Case-study-header-2

University asks BitLyft to Take Over Cybersecurity

Organization: Private university in Mississippi

Total student enrollment
5,000+
Programs and certificates
130+

Log Sources: 218 total sources from HP, Linux, GSuite, Palo Alto, CrowdStrike, IIS Web Server, Manage Engine, ProCurve Switch, Zeek Network Monitor, Qualys Vulnerability Scanner, Apache Web Server, Windows Servers

“We know that we can count on the BitLyft team to stick with us until any concerns on our side are taken care of.” Network and Security Manager

The Challenge:

As cybersecurity concerns grow and regulations expand, many organizations find themselves in search of information. This was true for the IT staff of a private university in Mississippi. After attending a couple of cybersecurity conferences and reading more about the topic, the university determined it needed a strategy. With some knowledge in hand, the institution signed a contract with a consultant from one of the conferences. The contract included an annual risk assessment and advisory services.

During their first year of partnership, the consultant covered network monitoring. The university gained a lot of insight about the topic but realized it was not adequately prepared to handle the workload on its own. Not only did the institution lack staff, but they didn’t have the right certifications or subject matter experts. In addition, the team didn’t have the time to only work on this one aspect of their business. According to the audit, the university needed to hire a Chief Security Information Officer (CISO) or Chief Security Officer (CSO), but it lacked the budget to cover a salary range this substantial.

Further contributing to the IT staff’s challenges was the plethora of alerts coming in from their Security Incident and Event Management (SIEM) system. “We were trying to process all of the traffic the university has to process and we could not keep up with the raw data or the number of alerts coming out of the system,” said the university’s Network and Security Manager.

With this knowledge in place, the university began to look for a third-party to monitor their systems.

Download the PDF below to see how partnering with BitLyft helped secure this private university:



 

More Reading

SIEM as a Service

What is SIEM-as-a-Service? (A Guide To Managed SIEM Service)

In today’s changing technological and economic landscapes, cybersecurity has never been more important. But how do you keep your organization’s information secure while maintaining compliance? SIEM-as-a-Service might be the answer. …

What is SIEM-as-a-Service? (A Guide To Managed SIEM Service) Read More »

SIEM-as-a-Service vs. SIEM On-Prem: Pros & Cons

Security Information Event Management, or SIEM-as-a-Service, technology is a crucial part of any organization’s cybersecurity strategy. But should you install your SIEM tools on-prem? Or should you rely on a …

SIEM-as-a-Service vs. SIEM On-Prem: Pros & Cons Read More »

Managed SIEM Service: Do I Get My Data?

SIEM tools can be a crucial part of securing your organization’s network. And a managed SIEM service can be an efficient and affordable way to utilize SIEM security. But here’s …

Managed SIEM Service: Do I Get My Data? Read More »

Managed SIEM Services

How Mature Is Your Managed SIEM Service?

Here’s a little trick to help you determine whether your managed SIEM is a mature solution: ask your service provider what the ‘M’ in SIEM stands for. What you may …

How Mature Is Your Managed SIEM Service? Read More »

About the Author

Avatar

Emily Miller

Scroll to Top