Global research: Security leaders’ priorities for cloud integrity, the talent gap and the most urgent attack vectors.
Splunk optimizes our hybrid multicloud journey and maximizes ROI for us.
Before Splunk, ACE couldn’t centrally correlate security data from multiple devices, thus reducing multicloud visibility, slowing event response and driving up labor costs.
Splunk helped ACE enhance security monitoring with faster threat hunting and real-time event response, cut costs by 10 percent, simplify system maintenance, raise efficiency and secure user assets.
Founded in 2018, ACE Exchange is Taiwan’s first legal cryptocurrency exchange that lets users buy and sell Bitcoin (BTC), Ethereum (ETH) and Tether (USDT) with New Taiwan Dollar. It offers the largest number of financial tools to date, aiming to facilitate the migration from DeFi to CeFi, and the most comprehensive range of cross-chain services. To support its extensive blockchain transaction and incubation ecosystem, ACE needed an effective security monitoring platform. The platform needed to fuel the steady growth of ACE while protecting the security of user assets and ensuring legal compliance and business continuity.
However, the open-source analytics platform that ACE used wasn’t up to par. It couldn’t centralize data, correlate logs for detecting anomalous transactions or oversee resource usage and allocation across its growing multicloud environment. This meant ACE’s security team had to log into different consoles just to investigate a single issue, which delayed MTTD while making it tough to predict advanced threats. The platform was also difficult to maintain, requiring human intervention for data onboarding and dashboard customization, putting pressure on the team and limiting hardware functionality.
For granular visibility into its complex environment, ACE turned to Splunk to make its security posture stronger, threat hunting more robust and operations more efficient.
“With Splunk, we finally got the security analytics platform of our dreams,” says Fngi Hsu, chief information security officer of ACE Exchange. Splunk was perfect for managing the complexity of the organization’s multicloud environment, automatically collecting log data from all public cloud computing platforms ACE uses — including Google Cloud, Amazon Web Services and Microsoft Azure — then generating a complete picture of the company’s security posture for quicker threat hunting, real-time event response and more reliable monitoring. ACE’s security teams also benefited from Splunk’s intuitive dashboards, relying on them to predict, detect and respond to different types of threats.
Adopting Splunk has massively reduced security teams’ workloads. “The simple, easy-to-learn Splunk Search Processing Language not only solves the slow search problem of the old platform, but also enables us to flexibly adjust the dashboard and alert settings to meet our security needs, especially the new ‘A.8.16 Monitoring Activities’ control item of the ISO27001:2022 practice,” Hsu explains. “Credit also goes to the Splunk Mobile app, which gives us access to dashboards, reports and alerts from a single interface on the go. Instead of working night shifts in the office, the team can now stay connected with the Splunk platform anytime, anywhere.”
ACE has also used Splunk to develop machine learning models that predict cyber threats and alert on security incidents. This reduces repetitive, manual tasks, meaning that jobs that once took seven days to complete now only take two. These productivity savings allow team members to focus on what matters most while enabling ACE to reallocate its resources for other strategic security initiatives.
Splunk optimizes our hybrid multicloud journey and maximizes ROI for us.