SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Case Story
             Dynamic Log Analysis
                                                      TM




Guarded Communication

        “Dynamic Log AnalysisTM enabled us to cost-effectively
             realize large enterprise security benefits.”
                     -- Shane, CIO, Hutton Communications                                      The Customer:
                                                                                               Hutton Communications
Founded in 1969 in Dallas, Texas, Hutton Communications, Inc. is a distributor of              The Environment:
commercial wireless communications infrastructure with 12 offices throughout the               • 40 - NT Servers
United States and Canada. Their value-added services are relied upon by Fortune                • 2 - RS6000 AIX Servers
100 Telecommunication companies that include cellular and radio communications
dealers, wireless communications carriers, and self-maintained end users of                    The Challenge:
communications systems.                                                                        • Limited IT resources
                                                                                               • Internal and external
                                                                                                 security vulnerabilities
   The Challenge                                                                               • Lacked real-time
As a small-to-medium sized business, Hutton Communication’s information                          notification of exploits
technology group is perpetually stretched for dollars, time, and resources. “We are
in a highly competitive business amongst a small group of strong companies”. said              The Solution:
Jerry McDonald, Manger of Technical Services and eBusiness, “If our systems were               • Enhanced IT productivity
compromised due to a security breach, we would lose the confidence of our                      • Closed security
customers which would have a devastating impact on our business. We have                         vulnerabilities
limited budgets and even less time to really get a true grip on our server and                 • Enabled real-time
network vulnerabilities. We’ve recently brought on new customers and are in the                  response to exploitations
process of opening new offices…it seems like security is becoming more complex
day by day.”
Tom Novak, their LAN Administrator stated “Security has been at the top of our list
for a long time, however because I am a jack-of-all-trades, I don’t have the time
to sift through network and firewall logs, nor do I have the security expertise to
identify threats in time to do anything about it. One virus could cause our business
to halt for up to seven days, which would have a devastating impact on our
business.”
                                         TM




   The Solution
Clear’s security team performed a penetration test to identify gaps in Hutton’s
security posture and provided recommendations on how to fill those gaps. “Clear’s
security assessment helped us realize how susceptible we were to a major security
breach.” said Shane Hofer, CIO, “I knew we needed to improve our security
strategy moving forward.” Clear’s Dynamic Log Analysis™ solution gave Hutton the                  For more information
security monitoring and alerting capabilities of an enterprise level solution at a small        www.ClearTechnologies.net
fraction of the cost. “I saw immediate value in the insight Dynamic Log AnalysisTM                 or call 972.906.7500
provides.” said Hofer, “My team’s productivity has increased exponentially. This
frees them up to focus on other initiatives within our department, and frees me from
adding headcount.”
                                                                                                                             TM




   About Us
Since 1993, our customers have relied on us to meet their hardware needs. Today, our
                                                                                                                             MT




customers look to us to increase their organizational effectiveness by providing continuity,
infrastructure, security, and virtualization solutions.



                                         www.ClearTechnologies.net/DynamicLogAnalysis

Mais conteúdo relacionado

Mais procurados

Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
MobiWee
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
 

Mais procurados (20)

Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 

Destaque

Prezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorimPrezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorim
Elena Zvarici
 

Destaque (10)

Agenda IGF.RO
Agenda IGF.ROAgenda IGF.RO
Agenda IGF.RO
 
Inscrição pct
Inscrição pctInscrição pct
Inscrição pct
 
Trial Strategy: When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
Trial Strategy:  When Will a U.S. Court Assert Jurisdiction Over a Foreign In...Trial Strategy:  When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
Trial Strategy: When Will a U.S. Court Assert Jurisdiction Over a Foreign In...
 
Seminário de Segurança em Informática - Symatec
Seminário de Segurança em Informática - SymatecSeminário de Segurança em Informática - Symatec
Seminário de Segurança em Informática - Symatec
 
What do people think
What do people thinkWhat do people think
What do people think
 
Prezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorimPrezentare Isoc romania ce fel de internet ne dorim
Prezentare Isoc romania ce fel de internet ne dorim
 
Что необходимо знать о песочной церемонии
Что необходимо знать о песочной церемонииЧто необходимо знать о песочной церемонии
Что необходимо знать о песочной церемонии
 
Tech data - Reduce server downtime
Tech data - Reduce server downtimeTech data - Reduce server downtime
Tech data - Reduce server downtime
 
Get ready for_2013
Get ready for_2013Get ready for_2013
Get ready for_2013
 
Dynamic Log Analysis - The Future
Dynamic Log Analysis - The FutureDynamic Log Analysis - The Future
Dynamic Log Analysis - The Future
 

Semelhante a Dynamic Log Analysis™ Case Story Hutton Communications

Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
Centuric
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Transcend United Tech Overview
Transcend United Tech OverviewTranscend United Tech Overview
Transcend United Tech Overview
jasonjking
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce
CyberRecruit
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
tmcleland
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
richard_turner
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
finance40
 

Semelhante a Dynamic Log Analysis™ Case Story Hutton Communications (20)

Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Transcend United Tech Overview
Transcend United Tech OverviewTranscend United Tech Overview
Transcend United Tech Overview
 
NJVC Brochure
NJVC BrochureNJVC Brochure
NJVC Brochure
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce
 
Security and Risk Mitigation
Security and Risk MitigationSecurity and Risk Mitigation
Security and Risk Mitigation
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Munawwar Khan
Munawwar KhanMunawwar Khan
Munawwar Khan
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
EMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services ProvidersEMC Perspective: What Customers Seek from Cloud Services Providers
EMC Perspective: What Customers Seek from Cloud Services Providers
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Leading insurance institution enables authentication
Leading insurance institution enables authenticationLeading insurance institution enables authentication
Leading insurance institution enables authentication
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 

Mais de Clear Technologies

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
Clear Technologies
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product Guide
Clear Technologies
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Final
Clear Technologies
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 Front
Clear Technologies
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Clear Technologies
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™
Clear Technologies
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™
Clear Technologies
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide final
Clear Technologies
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product Guide
Clear Technologies
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of Colleyville
Clear Technologies
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value Sheet
Clear Technologies
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
Clear Technologies
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...
Clear Technologies
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Clear Technologies
 

Mais de Clear Technologies (14)

Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Visual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product GuideVisual Sorage Intelligence™ Product Guide
Visual Sorage Intelligence™ Product Guide
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Final
 
Remote Administration Case Story - 4 Front
Remote Administration Case Story  - 4 FrontRemote Administration Case Story  - 4 Front
Remote Administration Case Story - 4 Front
 
Legal Departments' Security Responsibility - Dynamic Log Analysis™
Legal Departments' Security Responsibility   - Dynamic Log Analysis™Legal Departments' Security Responsibility   - Dynamic Log Analysis™
Legal Departments' Security Responsibility - Dynamic Log Analysis™
 
6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™6 reasons bankers should buy dynamic log analysis™
6 reasons bankers should buy dynamic log analysis™
 
6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™6 reasons insurance companies should buy dynamic log analysis™
6 reasons insurance companies should buy dynamic log analysis™
 
Security level 40 product guide final
Security level 40 product guide finalSecurity level 40 product guide final
Security level 40 product guide final
 
Dynamic Log Analysis Product Guide
Dynamic Log Analysis  Product GuideDynamic Log Analysis  Product Guide
Dynamic Log Analysis Product Guide
 
Dynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of ColleyvilleDynamic Log Analysis™ Case Story City of Colleyville
Dynamic Log Analysis™ Case Story City of Colleyville
 
Dynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value SheetDynamic Log Analysis™ Business Value Sheet
Dynamic Log Analysis™ Business Value Sheet
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...Proactive Log Management in Banking - Why is it important and what inhibits i...
Proactive Log Management in Banking - Why is it important and what inhibits i...
 
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms  by Tim SheltonSophisticated Security - Naïve Bayesian Algorithms  by Tim Shelton
Sophisticated Security - Naïve Bayesian Algorithms by Tim Shelton
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Dynamic Log Analysis™ Case Story Hutton Communications

  • 1. Case Story Dynamic Log Analysis TM Guarded Communication “Dynamic Log AnalysisTM enabled us to cost-effectively realize large enterprise security benefits.” -- Shane, CIO, Hutton Communications The Customer: Hutton Communications Founded in 1969 in Dallas, Texas, Hutton Communications, Inc. is a distributor of The Environment: commercial wireless communications infrastructure with 12 offices throughout the • 40 - NT Servers United States and Canada. Their value-added services are relied upon by Fortune • 2 - RS6000 AIX Servers 100 Telecommunication companies that include cellular and radio communications dealers, wireless communications carriers, and self-maintained end users of The Challenge: communications systems. • Limited IT resources • Internal and external security vulnerabilities The Challenge • Lacked real-time As a small-to-medium sized business, Hutton Communication’s information notification of exploits technology group is perpetually stretched for dollars, time, and resources. “We are in a highly competitive business amongst a small group of strong companies”. said The Solution: Jerry McDonald, Manger of Technical Services and eBusiness, “If our systems were • Enhanced IT productivity compromised due to a security breach, we would lose the confidence of our • Closed security customers which would have a devastating impact on our business. We have vulnerabilities limited budgets and even less time to really get a true grip on our server and • Enabled real-time network vulnerabilities. We’ve recently brought on new customers and are in the response to exploitations process of opening new offices…it seems like security is becoming more complex day by day.” Tom Novak, their LAN Administrator stated “Security has been at the top of our list for a long time, however because I am a jack-of-all-trades, I don’t have the time to sift through network and firewall logs, nor do I have the security expertise to identify threats in time to do anything about it. One virus could cause our business to halt for up to seven days, which would have a devastating impact on our business.” TM The Solution Clear’s security team performed a penetration test to identify gaps in Hutton’s security posture and provided recommendations on how to fill those gaps. “Clear’s security assessment helped us realize how susceptible we were to a major security breach.” said Shane Hofer, CIO, “I knew we needed to improve our security strategy moving forward.” Clear’s Dynamic Log Analysis™ solution gave Hutton the For more information security monitoring and alerting capabilities of an enterprise level solution at a small www.ClearTechnologies.net fraction of the cost. “I saw immediate value in the insight Dynamic Log AnalysisTM or call 972.906.7500 provides.” said Hofer, “My team’s productivity has increased exponentially. This frees them up to focus on other initiatives within our department, and frees me from adding headcount.” TM About Us Since 1993, our customers have relied on us to meet their hardware needs. Today, our MT customers look to us to increase their organizational effectiveness by providing continuity, infrastructure, security, and virtualization solutions. www.ClearTechnologies.net/DynamicLogAnalysis