SYS-CON MEDIA Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, William Schmarzo, Dana Gardner

News Feed Item

Optiv Security Furthers Rationalization and Optimization Strategy with Launch of Secure Data Reference Architecture

(from booth #1109 at RSA Conference 2018) Optiv Security, the world’s leading security solutions integrator, today announced “[email protected],” a reference architecture that provides a unique programmatic approach and expertise for rapid deployment of a secure data lake. [email protected] considers many factors, tradeoffs and design considerations, and helps clients make appropriate technology selection, and design and implementation decisions while balancing risk mitigation with desired business outcomes. It harnesses vast amounts of data from security infrastructure, intelligence feeds and other sources, and then runs purpose-built analytics for any number of security functions, including:

  • Situational awareness dashboards
  • Incident detection and response
  • Enhanced vulnerability scanning
  • Compliance
  • E-Discovery
  • Fraud detection
  • Ad hoc queries to answer virtually any security question

“Everyone is talking about orchestration and automation across the security space, and this is an example where Optiv is delivering it in a way that rationalizes and operationalizes data in furtherance of the security mission,” said Stu Solomon, Optiv chief technology and strategy officer. “We believe reference architectures are a key requirement for solving complex problems, such as cyber security data infrastructure. Otherwise, these projects are likely to fail due to the costs and manpower consumed by a ‘trial and error’ approach to secure data as well as generally not being informed by an ecosystem-based approach to planning and architecture decisions. [email protected] delivers the right technology and services in a highly manageable and flexible solution package. It enables organizations to align their security programs to enterprise business strategies, operational needs and risk profiles rather than constantly reacting to the latest threat. We are proud to bring [email protected] to market and to provide organizations with an efficient way to add the smarts to their security operations.”

[email protected] is based on system design and vendor components that have been proven in multiple client environments. This dramatically speeds the process of deploying the solution because it eliminates many of the vendor-evaluation and “trial and error” steps typically associated with data-related security projects.

For example, a large healthcare provider partnered with Optiv to build and deploy a secure data lake with goals to retain more than a year’s worth of online data, support a large number of concurrent users, and provide future scalability and extensibility. Optiv developed and implemented a comprehensive secure data solution tailored to the client’s needs through identification of common use case patterns. Optiv’s solution lowered the barrier to entry by providing open source software proof of concept, augmented in-house data scientists/analytic developers, and deployed hundreds of nodes, fully configured, in minutes. The partnership produced competitive advantage for this client, decreasing incident response time from an average of two to four hours to 12 minutes, and providing average monthly savings of $100,000 - $400,000 as a result of simplified fraud detection analytics.

Historically, enterprises have used commercial Security Incident and Event Management (SIEM) platforms to aggregate, analyze and correlate security data. SIEMs have proven to be critical technologies for the initial view of security data streams, however there are limitations on the degree that organizations have been able to operationalize the technology for triaging true positive security events. With the proliferation of data, cyber security programs have massively grown in response, leading organizations to require technologies purpose-built for efficient data management. [email protected] allows organizations to gain new and incremental value from their SIEMs, while also solving their security data management and analysis challenges.

[email protected] currently includes technologies from Elastic, Splunk, Phantom Cyber and StreamSets along with other open source and big data infrastructure platforms, coupled with Optiv’s decision engineering services, acquired with Decision Lab late last year. Together, these deliver a preconfigured solution for a security-specific data lake that delivers benefits including:

  • Nimble, evidence-based decision-making: Clients can easily extract value from diverse data sets by enriching and normalizing data points in a readily consumable manner. This enables them to answer their toughest questions and make operational decisions based on evidence, rather than “best guesses.”
  • Risk mitigation: [email protected] dramatically reduces errors in data analysis that are common in traditional analytics solutions and manual processes. This helps organizations more accurately identify threats and vulnerabilities, and more efficiently deploy staff.
  • Cost reduction: As a reference architecture, [email protected] reduces costs by enabling clients to avoid vendor lock-in and, because it is built on modular solutions, it can easily be tailored for specific client use-cases. Additionally, because it is a solution that has been successfully deployed in other environments, it eliminates the costs associated with “trial and error” failures.
  • Fast time-to-value: [email protected] can be deployed in hours or days, compared to the weeks or months required with other approaches.

To learn more about [email protected], visit our website or send an email to [email protected].

Follow Optiv
Twitter: www.twitter.com/optiv
LinkedIn: www.linkedin.com/company/optiv-inc
Facebook: www.facebook.com/optivinc
YouTube: https://www.youtube.com/c/OptivInc
Blog: www.optiv.com/resources/blog
Newsletter: www.optiv.com/optiv-advisor

About Optiv Security
Optiv helps clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350 of the leading security technology manufacturers. For more information, visit www.optiv.com.

Individual results may vary.  Performance may vary depending on client’s technical environment, data needs and other factors.  No computer system can be absolutely secure. 

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offer...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
The current environment of Continuous Disruption requires companies to transform how they work and how they engineer their products. Transformations are notoriously hard to execute, yet many companies have succeeded. What can we learn from them? Can we produce a blueprint for a transformation? This presentation will cover several distinct approaches that companies take to achieve transformation. Each approach utilizes different levers and comes with its own advantages, tradeoffs, costs, risks, a...