A Security “Team of One” Seeks Help from BitLyft

Organization: Midwest liberal arts university

Higher Education EnrollmentTotal student enrollment
13,000+
Higher Education Faculty/StaffFaculty and Staff
2,000+

Log Sources: 1,140 individual sources from: HP, Cisco, Palo Alto, Barracuda, Trend Micro, Apache, IIS, Azure, and Qualys.
Key Impacts:

  • Reduced and remediated compromised accounts
  • Closed gaps in network visibility
  • Provided a central source of logging

“BitLyft provides that extra set of eyes and expertise we’re not able to have on staff.” Information Security Officer

The Challenge:

Managing the security posture of a university is no small task. This is especially true when you have to manage it on your own. For one Information Security Officer (ISO) at a liberal arts university in the Midwest, this workload was the norm. A lack of time, resources, and expertise meant this “team of one” had to rely on other department members to fill in security gaps surrounding infrastructure, applications, endpoint users, etc.

The university’s security “team” also faced challenges like having no centralized logging and experiencing large gaps in network visibility. The university required additional insight into both internal traffic and the types of traffic entering and exiting the network.

To help remediate the situation, the institution purchased LogRhythm’s Security Incident Event Management (SIEM) to run on-prem. The university attempted to manage the program on its own for a few months but quickly realized additional resources were required to fully take advantage of the tool’s capabilities.

Download the PDF below to see how partnering with BitLyft solved the cybersecurity problems of this university:



 

More Reading

feature image read more
10 Threat Intelligence Resources for Evaluating the Risk of Cyberattacks
Cyber threats are growing in both number and complexity. While this growth puts businesses of all sizes at risk, cybersecurity...
feature image read more
What Is Vulnerability Management? How Does It Work
In the business world, it's important to be able to protect your company from cyber-attacks. This is where vulnerability management comes...
feature image read more
The Growing Threat of Ransomware Attacks on Hospitals
Ransomware attacks are carried out on all types of organizations, costing companies and their customers millions. When these attacks are...