On Friday, March 12th, ChaosSearch announced that its ChaosSearch Data Platform won Gold for two product categories in the 2021 Cybersecurity Excellence Awards: Best Security Analytics Solution and Best Security Log Analysis solution.
Of course, we are thrilled to be recognized for our leadership and innovation in security analytics, but beyond that, these awards help to highlight ChaosSearch’s advantages in an area of growing importance to Security Operations (SecOps) teams.
Taking two golds in one of the cybersecurity industry’s most prominent award events validates something our customers have known since our inception a few years ago: The ChaosSearch Data Platform is an ideal foundation of an enterprise’s overall cybersecurity architecture.
We thought we’d take this opportunity to provide a little more background on what led the Cybersecurity Excellence Award judges to name us winners of these two key categories, and what the broader implications are for SecOps teams looking to improve their overall security posture by improving their analytical capabilities.
Read the Solutions Brief: Scalable Log Analytics for Security Operations and Threat Hunting
At its heart, cybersecurity is an analytical field. SecOps teams are in a state of continual analysis—analyzing new threats in the global landscape, analyzing specific vulnerabilities in their environment, analyzing various alerts to determine whether benign or malicious, etc. A platform that centralizes the important data (inputs) and allows for analysis, queries, visualization, and reports (outputs) is crucial to a well-functioning, high-performance SecOps team.
Log data specifically is the lifeblood of the cyberdefense operation.
Log data is where every transaction and every event across an organization’s entire IT landscape is captured and stored. Specifically, log data can provide details on extreme traffic, unauthorized access, suspicious changes, and many other pointers used to identify potential threats. As these logs are consolidated and stored, they become a “single source of truth”, giving SecOps teams the ability to scan history to see what has happened and take the pulse of the current situation to assess threats and what may happen.
To make use of log data, SecOps teams require a centralized log management and analytics system to organize and index data and make it searchable. In a recent report, Gartner examined the role of a centralized log management platform for security. The diagram below highlights some of the common uses of log analytics in an organization’s security operation.
In conducting the various analyses that allow them to keep their corporate assets safe, SecOps teams always want more data, rather than less. Provided they have the means to quickly and efficiently analyze it, having access to more data, from more sources, including long-term historical data allows them to more effectively find and block threats, stop hacks in their tracks, mitigate the damage of threats, and investigate breaches that did occur to find and fix the root cause problems.
Given the thirst for more data, the most important quality of a centralized log analytics platform is its ability to scale. This is where most solutions fall short today (more on that later). As SecOps teams evaluate centralized analytics platforms, scalability should be assessed in a few dimensions:
There is an important underlying factor that impacts a system’s ability to scale up that is worth highlighting here: The ability of the system to ingest new data sources easily, without significant planning or disruption.
As we survey SecOps teams today, we find that while they all use analytics platforms in their overall operation, their use is suboptimal. In most cases, the analytics platform in use is limited in scale, forcing SecOps teams to ingest less data from less sources, and retain data for shorter periods of time. A common by-product of the inherent scale limitations is to create multiple islands of storage. While this approach achieves more overall capacity, it comes with the problems of managing a sprawling environment of disparate clusters, leading to significant cost, complexity, and wasted time of the team.
You might have guessed the answer already: The core advantage of the ChaosSearch Data Platform – and the key to the two Golds -- is its ability to massively scale, both up and out. While that answer might have been obvious, the way we do it is completely unique.
The ChaosSearch Data Platform does what the legacy platforms cannot—it allows customers to collect and analyze ALL of their data without tradeoffs, with virtually unlimited scalability, and with massive cost savings. Our customers typically see 50-80% annual cost savings compared to their legacy solution.
The ChaosSearch approach solves the two primary inhibitors of the legacy solutions that prevent them from scaling efficiently. First, legacy solutions have complex data pipelines which entail data parsing or transformations on ingest. This introduces a significant bottleneck and reduces the maximum data volume that can be processed daily. Secondly, they are “closed systems”, which means that once data is ingested, they take custody of the data and are responsible for not just the data itself but the underlying layers of the infrastructure stack. This impacts both the daily workload and the overall storage capacity of the system, which in turn, limits the customer’s data retention period.
Instead of ingesting, manipulating, and managing the data as a custodian, ChaosSearch simply connects to and indexes all of the data within the customer’s cloud storage environment- such as Amazon AWS or Google GCP. This is a fundamentally different approach. As new data floods in daily, ChaosSearch continually indexes it in real-time without any performance hit to the data ingest speeds. Since we never take custody of the underlying data, we avoid complex data pipelines and avoid the need for any data parsing or data transformation. ChaosSearch indexes data as-is, while auto-detecting native schemas.
Once indexed, the ChaosSearch platform allows customers to conduct search and analytics on the data using existing tools in use today, like Kibana, leveraging the open APIs of these tools. This unique approach allows us to enable all of the required security analytics use cases that customers need, while leveraging the performance, scale, and economics of the public cloud. It’s this approach that is key to customers like Armor selecting ChaosSearch to run all of their security analytics.
“With our daily log and event volume exceeding tens of terabytes a day and growing, it became clear that we needed to find a new log analysis solution which could scale with Armor’s growing business,” said Josh Bosquez, Chief Technology Officer at Armor, a cybersecurity software provider with over 1500 customers worldwide. “We explored several options, and found that ChaosSearch could deliver the reliability, scale and expanded retention we needed.”
With ChaosSearch, SecOps teams can switch from legacy systems that are limited in performance and scale, and adopt a security data lake approach that allows them to easily manage massive volumes of security event data from multiple sources, with near-infinite scalability.
By allowing customers to centralize more data, from a wider range of sources, and retain data online for 12 months or longer, ChaosSearch enables significant improvements in several security use cases that require log analysis including monitoring and alerting, forensic investigations, threat hunting, and several others.
With this unique approach, we are helping companies realize the vision and the promise of the data lake. This is really the key that allows us to deliver unlimited scalability, industry-leading resiliency, and massive time and cost savings.
Given our approach, many customers and analysts suggest that ChaosSearch helps them achieve a security data lake. A security data lake is a central repository of all security-related data designed to support cost-effective high-volume data storage and expanded data access for the SecOps team, leading to increased data utilization, better analyses, and ultimately a superior overall security posture.
As the diagram shows, data comes streaming into the centralized security data lake from a large number of sources, and the goal is to make all of that data accessible to the SecOps teams when and how they need it, by making the entire data lake searchable and ready for analytics.
Thus, the core attributes of an effective security data lake include:
Indeed, this is exactly what ChaosSearch enables for SecOps teams. The diagram below brings it together to show how the ChaosSearch Data Platform connects to a customer’s existing cloud storage—in this case either Amazon AWS or Google GCP – and allows for various analytical use cases on all of the data within the security data lake.
So, now that we’ve demonstrated what’s different about the ChaosSearch Data Platform, and how our approach delivers superior scalability and economics compared to all other alternatives, let’s bring it back to how customers today leverage the ChaosSearch data platform to improve their overall cybersecurity operations. After all, it is how we help the SecOps team that won us the two Gold Medals!
Generally, we’ve shown that SecOps teams need more access to more data, in order to do their jobs effectively. And we’ve shown how ChaosSearch has clear advantages over alternatives, by enabling a massively scalable security data lake approach. Where the rubber meets the road is how SecOps teams use the data in various security use cases that require access to data at scale. Below are a few prominent examples of how our customers use the ChaosSearch Data Platform today to improve their overall cyber defenses and threat readiness posture.
Stephen Salinas, Engineering Lead at HubSpot, commented, “ChaosSearch now serves as one of our team’s primary monitoring tools for identifying DDoS attacks and protecting our customers from them. The additional data retention also serves to help our security team audit issues over past months to better identify bad actors.”
The significance of the Cybersecurity Excellence awards is that it helps highlight the crucial role of a scalable, centralized analytics platform in an organization’s overall security operation.
Given its unique “data lake” approach, ChaosSearch delivers unmatched scalability, both in terms of the daily data ingest rate and the long-term data retention period, giving SecOps teams more access to more data—exactly what they need to conduct various mission-critical operations such as forensic investigations, threat hunting, and DDoS attack mitigation. With the growing recognition of the need for superior analytics in cybersecurity, ChaosSearch is an ideal solution to deploy at the foundation of an enterprise’s overall security architecture.