two people walking on a college campus near stairs

A Security “Team of One” Seeks Help from BitLyft

Organization: Midwest liberal arts university

Higher Education EnrollmentTotal student enrollment
13,000+
Higher Education Faculty/StaffFaculty and Staff
2,000+

Log Sources: 1,140 individual sources from: HP, Cisco, Palo Alto, Barracuda, Trend Micro, Apache, IIS, Azure, and Qualys.
Key Impacts:

  • Reduced and remediated compromised accounts
  • Closed gaps in network visibility
  • Provided a central source of logging

“BitLyft provides that extra set of eyes and expertise we’re not able to have on staff.” Information Security Officer

The Challenge:

Managing the security posture of a university is no small task. This is especially true when you have to manage it on your own. For one Information Security Officer (ISO) at a liberal arts university in the Midwest, this workload was the norm. A lack of time, resources, and expertise meant this “team of one” had to rely on other department members to fill in security gaps surrounding infrastructure, applications, endpoint users, etc.

The university’s security “team” also faced challenges like having no centralized logging and experiencing large gaps in network visibility. The university required additional insight into both internal traffic and the types of traffic entering and exiting the network.

To help remediate the situation, the institution purchased LogRhythm’s Security Incident Event Management (SIEM) to run on-prem. The university attempted to manage the program on its own for a few months but quickly realized additional resources were required to fully take advantage of the tool’s capabilities.

Download the PDF below to see how partnering with BitLyft solved the cybersecurity problems of this university:



 

More Reading

Breaking Down the Biden National Cybersecurity Strategy: Key Takeaways feature image read more
Breaking Down the Biden National Cybersecurity Strategy: Key Takeaways
On March 2, 2023, the White House released its National Cybersecurity Strategy. The overarching goal of the plan is to "create a...
Cybersecurity Showdown: Comparing the Top SOC as a Service Companies feature image read more
Cybersecurity Showdown: Comparing the Top SOC as a Service Companies
A business's security operations center (SOC) is a business unit that contains all of a company's security personnel. These highly trained...
ChatGPT: How AI and Machine Learning is Revolutionizing Cybersecurity feature image read more
ChatGPT: How AI and Machine Learning is Revolutionizing Cybersecurity
Advances in technology and artificial intelligence (AI) change the way people work by eliminating manual tasks and improving the digestion...