A Security “Team of One” Seeks Help from BitLyft

Organization: Midwest liberal arts university

Higher Education EnrollmentTotal student enrollment
13,000+
Higher Education Faculty/StaffFaculty and Staff
2,000+

Log Sources: 1,140 individual sources from: HP, Cisco, Palo Alto, Barracuda, Trend Micro, Apache, IIS, Azure, and Qualys.
Key Impacts:

  • Reduced and remediated compromised accounts
  • Closed gaps in network visibility
  • Provided a central source of logging

“BitLyft provides that extra set of eyes and expertise we’re not able to have on staff.” Information Security Officer

The Challenge:

Managing the security posture of a university is no small task. This is especially true when you have to manage it on your own. For one Information Security Officer (ISO) at a liberal arts university in the Midwest, this workload was the norm. A lack of time, resources, and expertise meant this “team of one” had to rely on other department members to fill in security gaps surrounding infrastructure, applications, endpoint users, etc.

The university’s security “team” also faced challenges like having no centralized logging and experiencing large gaps in network visibility. The university required additional insight into both internal traffic and the types of traffic entering and exiting the network.

To help remediate the situation, the institution purchased LogRhythm’s Security Incident Event Management (SIEM) to run on-prem. The university attempted to manage the program on its own for a few months but quickly realized additional resources were required to fully take advantage of the tool’s capabilities.

Download the PDF below to see how partnering with BitLyft solved the cybersecurity problems of this university:



 

More Reading

feature image read more
Top 15 Tips for Protecting Your Intellectual Property
How are you protecting your company's intellectual property? For many companies the answer is "Talk to legal."
feature image read more
Top 7 Cyber Threats for Manufacturing Companies
While financial institutions, medical facilities, and even retail chains have been forced to face the dangers of cyber threats,...
feature image read more
Cybersecurity Considerations for Industry 4.0
Did you know we are currently in the midst of the most rapid digital transformation in human history? Every day, new and more...