Case Studies > Changing the rules of the game for cybersecurity

Changing the rules of the game for cybersecurity

Company Size
1,000+
Region
  • America
Country
  • United States
Product
  • Respond Analyst
  • Palo Alto Networks IDS/IPS
  • Vectra Threat Detection Platform
  • Nessus Vulnerability Scanner
  • ProofPoint Email Security Gateway
Tech Stack
  • Open Source IDS
  • Suricata
  • Next-Gen Firewall
  • DNS Filtering
  • Email Gateway Tools
Implementation Scale
  • Enterprise-wide Deployment
Impact Metrics
  • Customer Satisfaction
  • Employee Satisfaction
  • Innovation Output
  • Productivity Improvements
Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Intrusion Detection
  • Cybersecurity & Privacy - Network Security
  • Cybersecurity & Privacy - Security Compliance
Applicable Industries
  • Education
Applicable Functions
  • Business Operation
  • Facility Management
Use Cases
  • Intrusion Detection Systems
Services
  • Software Design & Engineering Services
  • System Integration
  • Training
About The Customer
The University of Oklahoma (OU) is a prominent higher education institution with a large and diverse user base. It serves over 30,000 students and 7,000 full-time faculty and staff, in addition to providing user accounts to alumni, retirees, and distance learners. This results in approximately 90,000 user accounts accessing the university's IT infrastructure from over 120,000 devices each week during peak periods. The university's security team, led by Chief Information Security Officer Aaron Baillio, consists of 10 full-time employees and 3-4 student security analysts. The team is responsible for protecting the university's institutional data and guarding users against internal and external threats. Despite the small size of the team, they are committed to leveraging advanced technologies to enhance their security operations and provide valuable training opportunities for students interested in cybersecurity.
The Challenge
The University of Oklahoma faced a significant challenge in managing the vast number of security events generated by their network sensors. With over 80 million security events and 350 alerts per week, the small security team, consisting of 10 full-time employees and 3-4 student security analysts, struggled to monitor and respond to these events effectively. The high volume of false positives further complicated their efforts, making it nearly impossible to identify and address genuine threats promptly. The university's IT infrastructure, accessed by approximately 90,000 user accounts from over 120,000 devices, required a robust and efficient security solution to protect against internal and external threats.
The Solution
To address the overwhelming volume of security events, the University of Oklahoma implemented the Respond Analyst, an intelligent decision engine that automates the analysis and triage of network security data. This solution mimics a human analyst's decision-making process, allowing it to make escalation decisions with the same finesse and expert judgment as a human, but at machine speed. By integrating the Respond Analyst with their existing security tools, including open-source IDS, Palo Alto Networks IDS/IPS, Vectra Threat Detection Platform, and Nessus Vulnerability Scanner, the university achieved comprehensive sensor coverage and significantly reduced the number of false positives. The Respond Analyst's ability to filter and prioritize security events enabled the security team to focus on the most critical incidents, improving their overall efficiency and effectiveness. This automation allowed the team to devote more time to incident response workflows, threat hunting, and engineering and automating workflows, ultimately enhancing their ability to protect the university's IT infrastructure.
Operational Impact
  • The implementation of the Respond Analyst significantly reduced the alert volume, decreasing the number of escalated events from 350 per week to just 2-9 vetted incidents per week.
  • The security team experienced a reduction in alert fatigue, allowing them to focus on meaningful and actionable security events.
  • The automation provided by the Respond Analyst acted as a force multiplier, effectively adding the equivalent of 68 human security analysts to the team.
  • The university's security team was able to devote more time and effort to incident response workflows, improving their response times and overall efficiency.
  • The collaboration with Respond Software allowed the university to refine and develop more skills within the Respond Analyst, enhancing the effectiveness of their security automation software.
Quantitative Benefit
  • 99% decrease in noise volume.
  • Reduction from 350 escalated alerts per week to 2-9 vetted incidents per week.
  • Equivalent of adding 68 human security analysts to the team.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.