SlideShare a Scribd company logo
Presenter: Jac Noel
Prepared for Kafka Summit Americas – Sep 2021
Building a Modern, Scalable Cyber
Intelligence Platform with Apache Kafka®
2
Notices and Disclaimers
This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Intel, the Intel logo, Intel Core, Intel Optane and Xeon are trademarks of Intel Corporation or its subsidiaries.
Other names and brands may be claimed as the property of others.
Copyright © 2021, Intel Corporation. All rights reserved.
3
Jac Noel has over 25 years of Information Technology and
Cyber Security experience across the military, government,
and corporate environments.
He started his technical career in the United States Air Force
supporting military intelligence systems for the AF mission in
EMEA. He has spent the past 20 years serving in various
technical roles in Intel’s IT organization. He’s currently serving
as a Security Solutions Architect focusing on security
intelligence and response capabilities. He’s the lead architect
for Intel’s Cyber Intelligence Platform (CIP), which is a next-
gen solution combining a data lake, message bus, stream
processing, machine-learning, orchestration, and workflow
automation into a single platform.
Jac holds a Bachelor of Science degree from Chico State
University and has earned numerous professional certifications
over the years, including CISSP, GCFW, CCNA, and MCSE.
He’s also a proud inventor, patent holder, author of several
white papers, and presenter at many public and private forums.
Jac Noel
Security Solutions Architect
Intel Corporation
4
Intel’s Information Security Mission
Our mission is to
Keep Intel Legal and Secure!
Ways we measure our
success:
1. Better Preventive controls
2. More effective detective controls
– Mean Time to Detect
– Mean Time to Respond
– Mean Time to Recover
Cyber Intelligence Platform - Reference Architecture
People + Technology + Data
5
High Performance Compute & Storage
BU
Partners
IT
Partners
Message
Bus
Stream
Processing
Cyber Intelligence Platform - Solution Stack
6
Enterprise Security Message Bus
CONFLUENT
PLATFORM
No Message Bus
▪ Point to point, complex
▪ Slow to implement
▪ Increased technical debt due to tightly-coupled solutions
and brittle integrations
▪ No orchestration (custom-code it, multiple times)
▪ No transformation (custom-code it, multiple times)
▪ Slow to move data between multiple capabilities
▪ Harder to monitor and govern
With Message Bus
▪ Data Transformation (enrich, aggregate, normalize)
▪ Near real-time integration (streaming)
▪ Resilient, robust, scalable, available
▪ Orchestrate multiple activities in one place
▪ Cross-capability consumption
▪ Platform independent, plug and play
▪ Apps loosely coupled but tightly integrated
▪ Common architectural element for large enterprises
The Power of the Kafka Bus
App App App App App App
App App App App App App
App App App App App App
App App App App App App
Message Bus
Abstraction, Resiliency, Scalability, Availability
Transform Orchestrate
7
Built with industry leading technologies Splunk and Kafka
8
Improving Data Availability with Confluent MRC
9
Single Cluster
Data Center 3
Producers Consumers
Streaming Apps
Consumers
Producers
Data Center 1
Leaders (ISR)
Zookeeper 1
Zookeeper 2
Broker n
Broker 2
Broker 1
Broker 3
…
Mirroring
Data Center 2
Observers
Zookeeper 3
Zookeeper 4
Broker n
Broker 2
Broker 1
Broker 3
…
Zookeeper 5
Asynchronous Replication for Faster Recovery
10
Single Cluster
Data Center 3
Producers Consumers
Streaming Apps
Consumers
Producers
Data Center 1
Zookeeper 1
Zookeeper 2
Broker n
Broker 2
Broker 1
Broker 3
…
Mirroring
Data Center 2
Leaders (ISR)
Zookeeper 3
Zookeeper 4
Broker n
Broker 2
Broker 1
Broker 3
…
Zookeeper 5
Confluent Platform with Multi Region Clusters
Managing Vulnerabilities with Stream Processing
11
Confluent Platform
Producers Kafka Streams API
Stream Processing
Kafka Bus
Vulnerability
Topic Filter
Vulnerabilities by
Business Unit
IP Address
Range Topic
Join Asset
Asset Inventory
Topic
Ownership with Consumers
Vulnerable Assets
BU #1’s
Vulnerabilities Topic
Data Lake
BU Partners
BU #2’s
Vulnerabilities Topic
IT Partners
BU #3’s
Vulnerabilities Topic
SIEM
Vulnerabilities
with Owners Topic
Enforcement
SOAR
Scanning
Engine
IP Address
Management
Asset Management
Inventory
Vulnerabilities
Asset configuration, CVEs, CVSS
IP Address Ranges
Ownership, Business Units
Asset Ownership
Kafka By The Numbers
12
20+
TB/DAY
135+
32+
CONSUMERS
DATA
SOURCES
320+
TOPICS
90+
PRODUCERS
>20B
EVENTS/DAY
Kafka
by the
Numbers
~8 trillion events indexed by Splunk in 2020
Kafka Maturity
Timeline
13
Acquire once-consume
many
Integration efficiency
Remove the noise, and
duplication
Cost savings for downstream consumers
Join multiple sources
Contextually rich + clean data downstream
ACQUIRE
DATA
FILTERING
ENRICHMENT
SUMMARIZATION
ADVANCE
D
Autonomous
Actions
e.g. Cluster analysis, ML
Produce summary statistics
State information, performance benefit
and downstream cost savings
Kafka - Benefits to Intel
14
KAFKA LEADERSHIP
THROUGH CONFLUENT
EXPERTISE
GENERATES
CONTEXTUALLY RICH
DATA
MODERN
ARCHITECTURE WITH
THRIVING COMMUNITY
GLOBAL
SCALE AND REACH
OPERATE ON DATA
IN STREAM
ECONOMIES
OF SCALE
REDUCE TECHNICAL
DEBT AND
DOWNSTREAM COSTS
ALWAYS
ON
15
Summary
Transformed how Intel’s Information Security works
• Enterprise Security Message Bus
• Modern and Scalable
• Loosely coupled our People + Technology + Data
• Highly Integrated and Automated
• Faster Detection and Response
• Greater Insights into better Prevention
• A Platform for the Future
• More Secure!
Additional Resources
https://www.intel.com/content/www/us/en/it-management/intel-it-best-practices/modern-scalable-cyber-intelligence-platform-kafka.html
16
Solution Brief and
Reference
Architecture
17
Thank You!
Live Q&A
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | Jac Noel, Intel Corp

More Related Content

What's hot (20)

PDF
DataOps Automation for a Kafka Streaming Platform (Andrew Stevenson + Spiros ...
HostedbyConfluent
 
PDF
Death of the dumb pipes: Using Apache Kafka® for Integration projects
HostedbyConfluent
 
PDF
Using Kafka as a Database For Real-Time Transaction Processing | Chad Preisle...
HostedbyConfluent
 
PPTX
Keep your Metadata Repository Current with Event-Driven Updates using CDC and...
confluent
 
PDF
Guaranteed Event Delivery with Kafka and NodeJS | Amitesh Madhur, Nutanix
HostedbyConfluent
 
PDF
user Behavior Analysis with Session Windows and Apache Kafka's Streams API
confluent
 
PPTX
Reactive Fast Data & the Data Lake with Akka, Kafka, Spark
Todd Fritz
 
PDF
Flattening the Curve with Kafka (Rishi Tarar, Northrop Grumman Corp.) Kafka S...
confluent
 
PDF
War Stories: DIY Kafka
confluent
 
PDF
Achieve Sub-Second Analytics on Apache Kafka with Confluent and Imply
confluent
 
PDF
Introduction to Apache Kafka and Confluent... and why they matter
confluent
 
PPTX
Cloud-Based Event Stream Processing Architectures and Patterns with Apache Ka...
HostedbyConfluent
 
PPTX
Live Coding a KSQL Application
confluent
 
PPTX
One Click Streaming Data Pipelines & Flows | Leveraging Kafka & Spark | Ido F...
HostedbyConfluent
 
PDF
Leveraging Mainframe Data for Modern Analytics
confluent
 
PDF
What is Apache Kafka and What is an Event Streaming Platform?
confluent
 
PPTX
PCAP Graphs for Cybersecurity and System Tuning
Dr. Mirko Kämpf
 
PDF
Building Streaming And Fast Data Applications With Spark, Mesos, Akka, Cassan...
Lightbend
 
PDF
Simplify Governance of Streaming Data
confluent
 
PDF
Migrating from One Cloud Provider to Another (Without Losing Your Data or You...
HostedbyConfluent
 
DataOps Automation for a Kafka Streaming Platform (Andrew Stevenson + Spiros ...
HostedbyConfluent
 
Death of the dumb pipes: Using Apache Kafka® for Integration projects
HostedbyConfluent
 
Using Kafka as a Database For Real-Time Transaction Processing | Chad Preisle...
HostedbyConfluent
 
Keep your Metadata Repository Current with Event-Driven Updates using CDC and...
confluent
 
Guaranteed Event Delivery with Kafka and NodeJS | Amitesh Madhur, Nutanix
HostedbyConfluent
 
user Behavior Analysis with Session Windows and Apache Kafka's Streams API
confluent
 
Reactive Fast Data & the Data Lake with Akka, Kafka, Spark
Todd Fritz
 
Flattening the Curve with Kafka (Rishi Tarar, Northrop Grumman Corp.) Kafka S...
confluent
 
War Stories: DIY Kafka
confluent
 
Achieve Sub-Second Analytics on Apache Kafka with Confluent and Imply
confluent
 
Introduction to Apache Kafka and Confluent... and why they matter
confluent
 
Cloud-Based Event Stream Processing Architectures and Patterns with Apache Ka...
HostedbyConfluent
 
Live Coding a KSQL Application
confluent
 
One Click Streaming Data Pipelines & Flows | Leveraging Kafka & Spark | Ido F...
HostedbyConfluent
 
Leveraging Mainframe Data for Modern Analytics
confluent
 
What is Apache Kafka and What is an Event Streaming Platform?
confluent
 
PCAP Graphs for Cybersecurity and System Tuning
Dr. Mirko Kämpf
 
Building Streaming And Fast Data Applications With Spark, Mesos, Akka, Cassan...
Lightbend
 
Simplify Governance of Streaming Data
confluent
 
Migrating from One Cloud Provider to Another (Without Losing Your Data or You...
HostedbyConfluent
 

Similar to Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | Jac Noel, Intel Corp (20)

DOC
Resume_Appaji
Appaji K
 
PPTX
Splunk FISMA for Continuous Monitoring
Greg Hanchin
 
PDF
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Intel® Software
 
PPTX
stackArmor - Security MicroSummit - McAfee
Gaurav "GP" Pal
 
DOC
Anil Info
Anil Kumar Mullapudi
 
PDF
Enancing Threat Detection with Big Data and AI
Databricks
 
PPTX
SplunkLive! Toronto - Ceryx
Splunk
 
DOCX
kavita_resume_3
Kavita Raghunathan
 
PDF
federal reserve.
Sandro Suzart
 
DOCX
Kavita resume startup
Kavita Raghunathan
 
PDF
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Precisely
 
PDF
IT Network Asset Discovery & Inventory
ikirmer
 
DOCX
Kavita resume
Kavita Raghunathan
 
PDF
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
StampedeCon
 
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
PDF
Evolution from EDA to Data Mesh: Data in Motion
confluent
 
PDF
Splunk Sales Presentation Imagemaker 2014
Urena Nicolas
 
PPTX
Webinar leveraging-cloud-sandboxes-with-ansible-jenkins-j frog
QualiQuali
 
PPTX
Cyber security innovation imho v5
W Fred Seigneur
 
PPTX
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
Resume_Appaji
Appaji K
 
Splunk FISMA for Continuous Monitoring
Greg Hanchin
 
Red Hat® Ceph Storage and Network Solutions for Software Defined Infrastructure
Intel® Software
 
stackArmor - Security MicroSummit - McAfee
Gaurav "GP" Pal
 
Enancing Threat Detection with Big Data and AI
Databricks
 
SplunkLive! Toronto - Ceryx
Splunk
 
kavita_resume_3
Kavita Raghunathan
 
federal reserve.
Sandro Suzart
 
Kavita resume startup
Kavita Raghunathan
 
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Precisely
 
IT Network Asset Discovery & Inventory
ikirmer
 
Kavita resume
Kavita Raghunathan
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
StampedeCon
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Evolution from EDA to Data Mesh: Data in Motion
confluent
 
Splunk Sales Presentation Imagemaker 2014
Urena Nicolas
 
Webinar leveraging-cloud-sandboxes-with-ansible-jenkins-j frog
QualiQuali
 
Cyber security innovation imho v5
W Fred Seigneur
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
Ad

More from HostedbyConfluent (20)

PDF
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
 
PDF
Renaming a Kafka Topic | Kafka Summit London
HostedbyConfluent
 
PDF
Evolution of NRT Data Ingestion Pipeline at Trendyol
HostedbyConfluent
 
PDF
Ensuring Kafka Service Resilience: A Dive into Health-Checking Techniques
HostedbyConfluent
 
PDF
Exactly-once Stream Processing with Arroyo and Kafka
HostedbyConfluent
 
PDF
Fish Plays Pokemon | Kafka Summit London
HostedbyConfluent
 
PDF
Tiered Storage 101 | Kafla Summit London
HostedbyConfluent
 
PDF
Building a Self-Service Stream Processing Portal: How And Why
HostedbyConfluent
 
PDF
From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...
HostedbyConfluent
 
PDF
Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...
HostedbyConfluent
 
PDF
Navigating Private Network Connectivity Options for Kafka Clusters
HostedbyConfluent
 
PDF
Apache Flink: Building a Company-wide Self-service Streaming Data Platform
HostedbyConfluent
 
PDF
Explaining How Real-Time GenAI Works in a Noisy Pub
HostedbyConfluent
 
PDF
TL;DR Kafka Metrics | Kafka Summit London
HostedbyConfluent
 
PDF
A Window Into Your Kafka Streams Tasks | KSL
HostedbyConfluent
 
PDF
Mastering Kafka Producer Configs: A Guide to Optimizing Performance
HostedbyConfluent
 
PDF
Data Contracts Management: Schema Registry and Beyond
HostedbyConfluent
 
PDF
Code-First Approach: Crafting Efficient Flink Apps
HostedbyConfluent
 
PDF
Debezium vs. the World: An Overview of the CDC Ecosystem
HostedbyConfluent
 
PDF
Beyond Tiered Storage: Serverless Kafka with No Local Disks
HostedbyConfluent
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
 
Renaming a Kafka Topic | Kafka Summit London
HostedbyConfluent
 
Evolution of NRT Data Ingestion Pipeline at Trendyol
HostedbyConfluent
 
Ensuring Kafka Service Resilience: A Dive into Health-Checking Techniques
HostedbyConfluent
 
Exactly-once Stream Processing with Arroyo and Kafka
HostedbyConfluent
 
Fish Plays Pokemon | Kafka Summit London
HostedbyConfluent
 
Tiered Storage 101 | Kafla Summit London
HostedbyConfluent
 
Building a Self-Service Stream Processing Portal: How And Why
HostedbyConfluent
 
From the Trenches: Improving Kafka Connect Source Connector Ingestion from 7 ...
HostedbyConfluent
 
Future with Zero Down-Time: End-to-end Resiliency with Chaos Engineering and ...
HostedbyConfluent
 
Navigating Private Network Connectivity Options for Kafka Clusters
HostedbyConfluent
 
Apache Flink: Building a Company-wide Self-service Streaming Data Platform
HostedbyConfluent
 
Explaining How Real-Time GenAI Works in a Noisy Pub
HostedbyConfluent
 
TL;DR Kafka Metrics | Kafka Summit London
HostedbyConfluent
 
A Window Into Your Kafka Streams Tasks | KSL
HostedbyConfluent
 
Mastering Kafka Producer Configs: A Guide to Optimizing Performance
HostedbyConfluent
 
Data Contracts Management: Schema Registry and Beyond
HostedbyConfluent
 
Code-First Approach: Crafting Efficient Flink Apps
HostedbyConfluent
 
Debezium vs. the World: An Overview of the CDC Ecosystem
HostedbyConfluent
 
Beyond Tiered Storage: Serverless Kafka with No Local Disks
HostedbyConfluent
 
Ad

Recently uploaded (20)

PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Learn Computer Forensics, Second Edition
AnuraShantha7
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Learn Computer Forensics, Second Edition
AnuraShantha7
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 

Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | Jac Noel, Intel Corp

  • 1. Presenter: Jac Noel Prepared for Kafka Summit Americas – Sep 2021 Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka®
  • 2. 2 Notices and Disclaimers This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel, the Intel logo, Intel Core, Intel Optane and Xeon are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others. Copyright © 2021, Intel Corporation. All rights reserved.
  • 3. 3 Jac Noel has over 25 years of Information Technology and Cyber Security experience across the military, government, and corporate environments. He started his technical career in the United States Air Force supporting military intelligence systems for the AF mission in EMEA. He has spent the past 20 years serving in various technical roles in Intel’s IT organization. He’s currently serving as a Security Solutions Architect focusing on security intelligence and response capabilities. He’s the lead architect for Intel’s Cyber Intelligence Platform (CIP), which is a next- gen solution combining a data lake, message bus, stream processing, machine-learning, orchestration, and workflow automation into a single platform. Jac holds a Bachelor of Science degree from Chico State University and has earned numerous professional certifications over the years, including CISSP, GCFW, CCNA, and MCSE. He’s also a proud inventor, patent holder, author of several white papers, and presenter at many public and private forums. Jac Noel Security Solutions Architect Intel Corporation
  • 4. 4 Intel’s Information Security Mission Our mission is to Keep Intel Legal and Secure! Ways we measure our success: 1. Better Preventive controls 2. More effective detective controls – Mean Time to Detect – Mean Time to Respond – Mean Time to Recover
  • 5. Cyber Intelligence Platform - Reference Architecture People + Technology + Data 5
  • 6. High Performance Compute & Storage BU Partners IT Partners Message Bus Stream Processing Cyber Intelligence Platform - Solution Stack 6 Enterprise Security Message Bus CONFLUENT PLATFORM
  • 7. No Message Bus ▪ Point to point, complex ▪ Slow to implement ▪ Increased technical debt due to tightly-coupled solutions and brittle integrations ▪ No orchestration (custom-code it, multiple times) ▪ No transformation (custom-code it, multiple times) ▪ Slow to move data between multiple capabilities ▪ Harder to monitor and govern With Message Bus ▪ Data Transformation (enrich, aggregate, normalize) ▪ Near real-time integration (streaming) ▪ Resilient, robust, scalable, available ▪ Orchestrate multiple activities in one place ▪ Cross-capability consumption ▪ Platform independent, plug and play ▪ Apps loosely coupled but tightly integrated ▪ Common architectural element for large enterprises The Power of the Kafka Bus App App App App App App App App App App App App App App App App App App App App App App App App Message Bus Abstraction, Resiliency, Scalability, Availability Transform Orchestrate 7
  • 8. Built with industry leading technologies Splunk and Kafka 8
  • 9. Improving Data Availability with Confluent MRC 9 Single Cluster Data Center 3 Producers Consumers Streaming Apps Consumers Producers Data Center 1 Leaders (ISR) Zookeeper 1 Zookeeper 2 Broker n Broker 2 Broker 1 Broker 3 … Mirroring Data Center 2 Observers Zookeeper 3 Zookeeper 4 Broker n Broker 2 Broker 1 Broker 3 … Zookeeper 5
  • 10. Asynchronous Replication for Faster Recovery 10 Single Cluster Data Center 3 Producers Consumers Streaming Apps Consumers Producers Data Center 1 Zookeeper 1 Zookeeper 2 Broker n Broker 2 Broker 1 Broker 3 … Mirroring Data Center 2 Leaders (ISR) Zookeeper 3 Zookeeper 4 Broker n Broker 2 Broker 1 Broker 3 … Zookeeper 5 Confluent Platform with Multi Region Clusters
  • 11. Managing Vulnerabilities with Stream Processing 11 Confluent Platform Producers Kafka Streams API Stream Processing Kafka Bus Vulnerability Topic Filter Vulnerabilities by Business Unit IP Address Range Topic Join Asset Asset Inventory Topic Ownership with Consumers Vulnerable Assets BU #1’s Vulnerabilities Topic Data Lake BU Partners BU #2’s Vulnerabilities Topic IT Partners BU #3’s Vulnerabilities Topic SIEM Vulnerabilities with Owners Topic Enforcement SOAR Scanning Engine IP Address Management Asset Management Inventory Vulnerabilities Asset configuration, CVEs, CVSS IP Address Ranges Ownership, Business Units Asset Ownership
  • 12. Kafka By The Numbers 12 20+ TB/DAY 135+ 32+ CONSUMERS DATA SOURCES 320+ TOPICS 90+ PRODUCERS >20B EVENTS/DAY Kafka by the Numbers ~8 trillion events indexed by Splunk in 2020
  • 13. Kafka Maturity Timeline 13 Acquire once-consume many Integration efficiency Remove the noise, and duplication Cost savings for downstream consumers Join multiple sources Contextually rich + clean data downstream ACQUIRE DATA FILTERING ENRICHMENT SUMMARIZATION ADVANCE D Autonomous Actions e.g. Cluster analysis, ML Produce summary statistics State information, performance benefit and downstream cost savings
  • 14. Kafka - Benefits to Intel 14 KAFKA LEADERSHIP THROUGH CONFLUENT EXPERTISE GENERATES CONTEXTUALLY RICH DATA MODERN ARCHITECTURE WITH THRIVING COMMUNITY GLOBAL SCALE AND REACH OPERATE ON DATA IN STREAM ECONOMIES OF SCALE REDUCE TECHNICAL DEBT AND DOWNSTREAM COSTS ALWAYS ON
  • 15. 15 Summary Transformed how Intel’s Information Security works • Enterprise Security Message Bus • Modern and Scalable • Loosely coupled our People + Technology + Data • Highly Integrated and Automated • Faster Detection and Response • Greater Insights into better Prevention • A Platform for the Future • More Secure!