NETSCOUT > Case Studies > Big Data Services Provider Uses Omnis Cyber Intelligence in AWS for Full Visibility and Enhanced Security Posture

Big Data Services Provider Uses Omnis Cyber Intelligence in AWS for Full Visibility and Enhanced Security Posture

NETSCOUT Logo
Company Size
11-200
Region
  • America
Country
  • United States
Product
  • Omnis Cyber Intelligence
  • NETSCOUT CyberStream
  • ATLAS Threat Intelligence Feed
Tech Stack
  • AWS
  • WordPress
Implementation Scale
  • Enterprise-wide Deployment
Impact Metrics
  • Brand Awareness
  • Customer Satisfaction
Technology Category
  • Analytics & Modeling - Real Time Analytics
  • Cybersecurity & Privacy - Cloud Security
Applicable Industries
  • Software
Applicable Functions
  • Business Operation
Use Cases
  • Cybersecurity
  • Real-Time Location System (RTLS)
Services
  • Cloud Planning, Design & Implementation Services
  • Cybersecurity Services
About The Customer
Forte Data Solutions (ForteLLC.com) is a leading managed and professional services company specializing in big data, database, cloud, IT consulting and virtualization architecture. With expertise in design, implementation, and management, as well as project management for complex projects in their area of specializations. Forte Data Solutions’ mission is to solve big data problems and help their customers modernize and transform their storage, network, and database IT infrastructure in the data center and the cloud and make operational process improvements to ensure security and availability.
The Challenge
Forte Data Solutions recently faced a severe cybersecurity challenge. Their corporate WordPress website fell victim to the infamous Pharma Hack twice, compromising their online presence and potentially damaging their brand reputation. Forte discovered they have been hacked when a customer notified them that a popular search engine was directing them to a website that sold questionable pharmaceuticals. Unable to obtain diagnostic information from their current web hosting provider, Forte decided to take matters into their own hands by repairing the compromised WordPress configuration and, self-hosting their website in the Amazon Web Services (AWS) cloud. To further safeguard their website and maintain a robust cybersecurity posture, Forte chose NETSCOUT Omnis Cyber Intelligence (OCI) as their monitoring solution. Forte needed a solution that would not require refactoring current and future corporate website implementation and infrastructure. In addition, they were seeking a solution that could offer real-time monitoring and threat detection, with the ability to not only react to threats, but also become proactive by utilizing threat intelligence to anticipate potential attacks.
The Solution
Forte deployed OCI and CyberStreams in a dedicated Security VPC in AWS and used traffic mirroring, utilizing GWLB endpoint as a target functionality, to securely route mirrored traffic from their Application’s VPC to this Security VPC in AWS, without impacting the inspected website packet flow. A traffic mirror is comprised of traffic mirror sources, destination targets, traffic filters, and traffic mirroring sessions. The traffic mirror sources are the ENIs of the individual workload EC2 instances. An EC2 workload instance must be of an instance type that supports traffic mirroring. The GWLBe created previously is designated as the traffic mirror target. Traffic mirror sessions combine the source to destination using a traffic filter to exclude or include desired traffic to mirror. In this case, all traffic should be forwarded to the destination target. Note that the GWLBe must be verified. The GWLBes is created to require verification of the traffic source. Once the NETSCOUT GWLBes name is entered, the GWLBes must accept the request from the Forte GWLBe before the endpoint can be used as a target.
Operational Impact
  • Gains valuable insights into the geographical locations of their website visitors to understand the flow of traffic to their website.
  • Better intelligence for faster detection, investigation, and remediation and reduced MTTR (Mean Time to Resolution).
  • Transitioned from a reactive security strategy to a proactive security strategy.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.