provides the most secure cloud-based analytics service on the market Only Sumo has achieved this level of validation and certification Key messages: Sumo takes data security VERY seriously Enterprise-grade security was built into Sumo’s architecture from the beginning None of our competitors provide the same level of security or attestations You can trust Sumo with your data Discovery Questions: In your current log management process, how concerned are you about the security of your data? What steps do you take to ensure it’s protected? What compliance and audit standards do you have? Who would need to be involved reviewing and validating Sumo’s approach to security and compliance?
  33. MORE INFORMATION?