SlideShare uma empresa Scribd logo
1 de 31
Splunk, Industrial Data and
the Internet of Things
IT
Operations
Application
Delivery
Developer Platform (REST API, SDKs)
Delivers Value Across IT and the Business
Business
Analytics
Industrial Data
and Internet of
Things
Security,
Compliance
and Fraud
© 2015 Splunk Inc. All rights reserved.
IT
Operations
Application
Delivery
Developer Platform (REST API, SDKs)
Delivers Value Across IT and the Business
Business
Analytics
Industrial Data
and Internet of
Things
Security,
Compliance
and Fraud
© 2015 Splunk Inc. All rights reserved.
Map Search
Operation Playback
OPERATIONAL VISIBILITYACROSS SILOS
Experience Visualization
© 2014 Splunk Inc. All rights reserved.
5
Energy price monitoring
React to price changes effectively
Better operational analytics
6
Monitoring flights and medicine
in real time
Making data accessible, usable and
valuable to medical, flight, and support
personnel
Supporting outreach and fundraising
efforts
© 2014 Splunk Inc. All rights reserved.
7
8
Analyzing Robots to Improve Supply Chain
4%Throughput
Improvements
Operational Technology (ICS)
Energy Oil & Gas Process Manufacturing
Medical
Devices
Telecom
Smart Building
Robots
Consumer Technology
Smart Home Wearables Media
Scope of IoT & Industrial Data
SCADA DCS Other Emerging Technology
• ICS (Industrial Control System) - General Term Used to Describe a System or Process with Many Systems
• SCADA (Supervisory Control and Data Acquisition) – Geographically Distributed Monitoring
• DCS (Distributed Control System) – Process (Batch or Flow) with Many Data Points
• Other - Embedded systems making up the rest of the IoT Space
© 2015 Splunk Inc. All rights reserved.
Powerful Developer Platform
Collection
Indexing
Search Processing Language
Core Functions
Inputs, Apps, Other
Content
SDKUI
REST API
Operational Intelligence Platform
Content
Core Engine
User and Developer Interfaces
Powerful Extensibility
11
Splunk Web Framework R Project App
Custom Search Commands in Python
Powerful IoT and Industrial Data Ecosystem
12
APIs, SDKs, App Framework, User Interface
SDKs UI
Legacy Data and
Sensors
IoT/ICS SecurityIoT Platforms Native Inputs
REST
Advanced Analytics and ML Custom Interfaces
Kepware Industrial Data Forwarder for Splunk
© 2015 Splunk Inc. All rights reserved.
Example Deployment – Oil and Gas Operations
Upstream
•Wellsite Info (WITS
Level 0)
•Pump Controllers
Midstream
•ABB Total Flow
Devices
•Electronic Flow
Measurement
Device
Downstream
•PLCs
•PACs
•RTU’s
•DCS
•Data Recorders
Accessed through Kepware Industrial Data Forwarder
Additional Data Sources
• Security-related events
• Relational database and
CSV lookups
• Weather and other
environmental events
• Work order events
• Safety-related events
• Network and IT/OT
infrastructure events
Traditional Splunk Sources
Splunk – At Intersection of IT and OT (a key trend going forward)
© 2015 Splunk Inc. All rights reserved.
Use Cases
Operations and Troubleshooting Security, Compliance and Safety Business Analytics
Measurement and
Verification
Root Cause Analysis
Capacity Planning
Anomaly and Outlier
Detection
Cybersecurity
Safety and Compliance
Customer Intelligence
Device Intelligence
© 2015 Splunk Inc. All rights reserved.
App for Enterprise Security for ICS
IT Security
Events
OT
Security
Events
Process
and Alarm
Events
© 2015 Splunk Inc. All rights reserved.
Why is ICS Different Than IT?
17
Cyber Criminals
Malicious Insiders
Nation States
ICS Security Threats
Why the Growing Interest in ICS Security?
19
Everyday Headlines
Preventing Control
System Service
Interruption
Prevent Damage
Health and Safety of
Employees
Meet Compliance
Logging Capabilities
Reporting Capabilities
Correlation Between OT
and IT
Data Silos
Existing ICS Security Problem Space
20
Weaknesses
Drivers
A New Approach to ICS Security is Needed
21
Analyze all relevant data
Contextual and Behavioral Relevance
Rapid learning loops and responses
Collaborative & Coordinated
Leverage IOC & Threat Intel
Fusion of Technology/People/Process
• Goal-oriented
• Human directed
• Multiple tools, steps
& activities
• Dynamic
• New evasion
techniques
• Coordinated
© 2015 Splunk Inc.22
Threat Intel Access IdentityEndpointsNetwork
Splunk is the Security Brain (Intelligence)
Splunk’s ICS Security Focused Partners
23
Connecting the “Data Dots”
24
24
Machine data
Traffic data
Abnormal behavior
High confidence event
Med confidence event
Low confidence event
Malware
download
Program
installation
Access to ICS
Malware install
Malware &
endpoint
execution data
User on machine
Link to program
And process
Authenticated
Sessions used to
pivot into Control
Systems LAN
Delivery, exploit
installation
Gain trusted
access
Access Operations
Environment
Upgrade (escalate)
Lateral movement
Threat intelligence
Auth - User Roles
Host
Activity/Security
Network
Activity/Security
Control System LAN
Better quality and
safety
Drive product
innovation
Workflow and
productivity
improvements
Detect cybersecurity
threats
Drive
operational
efficiencies
Extend
competitive
advantage
How Can IoT Analytics Transform Your Business?
© 2015 Splunk Inc. All rights reserved.
© 2014 Splunk Inc. All rights reserved.
Why Splunk?
FAST TIME-TO-VALUE
ONE PLATFORM, MULTIPLE USE CASES
VISIBILITY ACROSS STACK, NOT JUST SILOS
ASK ANY QUESTION OF DATA
ANY DATA, ANY SOURCE OR DEPLOYMENT MODEL
© 2015 Splunk Inc. All rights reserved
Demo
© 2015 Splunk Inc. All rights reserved
Questions?
Thanksto Our Sponsors
Don’t forget to fill out your survey!
Complete survey for a chance to win Splunk
schwag
Visit http://t.validar.com/1/ecOQ7
Or text
878787
© 2015 Splunk Inc. All rights reserved
Thank You !

Mais conteúdo relacionado

Mais procurados

Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 

Mais procurados (20)

CNCF Online - Data Protection Guardrails using Open Policy Agent (OPA).pdf
CNCF Online - Data Protection Guardrails using Open Policy Agent (OPA).pdfCNCF Online - Data Protection Guardrails using Open Policy Agent (OPA).pdf
CNCF Online - Data Protection Guardrails using Open Policy Agent (OPA).pdf
 
Soluciones Dynatrace
Soluciones DynatraceSoluciones Dynatrace
Soluciones Dynatrace
 
Splunk 101
Splunk 101Splunk 101
Splunk 101
 
TechEvent Databricks on Azure
TechEvent Databricks on AzureTechEvent Databricks on Azure
TechEvent Databricks on Azure
 
Azure Migration Program Pitch Deck
Azure Migration Program Pitch DeckAzure Migration Program Pitch Deck
Azure Migration Program Pitch Deck
 
Getting Started with IT Service Intelligence
Getting Started with IT Service IntelligenceGetting Started with IT Service Intelligence
Getting Started with IT Service Intelligence
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
IoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & PerformanceIoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & Performance
 
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
How to Move from Monitoring to Observability, On-Premises and in a Multi-Clou...
 
AWS Manufacturing Day Philadelphia-Boston-April 2019
AWS Manufacturing Day Philadelphia-Boston-April 2019AWS Manufacturing Day Philadelphia-Boston-April 2019
AWS Manufacturing Day Philadelphia-Boston-April 2019
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
Azure migration
Azure migrationAzure migration
Azure migration
 
Towards Digital Twin standards following an open source approach
Towards Digital Twin standards following an open source approachTowards Digital Twin standards following an open source approach
Towards Digital Twin standards following an open source approach
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
 
Cloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure MigrationCloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure Migration
 
Where to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio MigrationWhere to Begin? Application Portfolio Migration
Where to Begin? Application Portfolio Migration
 
original.pptx
original.pptxoriginal.pptx
original.pptx
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Splunk Cloud
Splunk CloudSplunk Cloud
Splunk Cloud
 

Destaque

Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
Splunk
 
SplunkLive! Customer Presentation - Satcom Direct
SplunkLive! Customer Presentation - Satcom DirectSplunkLive! Customer Presentation - Satcom Direct
SplunkLive! Customer Presentation - Satcom Direct
Splunk
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
Steve Lim
 
QCon London 2015 - Wrangling Data at the IOT Rodeo
QCon London 2015 - Wrangling Data at the IOT RodeoQCon London 2015 - Wrangling Data at the IOT Rodeo
QCon London 2015 - Wrangling Data at the IOT Rodeo
Damien Dallimore
 
SplunkLive! Customer Presentation - Garmin International
SplunkLive! Customer Presentation - Garmin InternationalSplunkLive! Customer Presentation - Garmin International
SplunkLive! Customer Presentation - Garmin International
Splunk
 

Destaque (20)

Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial EnvironmentSplunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for Monitoring and Diagnostics in the Industrial Environment
 
SplunkLive! Customer Presentation - Satcom Direct
SplunkLive! Customer Presentation - Satcom DirectSplunkLive! Customer Presentation - Satcom Direct
SplunkLive! Customer Presentation - Satcom Direct
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
 
QCon London 2015 - Wrangling Data at the IOT Rodeo
QCon London 2015 - Wrangling Data at the IOT RodeoQCon London 2015 - Wrangling Data at the IOT Rodeo
QCon London 2015 - Wrangling Data at the IOT Rodeo
 
SplunkLive! Austin Customer Presentation - Dell
SplunkLive! Austin Customer Presentation - DellSplunkLive! Austin Customer Presentation - Dell
SplunkLive! Austin Customer Presentation - Dell
 
SplunkLive! Customer Presentation - Garmin International
SplunkLive! Customer Presentation - Garmin InternationalSplunkLive! Customer Presentation - Garmin International
SplunkLive! Customer Presentation - Garmin International
 
SplunkLive! Customer Presentation - ExxonMobil
SplunkLive! Customer Presentation - ExxonMobilSplunkLive! Customer Presentation - ExxonMobil
SplunkLive! Customer Presentation - ExxonMobil
 
SplunkLive! Wien 2016 - Use Case TTTech Computertechnik
SplunkLive! Wien 2016 - Use Case TTTech ComputertechnikSplunkLive! Wien 2016 - Use Case TTTech Computertechnik
SplunkLive! Wien 2016 - Use Case TTTech Computertechnik
 
Viasat Customer Presentation
Viasat Customer PresentationViasat Customer Presentation
Viasat Customer Presentation
 
Get your Service Intelligence off to a Flying Start
Get your Service Intelligence off to a Flying StartGet your Service Intelligence off to a Flying Start
Get your Service Intelligence off to a Flying Start
 
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk for ITOA Breakout Session
Splunk for ITOA Breakout Session
 
Daten anonymisieren und pseudonymisieren in Splunk Enterprise
Daten anonymisieren und pseudonymisieren in Splunk EnterpriseDaten anonymisieren und pseudonymisieren in Splunk Enterprise
Daten anonymisieren und pseudonymisieren in Splunk Enterprise
 
Ecetera uses Splunk to facilitate DevOps in forex
Ecetera uses Splunk to facilitate DevOps in forexEcetera uses Splunk to facilitate DevOps in forex
Ecetera uses Splunk to facilitate DevOps in forex
 
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
AWS Loft London: Finding the signal in the noise - Effective SecOps with Soph...
 
[Smart industry 2016] MacLean-Fogg Uses IIoT to Gain Industry Advantage: Year...
[Smart industry 2016] MacLean-Fogg Uses IIoT to Gain Industry Advantage: Year...[Smart industry 2016] MacLean-Fogg Uses IIoT to Gain Industry Advantage: Year...
[Smart industry 2016] MacLean-Fogg Uses IIoT to Gain Industry Advantage: Year...
 
Smart Industry 2015: MacLean-Fogg Uses IIOT To Gain Industry Advantage
Smart Industry 2015: MacLean-Fogg Uses IIOT To Gain Industry AdvantageSmart Industry 2015: MacLean-Fogg Uses IIOT To Gain Industry Advantage
Smart Industry 2015: MacLean-Fogg Uses IIOT To Gain Industry Advantage
 
SplunkLive! Austin Customer Presentation - Baylor
SplunkLive! Austin Customer Presentation - BaylorSplunkLive! Austin Customer Presentation - Baylor
SplunkLive! Austin Customer Presentation - Baylor
 
Splunk Implementation and Usage - Garmin
Splunk Implementation and Usage - GarminSplunk Implementation and Usage - Garmin
Splunk Implementation and Usage - Garmin
 

Semelhante a Splunk for Industrial Data and the Internet of Things

SplunkLive! São Paulo 2014 - Overview by markus zirn
SplunkLive! São Paulo 2014 -  Overview by markus zirnSplunkLive! São Paulo 2014 -  Overview by markus zirn
SplunkLive! São Paulo 2014 - Overview by markus zirn
Splunk
 
Io t analytics panel
Io t   analytics panelIo t   analytics panel
Io t analytics panel
MassTLC
 
Virtual SplunkLive! for Higher Education Overview/Customers
Virtual SplunkLive! for Higher Education Overview/CustomersVirtual SplunkLive! for Higher Education Overview/Customers
Virtual SplunkLive! for Higher Education Overview/Customers
Splunk
 

Semelhante a Splunk for Industrial Data and the Internet of Things (20)

Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
Accelerating Operational Excellence with IT/OT Convergence
Accelerating Operational Excellence with IT/OT ConvergenceAccelerating Operational Excellence with IT/OT Convergence
Accelerating Operational Excellence with IT/OT Convergence
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
SplunkLive! São Paulo 2014 - Overview by markus zirn
SplunkLive! São Paulo 2014 -  Overview by markus zirnSplunkLive! São Paulo 2014 -  Overview by markus zirn
SplunkLive! São Paulo 2014 - Overview by markus zirn
 
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
You Can't Protect What you Can't See. AWS Security Best Practices - Session S...
 
Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
 
Io t analytics panel
Io t   analytics panelIo t   analytics panel
Io t analytics panel
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT Operations
 
SplunkLive Wellington 2015 - Operational Intelligence
SplunkLive Wellington 2015 - Operational IntelligenceSplunkLive Wellington 2015 - Operational Intelligence
SplunkLive Wellington 2015 - Operational Intelligence
 
SplunkLive Auckland - Operational Intelligence
SplunkLive Auckland - Operational IntelligenceSplunkLive Auckland - Operational Intelligence
SplunkLive Auckland - Operational Intelligence
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
AWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - SplunkAWS Summit Auckland - Sponsor Presentation - Splunk
AWS Summit Auckland - Sponsor Presentation - Splunk
 
Virtual SplunkLive! for Higher Education Overview/Customers
Virtual SplunkLive! for Higher Education Overview/CustomersVirtual SplunkLive! for Higher Education Overview/Customers
Virtual SplunkLive! for Higher Education Overview/Customers
 
Integrating IT & OT for Condition Monitoring
Integrating IT & OT for Condition MonitoringIntegrating IT & OT for Condition Monitoring
Integrating IT & OT for Condition Monitoring
 
SplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT Operations
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 

Mais de Splunk

Mais de Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Splunk for Industrial Data and the Internet of Things

  • 1. Splunk, Industrial Data and the Internet of Things
  • 2. IT Operations Application Delivery Developer Platform (REST API, SDKs) Delivers Value Across IT and the Business Business Analytics Industrial Data and Internet of Things Security, Compliance and Fraud © 2015 Splunk Inc. All rights reserved.
  • 3. IT Operations Application Delivery Developer Platform (REST API, SDKs) Delivers Value Across IT and the Business Business Analytics Industrial Data and Internet of Things Security, Compliance and Fraud © 2015 Splunk Inc. All rights reserved.
  • 4. Map Search Operation Playback OPERATIONAL VISIBILITYACROSS SILOS Experience Visualization © 2014 Splunk Inc. All rights reserved.
  • 5. 5 Energy price monitoring React to price changes effectively Better operational analytics
  • 6. 6 Monitoring flights and medicine in real time Making data accessible, usable and valuable to medical, flight, and support personnel Supporting outreach and fundraising efforts © 2014 Splunk Inc. All rights reserved.
  • 7. 7
  • 8. 8 Analyzing Robots to Improve Supply Chain 4%Throughput Improvements
  • 9. Operational Technology (ICS) Energy Oil & Gas Process Manufacturing Medical Devices Telecom Smart Building Robots Consumer Technology Smart Home Wearables Media Scope of IoT & Industrial Data SCADA DCS Other Emerging Technology • ICS (Industrial Control System) - General Term Used to Describe a System or Process with Many Systems • SCADA (Supervisory Control and Data Acquisition) – Geographically Distributed Monitoring • DCS (Distributed Control System) – Process (Batch or Flow) with Many Data Points • Other - Embedded systems making up the rest of the IoT Space © 2015 Splunk Inc. All rights reserved.
  • 10. Powerful Developer Platform Collection Indexing Search Processing Language Core Functions Inputs, Apps, Other Content SDKUI REST API Operational Intelligence Platform Content Core Engine User and Developer Interfaces
  • 11. Powerful Extensibility 11 Splunk Web Framework R Project App Custom Search Commands in Python
  • 12. Powerful IoT and Industrial Data Ecosystem 12 APIs, SDKs, App Framework, User Interface SDKs UI Legacy Data and Sensors IoT/ICS SecurityIoT Platforms Native Inputs REST Advanced Analytics and ML Custom Interfaces
  • 13. Kepware Industrial Data Forwarder for Splunk © 2015 Splunk Inc. All rights reserved.
  • 14. Example Deployment – Oil and Gas Operations Upstream •Wellsite Info (WITS Level 0) •Pump Controllers Midstream •ABB Total Flow Devices •Electronic Flow Measurement Device Downstream •PLCs •PACs •RTU’s •DCS •Data Recorders Accessed through Kepware Industrial Data Forwarder Additional Data Sources • Security-related events • Relational database and CSV lookups • Weather and other environmental events • Work order events • Safety-related events • Network and IT/OT infrastructure events Traditional Splunk Sources Splunk – At Intersection of IT and OT (a key trend going forward) © 2015 Splunk Inc. All rights reserved.
  • 15. Use Cases Operations and Troubleshooting Security, Compliance and Safety Business Analytics Measurement and Verification Root Cause Analysis Capacity Planning Anomaly and Outlier Detection Cybersecurity Safety and Compliance Customer Intelligence Device Intelligence © 2015 Splunk Inc. All rights reserved.
  • 16. App for Enterprise Security for ICS IT Security Events OT Security Events Process and Alarm Events © 2015 Splunk Inc. All rights reserved.
  • 17. Why is ICS Different Than IT? 17
  • 18. Cyber Criminals Malicious Insiders Nation States ICS Security Threats
  • 19. Why the Growing Interest in ICS Security? 19 Everyday Headlines
  • 20. Preventing Control System Service Interruption Prevent Damage Health and Safety of Employees Meet Compliance Logging Capabilities Reporting Capabilities Correlation Between OT and IT Data Silos Existing ICS Security Problem Space 20 Weaknesses Drivers
  • 21. A New Approach to ICS Security is Needed 21 Analyze all relevant data Contextual and Behavioral Relevance Rapid learning loops and responses Collaborative & Coordinated Leverage IOC & Threat Intel Fusion of Technology/People/Process • Goal-oriented • Human directed • Multiple tools, steps & activities • Dynamic • New evasion techniques • Coordinated
  • 22. © 2015 Splunk Inc.22 Threat Intel Access IdentityEndpointsNetwork Splunk is the Security Brain (Intelligence)
  • 23. Splunk’s ICS Security Focused Partners 23
  • 24. Connecting the “Data Dots” 24 24 Machine data Traffic data Abnormal behavior High confidence event Med confidence event Low confidence event Malware download Program installation Access to ICS Malware install Malware & endpoint execution data User on machine Link to program And process Authenticated Sessions used to pivot into Control Systems LAN Delivery, exploit installation Gain trusted access Access Operations Environment Upgrade (escalate) Lateral movement Threat intelligence Auth - User Roles Host Activity/Security Network Activity/Security Control System LAN
  • 25. Better quality and safety Drive product innovation Workflow and productivity improvements Detect cybersecurity threats Drive operational efficiencies Extend competitive advantage How Can IoT Analytics Transform Your Business? © 2015 Splunk Inc. All rights reserved.
  • 26. © 2014 Splunk Inc. All rights reserved. Why Splunk? FAST TIME-TO-VALUE ONE PLATFORM, MULTIPLE USE CASES VISIBILITY ACROSS STACK, NOT JUST SILOS ASK ANY QUESTION OF DATA ANY DATA, ANY SOURCE OR DEPLOYMENT MODEL
  • 27. © 2015 Splunk Inc. All rights reserved Demo
  • 28. © 2015 Splunk Inc. All rights reserved Questions?
  • 30. Don’t forget to fill out your survey! Complete survey for a chance to win Splunk schwag Visit http://t.validar.com/1/ecOQ7 Or text 878787
  • 31. © 2015 Splunk Inc. All rights reserved Thank You !

Notas do Editor

  1. POSCO is a multi-national steel making company headquartered in Korea. They are the world’s 4th largest steelmaker. Data for one process coming from: sensors, devices, and servers. Each data type has different formats and fields and is stored in a different place. Existing SCADA tools only show current values. Cannot see past data or trends over time. For refinery operators to access data for investigations, must get permission from IT departments in each factory. Extract data from several databases into Excel files, mash it up and compare levels and trends over time to deduce root cause.! Between obtaining permissions, transforming data and actual analysis, investigations can take up to 2 weeks. The Perseus is a OI platform powered by Splunk that deliver three key values such as Experience Visualization, Operation Playback and Map Search in order to bridge gap of OI for the industry customers who want to get an operational visibility from their business infrastructures unlike the other siloed approaches.   Perseus can integrate, correlate, manipulate and visualize data with contents such as images, maps, SCADA, remote desktops and even live streaming videos using next generation UX technology called POD (Pixel On Demand) which is powered by N3N.  Most of all, Perseus is tightly integrated with Splunk in order to get world best BigData capability with valuable advantages. Experience Visualization – integrate all types of data needed to provide operators with complete operational visibility: Video, Links, Documents, Charts, Tables, Text, Images Map search: Always search within the context of the current view. Clicking the “search” button brings up the search view with all of the metrics in the current view pre-selected. Operators can easily change the visualization to get a different perspective on the data. Operation Playback: Adjust the time range for any view in the Perseus UI to see the values of each component in the view at any point in the past. This is incredibly useful for troubleshooting where existing systems make it hard to access and manipulate past data.
  2. Lumo Energy is an Australian energy retailing business with several power stations throughout Eastern Australia. They use a customized SCADA (supervisory control and data acquisition) system to monitor and control its machinery and equipment. They wanted to extend the capacity of their SCADA system to improve their ability to respond to price fluctuations in real time. They were also seeking more visibility into the infrastructure of their many power stations. Lumo uses Splunk to automate its monitoring of base electricity prices and predictions, which are provided by the Australian Energy Market Operator (AEMO). Splunk indexes all of the inbound data from AEMO, runs specific analysis and calculations specific to Lumo, and then securely provides pricing execution proposals to the stations. This way, AEMO can better predict and react to pricing fluctuations, thereby maximizing revenue. Lumo Energy also has greater control over their custom SCADA environment. Splunk dashboards display market demand and pricing information, power station status and output, resource utilization and other telemetry. Lumo Energy can respond faster to market fluctuations with greater operational intelligence and unparalleled visibility into plant and equipment efficiency. Splunk also provides fail-safe security for private online control of their energy assets operating in the Australian market.
  3. Splunk’s customer, Royal Flying Doctor Service, uses Splunk to better manage the systems and aircraft through which they provide rural healthcare in Australia’s most remote environments. Sensor data from the cooling systems that keep the medicine safe during transport, avionic data from the aircraft, and precise location data give the RFDS team a unique view into overall operations – which is incredibly important as the number of med flights they execute makes them the third largest Australian Airline! In addition to troubleshooting and ops using sensor data, RFDS management is able to re-purpose the precise location data to deliver a unique fundraising opportunity – Buy the sky: buythesky.com.au As planes are servicing patients around Australia, individuals and businesses are able to sponsor patches of sky. As planes fly through these patches, Splunk alerts Salesforce, and a custom email Is sent to the sponsors letting them know their money is being put to good use!
  4. At CeBit2014, Volkswagen’s Data Lab chose splunk to demonstrate the power of the machine data generated by their next generation of electric vehicle – the e-up. There are some very interesting concepts and innovations in this dashboard. First is its capability to replay any vehicle’s journey for the selected time range. In the lower left, you can see the scrub controls, and vehicle activity is marked by a simple histogram.  All available sensors on the vehicle are “played back” in real-time or fast-forward mode, including vehicle speed, engine RPM, battery status, vehicle range, outdoor temperature, door and headlight status. This is a really great example of Splunk’s capabilities as a developer platform. Using Splunk 6’s built in web framework, a web developer was quickly able to develop an engaging and compelling dashboard in far less time than it would have taken using traditional or competing web data frameworks.
  5. What does this platform look like? The platform consists of 2 layer: A core engine and an interface layer On top of the platform you can’t run a broad spectrum of content that supports use cases Use cases range from application mgmt. and IT operations, to ES and PCI compliance, to web analytics The core engine provides the basic services for real time data input, indexing and search as well alerting, large scale distributed processing and role based access The Interface layer consist of the basic UI for search, reporting and visualization – it contains developer interfaces, the REST API and SDKs The SDKs provide a convenient access to core engine services in a variety of programing language environments. These programmatic interfaces allow you to either: extend Splunk integrate Splunk with other applications build completely new applications from scratch that require OI or analytical services that Splunk provides
  6. Endpoints designed to have long life spans with availability in mind Usually has an Embedded Operating System and Software Limited memory and storage Different Components – HMI, Historian, PLC, Embedded Cyber to Physical – A software based system that has the capability to have a physical effect
  7. Lets start with today’s ever changing threat landscape: With all the news on cyber attacks and security breaches, you know we are constantly up against 3 very sophisticated adversaries: the cyber criminals, the nation states and also the malicious Insiders; All going after major stakes of our life, our company and our nation.
  8. SANS SCADA Security Survey found that 70% of respondents are most concerned about “Preventing Control System Service Interruption” and are most worried about “HMI, Servers and Workstations”. https://www.sans.org/reading-room/whitepapers/analyst/results-scada-security-survey-35135 One of the top ICS CERT Recommended Practices is to “Increase Logging Capabilities”. The other top recommendation is user behavior analysis. https://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B https://ics-cert.us-cert.gov/Recommended-Practices#nogo Most technology in the ICS / SCADA industry is decades old and the market is looking for new solutions. Operations staff need solutions to decrease MTTR and keep facilities operational Security staff are looking for better visibility and monitoring capabilities for Control Systems Management wants to leverage IoT, ICS, SCADA data for better business intelligence solutions Audit often has regulatory requirements to meet and need improved capabilities in reporting and compliance
  9. What role doe Splunk’s solution play in the new security Universe ? Splunk is the Brain, the Nerve center. There are four key categories of solutions we work with : They bring the sensory info from end points to the network, contextual info from users to business Apps, and threat trends& visibility at global level (It is about intelligence, collecting information, deriving intelligence and sharing them!) Intelligence sharing is front and center of the WH Security summit, we are enabling our customers to do exactly that!
  10. Without our sponsors we couldn’t be here today. So please stop by outside this room in the pavilion. Thanks to all of you for being here and most of all sponsoring our happy hour!
  11. Without our sponsors we couldn’t be here today. So please stop by outside this room in the pavilion. Thanks to all of you for being here and most of all sponsoring our happy hour!