Bringing it all together
In a fast-paced, high-stress environment like a hospital, confusion created by tool complexity is the last thing that security teams need to contend with. But before implementing Splunk, Finney and her team dealt with it daily. To add another complication layer, teams ran numerous specialized tools and applications specific to pediatric medicine, contributing to swivel chair syndrome and compounded visibility issues.
“There was no one place where all the information produced from those tool sets was gathered into one centralized location. We had to switch between tools, manually correlating data or trying to spot incidents as they happened or shortly after. It became overwhelming – humans simply can't process that much information,” said Finney.
Finney and her team needed a centralized platform to aggregate data from devices, identity assets, and network traffic, enabling normalization and correlation before evaluating it against modern attack frameworks, regulatory standards and various threat vectors.
Splunk’s centralized platform allowed them to see the attack environment more clearly, including which threats they successfully blocked. It also allowed them to see the threats getting through their security defenses, as well as indicators of compromise (IoC) from threat intelligence feeds so they could detect threats traveling laterally, then alerting Finney’s teams so they could respond faster and more accurately.
“The bad actors only have to be right one time, but I have to be right every time. In order to be right every time with that much data and that many disparate tools, I have to hire a correlation engine that can bring all that together,” said Finney. “With the right tools in place, we’re now uncovering more insights every day."