Verizon Partners with Splunk to Create Actionable Security Intelligence

Mike Vizard
Slide Show

A New Security Approach to Combat Today's Threats

While Verizon Enterprise Solutions is considered one of the most authoritative sources when it comes to information concerning security breaches, turning all that data into something that represents actionable intelligence has been another matter altogether.

To solve that particular issue, Verizon has partnered with Splunk to create a downloadable application that IT security teams can use to see how their vulnerabilities line up against the attack vectors most commonly being employed by cybercriminals.

Jonathan Nguyen-Duy, CTO for global security services at Verizon Enterprise Solutions, says IT organizations can plug the historical data that Verizon collects via its Data Breach Investigations Report (DBIR) into the security information event management platform that Splunk has created on top of its software for searching and analyzing machine log data. All told, Verizon has collected 10 years of data involving more than 8,000 breaches and nearly 195,000 security incidents.

Nguyen-Duy says at its most basic level, the downloadable application will make it a lot easier for IT organizations to identify commonly exploited vulnerabilities. But over time, Nguyen-Duy says that Verizon expects to exploit machine learning technology to provide security intelligence in real time via the Splunk analytics engine.


Nguyen-Duy notes that SIEM platforms today discover less than 1 percent of the attacks being launched against the enterprise, which makes many IT organizations question the value of making such an investment. By taking advantage of a machine data analytics platform such as Splunk, Nguyen-Duy says that it becomes much simpler for organizations to prioritize IT security fixes based on the potential severity of threat to their IT organization. Later on, Nguyen-Duy says Verizon hopes to automate the intrusion detection process to create a truly closed-loop security solution.

Of course, it may take a while before the malware detection process gets fully automated. But in the meantime, the data that IT security services continually collect is about to become a lot more useful.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.



Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.