How to Use Splunk To Detect and Defeat Fraud, TheK And Abuse

Size: px
Start display at page:

Download "How to Use Splunk To Detect and Defeat Fraud, TheK And Abuse"

Transcription

1 Copyright 2015 Splunk Inc. How to Use Splunk To Detect and Defeat Fraud, TheK And Abuse Joe Goldberg Product Splunk Young Cho Technical Product Splunk

2 Disclaimer During the course of this we may make forward looking statements regarding future events or the expected performance of the company. We you that such statements reflect our current and based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this are being made as of and date of its live If reviewed aker its live this may not contain current or accurate We do not assume any to update any forward looking statements we may make. In any about our roadmap outlines our general product and is subject to change at without It is for purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no either to develop the features or described or to include any such feature or in a future release. 2

3 Personal Joe Goldberg 3.5 years at Splunk Product for fraud/thek/abuse. Also security and compliance Previously Symantec Data Loss (Vontu) Young Cho 2 years at Splunk Technical Product Marke@ng for an@- fraud/thek/abuse. Also security and compliance. Formerly Solu@ons Architect in APAC for 1.5 years Previously Splunk Partner in APAC, MOS 3

4 Agenda Splunk for Fraud, TheK, & Abuse Detailed bank fraud use case Demo permi`ng) 4

5 Splunk for Fraud, TheK, Abuse ( Fraud )

6 Why You Should Care: Fraud is Costly - Associa'on of Cer'fied Fraud Examiners High annual costs & growing: Merchants $ billion; banks and financial ins@tu@ons $12-15 billion 1 Reputa@on/brand damage Labor costs from manual inves@ga@ons and review 1. Forrester Feb

7 Business Moving Online Has Increased Fraud Data breaches Lead to downstream thek and credit card fraud No boundaries Fraudsters are able to act from away with impunity Creden2al the4 Account takeovers are easier due to phishing and malware More sophis2ca2on Fraudsters use new and change behavior to evade 7

8 Machine Data Contains Fraud Insights Sources Card Payment System [ ] proc_source="b24a", tmst_target=" ", serv_id="iss", proc_input="mast", proc_target="b24h", Card interface_acq="bnet_1", ID Amount interface_iss="02008", cod_msg="1110", oper_rrn=" ", card_id="526430vs350y2992", oper_amount=" ", oper_ currency="978", Merchant oper_country="380", ID term_id=" ", circuito="", seu_merc="4722", bin_acq="002111", id_merc=" ", prcode="003000", approval_code ="H8H766", oper_ mod_input="1", channel="o", flag_dupl="y", flag_onus="n", Client ID auth_rout_dst="intfhi93", auth_ rout_id="hiso_auth", msg_subst="", ndg=" ", BNET- MI1", acceptor = TRAWEL SPA\\MILANO\ 380", tmst_ins=" ", lpar="b" Web Proxy :21: TCP_HIT OBSERVED GET HTTP/1.1 0 "Mozilla/4.0 (compa@ble; MSIE 6.0; Windows NT 5.1; SV1;.NET CLR ; InfoPath.1; MS- Source IP RTC LM 8;.NET CLR ;.NET CLR ; ) User John Doe," Referring URL Authen2ca2on Cap@on=ACME- 2975EB\JohnDoe Descrip@on=User account Built- in account for administering the computer/domaindo\n=acme- 2975EB InstallDate=NULLLocalAccount = IP: TrueName=Administrator SID =S User Name 500SIDType=1 Source IP Status=Degradedwmi_ type=useraccounts 8

9 Example Pauerns of Fraud in Machine Data There are Hundreds of Pa9erns of Internal/External Fraud! Industry Financial Services Healthcare E- tailing Telecoms Online Type of Fraud Account takeover Physician billing Account takeover Roaming abuse Student loan fraud 9 PaAern of fraud High velocity of transac@ons under $10k Physician billing for drugs outside their exper@se area Many accounts accessed from one IP or user agent string Unlimited use customers doing excessive roaming on partner networks Student IP in high- risk country and student absent from classes & assignments

10 Splunk: Machine Data Plaworm for Fraud Use Cases Machine Data: Any Loca2on, Type, Volume Answer Any Ques2on On- Premises Private Cloud Public Cloud Mobile Servers Storage Online Shopping Cart Online Services Smartphones and Devices Malware Desktops Badge records GPS Web server Networks Call Detail Records Fraud tools Packaged Messaging Databases/ Payment Systems Custom Ad hoc search Monitor and alert Asset Info Report and analyze External Lookups Employee Info Threat feeds Custom dashboards Data stores Developer PlaJorm 10

11 Supports Many Needs of Fraud Teams Fraud Monitoring and Fraud Fraud and Enhance Fraud Tools

12 Why Splunk for Fraud Exis,ng Fraud Tools Splunk for Fraud RIGID AND INFLEXIBLE FLEXIBLE NARROW VIEW OF FRAUD BROAD VIEW SCALE AND SPEED ISSUES DIFFICULT TO DEPLOY; LIMITED ROI SCALE & SPEED FAST VALUE; COMPELLING ROI 1

13 Splunk For Fraud Across Financial Services Mobile/Telecom ecommerce Health Care Online Educa2on Government 1 3

14 Leading Online Retailer Challenge: Fraud were too slow with no unified logging took 12 hours using 10 resources 90 minutes from alert to Enter Splunk: Big data, flexible plaworm to accelerate Sample pauerns of fraud Splunk looks for: ê One referrer string or IP logging into user accounts ê One referrer string or IP many new accounts to get account opening OR opening new account to fast to be human ê Single IP excessively the I forgot my password op@on for several accounts ê User traffic coming from rent a VM, cloud- based services ê Brute force password guessing ê Customer info that should be stable changing oken: /physical address, payment card, etc Splunk unites all context around possible fraud on single dashboard Splunk adds together point fraud tool scores to give a consolidated transac@on score Many fraud visualiza@ons, including geo- IP mapping Inves@ga@on takes 0.2 hours using 2 resources Under 10 minutes from alert to inves@ga@on Use Splunk for fraud, security, compliance, IT Ops, and App Mgmt 14

15 Top 5 Online University Challenge: Needed solu@on to detect fraudulent student loans Difficult to iden@fy fraudulent loans and auendance ac@vity Enter Splunk: Significant cost savings in reduced loan fraud Cross- check students with loans against classroom ac@vity to iden@fy fraudsters Stopped $10s of millions of fraudulent funds from distribu@on Reputa@on and Dept of Educa@on accredita@on maintained Single tool for fraud, compliance, cybersecurity, IT Opera@ons, and Classroom Ops 15

16 Bank Fraud Use Case

17 Successful Tier 1 Bank Real- Time Wire Blocking Reference Based a Korean financial news in 2014 : (Money Today ) On the 16 th of December 2014, financial community revealed that Hana Bank 1 bank in Korea) overall bank s fraud detec2on rate has risen to 71.7%. It means that Hana Bank were able to block 70% above all bank s fraudulent transac@ons. Hana Bank has deployed next genera@on fraud detec@on last October AKer they deployed the next genera@on fraud detec@on plaworm, there were significant increase of fraud detec@on rate, originally from 24.8% in January of AKer Hana Bank started deploying the FDS, their fraud detec@on rate immediately increase to 66.8, star@ng from last September.

18 Sorted by the size of asset Top Korean Tier 1 Banks, Splunk Based FDS Adop@on Splunk Based Real-time Fraud Adoption Status 1 W Finance Holdings Splunk based FDS 2 S Financial Group Not Decided 3 H Financial Group Splunk based FDS 4 K Financial Group Local Compe@tor 5 I Bank Splunk based FDS 6 K Bank Local Compe@tor 7 E Bank Splunk based FDS 8 S Bank Splunk based FDS Out of eight tier 1 banks, five banks (63%) have selected Splunk as real-time fraud detection platform, including the largest bank in Korea.

19 High Impact Customer Values Created Various Major Financial Institutions Rate of 1 Bank Asset Blocked Amount Incident Financial Credibility Long term Biz Impact 71% 24% $X0,000 Daily Fast Effec@ve J Sa@sfac@on Rapid Increase Turning all financial transac@ons to cri@cal Intelligence

20 Finance Service Industry Needs > What are some of the technical challenges in managing data? Ability to process transactions in " real-time for detection of fraud Ability to process large volumes of transactional data for long period of time. Ability to analyze complex patterns " of transactions and be able to profile user objects

21 MISSION : Advanced fraud detection platform that COLLECT / PROCESS / ANALYZE Financial transactions in real-time Sensitive Data High Entrance Barrier Mission Critical Real-time Impact

22 The Jargon Channels Tier 1 banks offer many different channels to access their services: BANKING SERVICE CHANNELS ATMs Tellers Online Banking Core Service Plaworm BUS Banking Plaworm Service Telephone Banking Mobile Banking Highest Value Servers / OS Applica@on / Database Network Security

23 Splunk For Core Financial ATMs Tellers Online Banking Telephone Banking Mobile Banking Core Service Platform BUS (Message Queue) IBM MQ / Oracle Weblogic / Core Database Each transac@ons as separate files in AIX server file system 200 G Daily Volume Real- 2me collec2on of core banking transac@ons 32,000+ Types of different transac@on formats

24 Why Is This Such A Big Deal? Reason 1 Tradi@onal 6~12 Hour Batch Collec@on Limited Amount Data Processed Core Banking System Batch Data Collec@on System Processing RDBMS Data Analysis System Splunk Core Banking System Real@me Data Collec@on Data Collec@on Ability Process big data (200G + per day) Big Data Plaworm High Performance Complying customer s 30 seconds fraud detec@on and blocking requirement

25 Why Is This Such A Big Deal? Reason 2 Ability to process 32,000 types of different transac@on types 32,000 Types of different transac@ons RDBMS RDMBS Can t model 32,000 types of different formats Because of that, can t " query/ search 32,000 Types of different transac@ons As a No-SQL database process all 32,000 types Able to search all data based on value-pairs matching

26 How Do Look Like? Format example Bank Code Branch Code Service Code Ac@on Code Account Code Validate Code Format example 2 Change Position New Bank Code Service Code Sub Ac@on Code Branch Code Ac@on Code Account Code v 32,000 types of these formats

27 New Breed Of Bank Robbers Today s bank robbers know you more than you know yourself. Your Human Network Your Bank Info Your Personal Info Your Card Info Your Bank Login Your Financials Your Computer

28 Banking Fraud Example : Phase 1 Internet Bank Network Internet Banking Customer Channels Mul@ Channel Applica@on Customer Account Transac@on Flows Internet Banking Normal Transfer 1 Hacking / Phishing / Pharming Customer PC Teller ATM Normal Transfer 2 Issue a new Cer@ficate Acquire accounts info Phone Banking Mobile Banking With in 60 Sec Fraudulent Transfer 1 Fraudulent Transfer 2 Hacker

29 Of Financial Fraud And Abuse Fast Knows what to do, fast transfers to a temporary accounts Intelligent Highly technical, access the target accounts with proper creden@als and cer@ficates Structured Works as in teams for different roles

30 Banking Fraud Example : Phase 2 Exposed Customer Bank Accounts Bank Network Hacker Target Intermediate Account ATM Hacker ATM Account Cancella@on

31 How Can Fraud Be Stopped? Internet Banking Customer Channel Multi Channel Application Commit Bank Service Plaworm Customer Account Transaction Status Access Terminal ALLOW TRANSFER ATM Customer Allow STOP TRANSFER ATM Suspicious Transaction FRAUD DETECTION PLATFORM Risk Management (Automated / Manual )

32 Success Factor : Real-time MCA Server Forwarder Splunk Cluster Pre Processing Server Uncooked Data Profile DB Internet Banking Service Plaworm Results Forwarder Search Head LBF Real-time collec@on of raw data send for pre processing Splunk Inc. Turning banking format data into Key Value format (Cust Mod) Processing Structure Splunk Cluster Processing of ingests Key marts and Value format applying data into complex Fraud Indexers Rules Results of Fraud detec@on results send over to Internet banking server The fraudsters are warned with warning and aborts wire transfer

33 How Does Splunk Make It Possible? Online Banking Customer Account Normal Transfer 1 > Fraudulent PaAerns / Condi2ons Combo Normal Transfer Issue a new Cer@ficate Acquire accounts info Fraudulent Transfer 1 Hacker Fraudulent Transfer 2 Different Channel Different MAC Address with no prior history Issue a new cer@ficate Target wire account with no prior history Create new cert and wire transfer happens in 5 minutes Index=mul@_access check_hist_mac mac check_hist_wire target_account FRAUD DETECTION PLATFORM Splunk Inc. Transac@ons Account history Summary MAC history Summary Wire history Summary

34 Concept of Profiling Extrapolation of information about something, based on known qualities. Request Committed Wire Request / Ac@on Good Customer Laura Compare the transactions with previous trending Update the transactions so the profile is updated to reflect as new behavior Profiling Database Splunk Inc.

35 Concept of Entity Profiling Purpose Profiling Database Baseline customer behaviors Design analysis model CUST_ID : Laura DEVICE : xx:xx:xx:01 xx:xx:xx:03 IP ADDR : TARGET ACCT : HB HB Other user specific profiling info. Normal Transfer 1 : Target ACCT HB Good Customer Laura Splunk Inc. Normal Transfer 2 : Target ACCT HB The target account exists already in profiling DB

36 Concept of Entity Profiling Purpose Profiling Database Baseline customer behaviors Design analysis model CUST_ID : Laura DEVICE : xx:xx:xx:01 xx:xx:xx:03 IP ADDR : TARGET ACCT : HB HB Other user specific profiling info. Normal Transfer 1 : Target ACCT HB Fraudster Splunk Inc. Normal Transfer 2 : Target ACCT HB Fraudulent Transfer 3 : Target ACCT AB239242? Since this is a unknown account, is this legi@mate?

37 Detecting Based on Profiled Info: Profiling Search Profiling Database Search Data CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:( (( ( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Insert / Update new profiling attributes Search 1 : Profiling Search!!!CUST_ID(:(Laura(!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!xx:xx:xx:03! DEVICE(:(xx:xx:xx:01( IP(ADDR(:( (!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ! TARGET(ACCT(:(!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!HB726383!!!..(Other(user(specific(profiling(info(.( CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01( IP(ADDR(:( ( TARGET(ACCT(:(..(Other(user(specific(profiling(info(.( Create New Customer Profile (Scheduled -2m@m ~ -1m@m) Create new customer profiles Update atributes of profiles based on analysis criteria Splunk Inc.

38 Detecting Based on Profiled Info: Detecting Search Profiling Database Realtime Data CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:( (( ( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Lookup / Join Profiled Data CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:( (( ( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Match rule alerts With profile DB CUST_ID(:(Laura( DEVICE(:(xx:xx:xx:01(xx:xx:xx:3( IP(ADDR(:( (( ( TARGET(ACCT(:((HB092831((HB726383(..(More(user(specific(profiling(info(.( Kick off an event / send signal to banking system Wire Fraud Alert Search 2 : Pattern Detection Search (Real-time RT) Real-time searching, Joining lookups and other verification Match the status in profile DB for condition verification Splunk Inc.

39 Processing Logic Machine Learning (Anomaly Fraudulent Pauern Normal Pauern Fraudulent Pauern

40 Importance Of Being Data Store Enterprise Big Data, Intelligence Fraud Money Laundry Internal/ External Compliance FSI Big Data

41 Why is This So Significant? These transaction data is at the heart of all financial service analysis FDS Fraud Detection System Government Regulations Big Data Target Marketing IT OPS Business Analytics Security Expects various financial service Future Data Projects

42 Synergy Factors of Splunk (To Joe) Near Realtime CEP Real-time Collection > Storage > Query Big Data Platform Storing and Summarization of BIG DATA Analysis / Integrations Analyze, Visualize and extend to Service Integrated Real-time Fraud Detection/ Prevention Platform

43 Demo

44 Take- Aways Pauerns of fraud are in machine data Splunk can harness machine data to detect, and report on a wide range of fraud Splunk can address the more demanding and technical fraud use cases (financial services, etc) 44

45 What Now? Go the Compliance & Fraud booth at the App Showcase Other sessions: Exposing Fraud and Risk for Health Agencies, Tues, 3-3:45 Orrstown Bank, Tues, 5-5:45 From Zero to Preuy Robust Fraud Tool, Wed, 10-10:45 Bank Account Takeover and Fraud Auacks with Splunk, Wed, 2-2:45 Info, case study at: Ø Splunk.com > > Security & Fraud > Fraud Contact sales team at Splunk.com > Contact Us 45

46 46

47 THANK YOU

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9 Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may

More information

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements

More information

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton

More information

Incident Response Using Splunk for State and Local Governments

Incident Response Using Splunk for State and Local Governments Copyright 2013 Splunk Inc. Incident Response Using Splunk for State and Local Governments Bert Hayes Solu=ons Engineer [email protected] #splunkconf Legal No=ces During the course of this presenta=on, we

More information

Splunk for Networking and SDN

Splunk for Networking and SDN Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking

More information

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

Real World Big Data Architecture - Splunk, Hadoop, RDBMS

Real World Big Data Architecture - Splunk, Hadoop, RDBMS Copyright 2015 Splunk Inc. Real World Big Data Architecture - Splunk, Hadoop, RDBMS Raanan Dagan, Big Data Specialist, Splunk Disclaimer During the course of this presentagon, we may make forward looking

More information

Leveraging Machine Data to Deliver New Insights for Business Analytics

Leveraging Machine Data to Deliver New Insights for Business Analytics Copyright 2015 Splunk Inc. Leveraging Machine Data to Deliver New Insights for Business Analytics Rahul Deshmukh Director, Solutions Marketing Jason Fedota Regional Sales Manager Safe Harbor Statement

More information

BENCHMARKING V ISUALIZATION TOOL

BENCHMARKING V ISUALIZATION TOOL Copyright 2014 Splunk Inc. BENCHMARKING V ISUALIZATION TOOL J. Green Computer Scien

More information

Architec;ng Splunk for High Availability and Disaster Recovery

Architec;ng Splunk for High Availability and Disaster Recovery Copyright 2014 Splunk Inc. Architec;ng Splunk for High Availability and Disaster Recovery Dritan Bi;ncka BD Solu;on Architecture Disclaimer During the course of this presenta;on, we may make forward- looking

More information

Email/Endpoint Security and More Rondi Jamison

Email/Endpoint Security and More Rondi Jamison Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on

More information

Splunk: Using Big Data for Cybersecurity

Splunk: Using Big Data for Cybersecurity Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals

More information

Solving today's integra@on challenges with Oracle SOA Suite, and Oracle Coherence

Solving today's integra@on challenges with Oracle SOA Suite, and Oracle Coherence Solving today's integra@on challenges with Oracle SOA Suite, and Oracle Coherence Asaf Lev Sales Consul@ng [email protected] Agenda Industry Trends Oracle SOA Suite Oracle Coherence Oracle Service Bus

More information

Pu?ng B2B Research to the Legal Test

Pu?ng B2B Research to the Legal Test With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the

More information

Telemetry: The Customer Experience

Telemetry: The Customer Experience Copyright 2014 Splunk Inc. Telemetry: The Customer Experience Simon Warrington Senior Program Manager, Microso@ Disclaimer During the course of this presentagon, we may make forward- looking statements

More information

Splunk and Big Data for Insider Threats

Splunk and Big Data for Insider Threats Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco

More information

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer. THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

UNIFIED, END- TO- END EDISCOVERY

UNIFIED, END- TO- END EDISCOVERY ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin

More information

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD

More information

ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World

ORION Retail Systems. Orion Digital Integration Inc. Point of Sale Reinvented for a Mobile World ORION Retail Systems Orion Digital Integration Inc Point of Sale Reinvented for a Mobile World O Orion Retail Systems ORION Digital Integraon Inc. - Corporate Profile Established in 2003, Orion Digital

More information

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas

More information

Big Data Unlock the mystery and see what the future holds. Philip Sow SE Manager, SEA

Big Data Unlock the mystery and see what the future holds. Philip Sow SE Manager, SEA Big Data Unlock the mystery and see what the future holds Philip Sow SE Manager, SEA THE ERA OF BIG DATA Big Data Market: Reach $32.1 Billion in 2015 & to $54.4 billion by 2017 The 3 + 1 Vs Structure/Semi/Unstructured

More information

Fixed Scope Offering (FSO) for Oracle SRM

Fixed Scope Offering (FSO) for Oracle SRM Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,

More information

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on

More information

Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager

Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager Oracle WebLogic J2EE on VMware Monitoring 203 Blue Medora LLC All rights reserved WebLogic on VMware Management

More information

Website Design. A Crash Course. Monique Sherre, [email protected]

Website Design. A Crash Course. Monique Sherre, monique@boxcarmarke4ng.com Website Design A Crash Course Monique Sherre, [email protected] When & Why Do We Re- Design no mobile BoxcarMarke6ng.com aesthe6c update Raincoast.com legacy CMS ABCBookWorld.com new company,

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

BIG DATA FOR SECURITY: HOW CAN I PUT BIG DATA TO WORK FOR ME? Joe Goldberg. Splunk. Session ID: HT-T08 Session Classification: Intermediate

BIG DATA FOR SECURITY: HOW CAN I PUT BIG DATA TO WORK FOR ME? Joe Goldberg. Splunk. Session ID: HT-T08 Session Classification: Intermediate BIG DATA FOR SECURITY: HOW CAN I PUT BIG DATA TO WORK FOR ME? Joe Goldberg Splunk Session ID: HT-T08 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist and

More information

Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering

Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering Cloudian The Storage Evolution to the Cloud.. Cloudian Inc. Pre Sales Engineering Agenda Industry Trends Cloud Storage Evolu4on of Storage Architectures Storage Connec4vity redefined S3 Cloud Storage Use

More information

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless

More information

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment

More information

The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons

The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014 A growing demand Business Teams want Open access to more informa4on More

More information

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist

More information

Overview of SOTI. www.so%.net

Overview of SOTI. www.so%.net Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves

More information

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc. 2011 2014. All Rights Reserved

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc. 2011 2014. All Rights Reserved Hortonworks & SAS Analytics everywhere. Page 1 A change in focus. A shift in Advertising From mass branding A shift in Financial Services From Educated Investing A shift in Healthcare From mass treatment

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty Offensive & Defensive & Forensic Techniques for Determining Web User Iden

More information

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply

More information

Unified Monitoring with AppDynamics

Unified Monitoring with AppDynamics Unified Monitoring with AppDynamics Dus$n Whi*le @AppDynamics 52% of Fortune 500 firms since 2000 are gone Application complexity is exploding Agile SOA Login Flight Status Search Flight Purchase Mobile

More information

Developing a successful Big Data strategy. Using Big Data to improve business outcomes

Developing a successful Big Data strategy. Using Big Data to improve business outcomes Developing a successful Big Data strategy Using Big Data to improve business outcomes Splunk Company Overview Copyright 2013 Splunk Inc. Company (NASDAQ: SPLK) Business Model / Products Customers (6000+)

More information

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory. Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network

More information

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data Patrick Gardner VP Engineering Sourabh Satish Distinguished Engineer Symantec Vision 2014 - Big Data

More information

Splunk Enterprise in the Cloud Vision and Roadmap

Splunk Enterprise in the Cloud Vision and Roadmap Copyright 2013 Splunk Inc. Splunk Enterprise in the Cloud Vision and Roadmap Alex Munk PM Cloud #splunkconf Ledio Ago Director of Engineering Cloud Legal NoJces During the course of this presentajon, we

More information

Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use

Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use Copyright 2014 Splunk Inc. Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use Ant Lefebvre [email protected] Senior Systems Engineer Middlesex Hospital About Middlesex Hospital Complete range

More information

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?

More information

Payments Cards and Mobile Consul3ng Overview 2013

Payments Cards and Mobile Consul3ng Overview 2013 Payments Cards and Mobile Consul3ng Overview 2013 Our Services A digital publishing and marke3ng pla4orm for the future of payments Publishing Research Consul0ng Public Rela0ons Marke0ng/Branding Corporate

More information

Building your cloud porbolio APS Connect

Building your cloud porbolio APS Connect Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy

More information

ENERGY EFFICIENCY THROUGH ENERGY DATA ANALYTICS BRIAN BOWEN MICHIGAN EO COLLABORATIVE SEPTEMBER 15, 2015

ENERGY EFFICIENCY THROUGH ENERGY DATA ANALYTICS BRIAN BOWEN MICHIGAN EO COLLABORATIVE SEPTEMBER 15, 2015 ENERGY EFFICIENCY THROUGH ENERGY DATA ANALYTICS BRIAN BOWEN MICHIGAN EO COLLABORATIVE SEPTEMBER 15, 2015 THE SIGNAL AND THE NOISE IBM es(mates that we are now genera(ng 2.5 quinallion bytes of data each

More information

The Real Score of Cloud

The Real Score of Cloud The Real Score of Cloud Mayur Sahni Sr. Research Manger IDC Asia/Pacific [email protected] @mayursahni Digital Transformation Changing Role of IT Innova&on Informa&on Business agility Changing role of the

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

Copyright 2013 Splunk Inc. Introducing Splunk 6

Copyright 2013 Splunk Inc. Introducing Splunk 6 Copyright 2013 Splunk Inc. Introducing Splunk 6 Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected performance

More information

Texas Digital Government Summit. Data Analysis Structured vs. Unstructured Data. Presented By: Dave Larson

Texas Digital Government Summit. Data Analysis Structured vs. Unstructured Data. Presented By: Dave Larson Texas Digital Government Summit Data Analysis Structured vs. Unstructured Data Presented By: Dave Larson Speaker Bio Dave Larson Solu6ons Architect with Freeit Data Solu6ons In the IT industry for over

More information

BIG DATA AND INVESTIGATIVE ANALYTICS

BIG DATA AND INVESTIGATIVE ANALYTICS The New Fron+er BIG DATA AND INVESTIGATIVE ANALYTICS A Publication of Infobright Table of Contents Introduc+on 3 Chapter 1: What Is Inves+ga+ve Analy+cs?. 4 Chapter 2: Top Five Requirements for Inves+ga+ve

More information

An Econocom Group company. Your partner in the transi4on towards Mobile IT

An Econocom Group company. Your partner in the transi4on towards Mobile IT An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets

More information

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements OpAuditTM from is the first compliance management product on the market to successfully track manual controls and technical controls in the same workflow-based system. This ingenious solution gathers &

More information

Chapter 3. Database Architectures and the Web Transparencies

Chapter 3. Database Architectures and the Web Transparencies Week 2: Chapter 3 Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objec

More information

Using Mobile to Capture In- the- Moment Insights

Using Mobile to Capture In- the- Moment Insights With the global leader in sampling and data services Using Mobile to Capture In- the- Moment Insights Saran Ganesh Director, Mobile product marke8ng 2015 Survey Sampling Interna6onal 1 During this webcast

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

An Introduc@on to Big Data, Apache Hadoop, and Cloudera

An Introduc@on to Big Data, Apache Hadoop, and Cloudera An Introduc@on to Big Data, Apache Hadoop, and Cloudera Ian Wrigley, Curriculum Manager, Cloudera 1 The Mo@va@on for Hadoop 2 Tradi@onal Large- Scale Computa@on Tradi*onally, computa*on has been processor-

More information

Accelera'ng Your Solu'on Development with Splunk Reference Apps

Accelera'ng Your Solu'on Development with Splunk Reference Apps Copyright 2015 Splunk Inc. Accelera'ng Your Solu'on Development with Splunk Reference Apps Grigori Melnik Principal Product Manager Developer PlaAorm, Splunk @gmelnik Disclaimer During the course of this

More information