Welcome!

News Feed Item

Optiv Security Furthers Rationalization and Optimization Strategy with Launch of Secure Data Reference Architecture

(from booth #1109 at RSA Conference 2018) Optiv Security, the world’s leading security solutions integrator, today announced “[email protected],” a reference architecture that provides a unique programmatic approach and expertise for rapid deployment of a secure data lake. [email protected] considers many factors, tradeoffs and design considerations, and helps clients make appropriate technology selection, and design and implementation decisions while balancing risk mitigation with desired business outcomes. It harnesses vast amounts of data from security infrastructure, intelligence feeds and other sources, and then runs purpose-built analytics for any number of security functions, including:

  • Situational awareness dashboards
  • Incident detection and response
  • Enhanced vulnerability scanning
  • Compliance
  • E-Discovery
  • Fraud detection
  • Ad hoc queries to answer virtually any security question

“Everyone is talking about orchestration and automation across the security space, and this is an example where Optiv is delivering it in a way that rationalizes and operationalizes data in furtherance of the security mission,” said Stu Solomon, Optiv chief technology and strategy officer. “We believe reference architectures are a key requirement for solving complex problems, such as cyber security data infrastructure. Otherwise, these projects are likely to fail due to the costs and manpower consumed by a ‘trial and error’ approach to secure data as well as generally not being informed by an ecosystem-based approach to planning and architecture decisions. [email protected] delivers the right technology and services in a highly manageable and flexible solution package. It enables organizations to align their security programs to enterprise business strategies, operational needs and risk profiles rather than constantly reacting to the latest threat. We are proud to bring [email protected] to market and to provide organizations with an efficient way to add the smarts to their security operations.”

[email protected] is based on system design and vendor components that have been proven in multiple client environments. This dramatically speeds the process of deploying the solution because it eliminates many of the vendor-evaluation and “trial and error” steps typically associated with data-related security projects.

For example, a large healthcare provider partnered with Optiv to build and deploy a secure data lake with goals to retain more than a year’s worth of online data, support a large number of concurrent users, and provide future scalability and extensibility. Optiv developed and implemented a comprehensive secure data solution tailored to the client’s needs through identification of common use case patterns. Optiv’s solution lowered the barrier to entry by providing open source software proof of concept, augmented in-house data scientists/analytic developers, and deployed hundreds of nodes, fully configured, in minutes. The partnership produced competitive advantage for this client, decreasing incident response time from an average of two to four hours to 12 minutes, and providing average monthly savings of $100,000 - $400,000 as a result of simplified fraud detection analytics.

Historically, enterprises have used commercial Security Incident and Event Management (SIEM) platforms to aggregate, analyze and correlate security data. SIEMs have proven to be critical technologies for the initial view of security data streams, however there are limitations on the degree that organizations have been able to operationalize the technology for triaging true positive security events. With the proliferation of data, cyber security programs have massively grown in response, leading organizations to require technologies purpose-built for efficient data management. [email protected] allows organizations to gain new and incremental value from their SIEMs, while also solving their security data management and analysis challenges.

[email protected] currently includes technologies from Elastic, Splunk, Phantom Cyber and StreamSets along with other open source and big data infrastructure platforms, coupled with Optiv’s decision engineering services, acquired with Decision Lab late last year. Together, these deliver a preconfigured solution for a security-specific data lake that delivers benefits including:

  • Nimble, evidence-based decision-making: Clients can easily extract value from diverse data sets by enriching and normalizing data points in a readily consumable manner. This enables them to answer their toughest questions and make operational decisions based on evidence, rather than “best guesses.”
  • Risk mitigation: [email protected] dramatically reduces errors in data analysis that are common in traditional analytics solutions and manual processes. This helps organizations more accurately identify threats and vulnerabilities, and more efficiently deploy staff.
  • Cost reduction: As a reference architecture, [email protected] reduces costs by enabling clients to avoid vendor lock-in and, because it is built on modular solutions, it can easily be tailored for specific client use-cases. Additionally, because it is a solution that has been successfully deployed in other environments, it eliminates the costs associated with “trial and error” failures.
  • Fast time-to-value: [email protected] can be deployed in hours or days, compared to the weeks or months required with other approaches.

To learn more about [email protected], visit our website or send an email to [email protected].

Follow Optiv
Twitter: www.twitter.com/optiv
LinkedIn: www.linkedin.com/company/optiv-inc
Facebook: www.facebook.com/optivinc
YouTube: https://www.youtube.com/c/OptivInc
Blog: www.optiv.com/resources/blog
Newsletter: www.optiv.com/optiv-advisor

About Optiv Security
Optiv helps clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. Optiv maintains premium partnerships with more than 350 of the leading security technology manufacturers. For more information, visit www.optiv.com.

Individual results may vary.  Performance may vary depending on client’s technical environment, data needs and other factors.  No computer system can be absolutely secure. 

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
Everything run by electricity will eventually be connected to the Internet. Get ahead of the Internet of Things revolution. In his session at @ThingsExpo, Akvelon expert and IoT industry leader Sergey Grebnov provided an educational dive into the world of managing your home, workplace and all the devices they contain with the power of machine-based AI and intelligent Bot services for a completely streamlined experience.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors!
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
Dhiraj Sehgal works in Delphix's product and solution organization. His focus has been DevOps, DataOps, private cloud and datacenters customers, technologies and products. He has wealth of experience in cloud focused and virtualized technologies ranging from compute, networking to storage. He has spoken at Cloud Expo for last 3 years now in New York and Santa Clara.
HyperConvergence came to market with the objective of being simple, flexible and to help drive down operating expenses. It reduced the footprint by bundling the compute/storage/network into one box. This brought a new set of challenges as the HyperConverged vendors are very focused on their own proprietary building blocks. If you want to scale in a certain way, let's say you identified a need for more storage and want to add a device that is not sold by the HyperConverged vendor, forget about it...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especially great option for projects that require multiple and frequent contributions to be integrated. But… securing CICD best practices is an emerging, essential, yet little understood practice for DevOps teams and their Cloud Service Providers. The only way to get CICD to work in a highly secure environment takes collaboration, patience and persistence. Building CICD in the cloud requires rigorous ar...
"We're focused on how to get some of the attributes that you would expect from an Amazon, Azure, Google, and doing that on-prem. We believe today that you can actually get those types of things done with certain architectures available in the market today," explained Steve Conner, VP of Sales at Cloudistics, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Sanjeev Sharma Joins November 11-13, 2018 @DevOpsSummit at @CloudEXPO New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.