2
Most read
5
Most read
11
Most read
From MSP to MSSP
Our Journey with Elastic
Eze Castle Integration Overview
Managed Service Provider (MSP)
Cloud Service Provider (CSP)
Internet Service Provider (ISP)
Managed Security
Service Provider (MSSP)
Technology Growth at Eze Castle
The Challenge
•Technology Silos
Each department or team managing their own logs
•Non-standard Formatting
Logs stored in original format without normalization
•Compliance with Regulatory Requirements and Guidelines
Difficultly guaranteeing log retention
•Search
Finding needles in haystack
•Detection and Response
Lack of visibility on suspicious activity
Our SIEM Journey
2018-09
Partnered
with
3
rd
party
vendor
2019-03
Finished
onboarding
internal
systems
2019-07
Product
launch
2019-08-26
Build
POC
on
Elastic
Cloud
2019-09-30
Partnered
with
Elastic
2019-10
Finished
onboarding
internal
systems
2019-11
Relaunched
the
product
2019-08-23
Vendor
went
out
of
business
From MSP to MSSP using Elastic
From MSP to MSSP using Elastic
Windows Agents
Do It Right
the First Time
One-on-one with experts
Validate your design
Ask anything!
Less Headache
Easy to scale
Easy to upgrade
No infrastructure
Great feature parity
Cost effective
Do It Right
All the Time
Great instructors
Instructor-led and on-demand
Full-blown lab
Great content
Get Help When
You Need It
Good response time
Knowledgeable Team
Phone Support
Dedicated Support Engineer
ServicesWe Use
ELASTIC CLOUD ELASTIC
CONSULTING
ELASTIC
LEARNING
ELASTIC
SUPPORT
YESWE CAN!
Filebeat
Dozens of built-in modules supporting ingest via
syslog, API, or reading text files
with Filebeat and Logstash
Logstash
No Filebeat module? No problem!
Managed SIEM –Technology Integrations
Elastic Built-in Filebeat Modules Custom Developed
ActiveMQ
Apache
Auditd
AWS
AWS Fargate
Azure
Barracuda
Bluecoat
CEF
Check Point
Cisco
CoreDNS
Crowdstrike
Cyberark
Cyberark PAS
Cylance
Elasticsearch
Envoyproxy
F5
Fortinet
Google Cloud
Google Workspace
GSuite
haproxy
IBM MQ
Icinga
IIS
Imperva
Infoblox
Iptables
Juniper
Kafka
Kibana
Logstash
Microsoft
MISP
MongoDB
MSSQL
MySQL
MySQL Enterprise
nats
NetFlow
Netscout
Nginx
Office 365
Okta
Oracle
Osquery
Palo Alto Networks
pensando
PostgreSQL
Proofpoint
RabbitMQ
Radware
Redis
Santa
Snort
Snyk
Sonicwall
Sophos
Squid
Suricata
System
Threat Intel
Tomcat
Traefik
Zeek (Bro)
Zoom
Zscaler
Citrix Netscaler
DMARC
iboss
Microsoft DHCP
Proofpoint TAP
SentinelOne
SpyCloud
2+ billion events per day
avg. ingestion rate, that’s 23,148 events / second
Eze Managed SIEM –Threat Feed Integrations
Pre
miu
m
Fee
ds
SOC Prime
Bad Packets
Co
mm
unit
y
Fee
ds
Alienvault OTX
CINSscore
CyberCrime Tracker
Feodo Tracker
FireHOL
GreenSnow
IPSum
ListDynamic DNS
providers
MalShare
MalSilo
OpenPhish
Phishtank
Proofpoint Emerging Threats
TOR Exit Nodes
Vxvault
What Happened Since
Values shown are accurate as of June 02, 2021
< 2 Weeks
avg. onboarding
time per customer
• More integrations
• More enrichment
• More machine learning
• More beats
• Elastic Agents
Next Steps
www.eci.com

More Related Content

PPTX
SEIM-Microsoft Sentinel.pptx
PPT
Application Security
PDF
introduction to Azure Sentinel
PDF
Microsoft Azure Sentinel
PPTX
Azure Sentinel.pptx
PDF
Patch and Vulnerability Management
PDF
Maturity Model of Security Disciplines
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
SEIM-Microsoft Sentinel.pptx
Application Security
introduction to Azure Sentinel
Microsoft Azure Sentinel
Azure Sentinel.pptx
Patch and Vulnerability Management
Maturity Model of Security Disciplines
INCIDENT RESPONSE NIST IMPLEMENTATION

What's hot (20)

PPTX
Secure coding practices
PPTX
Roadmap to security operations excellence
PDF
DevSecOps in Baby Steps
PDF
Security operations center 5 security controls
PPTX
Splunk Overview
PDF
2019 DevSecOps Reference Architectures
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PPTX
Web application security
PDF
Cyber Threat Intelligence - It's not just about the feeds
PPTX
Vulnerabilities in modern web applications
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
PDF
AWS Security Hub
PDF
Cloud Security Demystified
PPTX
Vulnerability Assessment
PDF
ATT&CK Updates- ATT&CK for ICS
PDF
Microsoft 365 Enterprise Security with E5 Overview
PDF
Microsoft Office 365 Security and Compliance
PDF
Web application security & Testing
PPTX
7 Steps to Threat Modeling
Secure coding practices
Roadmap to security operations excellence
DevSecOps in Baby Steps
Security operations center 5 security controls
Splunk Overview
2019 DevSecOps Reference Architectures
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Web application security
Cyber Threat Intelligence - It's not just about the feeds
Vulnerabilities in modern web applications
Building a Next-Generation Security Operations Center (SOC)
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
AWS Security Hub
Cloud Security Demystified
Vulnerability Assessment
ATT&CK Updates- ATT&CK for ICS
Microsoft 365 Enterprise Security with E5 Overview
Microsoft Office 365 Security and Compliance
Web application security & Testing
7 Steps to Threat Modeling
Ad

Similar to From MSP to MSSP using Elastic (20)

PDF
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
PDF
For UK MSP, optimizing customer experience is key to successful security post...
PPTX
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
PDF
Getting Started with Security for your Oracle SOA Suite Integrations
PDF
What's new at Elastic: Update on major initiatives and releases
PDF
Forrester Emerging MSSP Wave
PDF
Elastic Security keynote
PDF
ESM v5.0 Service Layer Developer's Guide
PDF
ESM v5.0 Service Layer Developer's Guide
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PPTX
SOA Mainframe Service Architecture and Enablement Practices Best and Worst Pr...
PDF
Presentation big data
PDF
ICTA Technology Meetup 01 - Enterprise Application Integration
PDF
Attacking XML Security
PDF
Elastic SIEM (Endpoint Security)
PDF
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
PDF
What's new at Elastic: Update on major initiatives and releases
PDF
Tips to Remediate your Vulnerability Management Program
PPTX
Splunk für Security
PDF
Empower your security practitioners with the Elastic Stack
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
For UK MSP, optimizing customer experience is key to successful security post...
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
Getting Started with Security for your Oracle SOA Suite Integrations
What's new at Elastic: Update on major initiatives and releases
Forrester Emerging MSSP Wave
Elastic Security keynote
ESM v5.0 Service Layer Developer's Guide
ESM v5.0 Service Layer Developer's Guide
Security Outsourcing - Couples Counseling - Atif Ghauri
SOA Mainframe Service Architecture and Enablement Practices Best and Worst Pr...
Presentation big data
ICTA Technology Meetup 01 - Enterprise Application Integration
Attacking XML Security
Elastic SIEM (Endpoint Security)
Architecting and Tuning IIB/eXtreme Scale for Maximum Performance and Reliabi...
What's new at Elastic: Update on major initiatives and releases
Tips to Remediate your Vulnerability Management Program
Splunk für Security
Empower your security practitioners with the Elastic Stack
Ad

More from Elasticsearch (20)

PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
Cómo crear excelentes experiencias de búsqueda en sitios web
PDF
Te damos la bienvenida a una nueva forma de realizar búsquedas
PDF
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Plongez au cœur de la recherche dans tous ses états.
PDF
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
PDF
An introduction to Elasticsearch's advanced relevance ranking toolbox
PDF
Welcome to a new state of find
PDF
Building great website search experiences
PDF
Keynote: Harnessing the power of Elasticsearch for simplified search
PDF
Cómo transformar los datos en análisis con los que tomar decisiones
PDF
Explore relève les défis Big Data avec Elastic Cloud
PDF
Comment transformer vos données en informations exploitables
PDF
Transforming data into actionable insights
PDF
Opening Keynote: Why Elastic?
PDF
Empowering agencies using Elastic as a Service inside Government
PDF
The opportunities and challenges of data for public good
PDF
Enterprise search and unstructured data with CGI and Elastic
PDF
クローラーを迅速に入手:効果的なWebクローラーの作成方法
An introduction to Elasticsearch's advanced relevance ranking toolbox
Cómo crear excelentes experiencias de búsqueda en sitios web
Te damos la bienvenida a una nueva forma de realizar búsquedas
Tirez pleinement parti d'Elastic grâce à Elastic Cloud
Comment transformer vos données en informations exploitables
Plongez au cœur de la recherche dans tous ses états.
Modernising One Legal Se@rch with Elastic Enterprise Search [Customer Story]
An introduction to Elasticsearch's advanced relevance ranking toolbox
Welcome to a new state of find
Building great website search experiences
Keynote: Harnessing the power of Elasticsearch for simplified search
Cómo transformar los datos en análisis con los que tomar decisiones
Explore relève les défis Big Data avec Elastic Cloud
Comment transformer vos données en informations exploitables
Transforming data into actionable insights
Opening Keynote: Why Elastic?
Empowering agencies using Elastic as a Service inside Government
The opportunities and challenges of data for public good
Enterprise search and unstructured data with CGI and Elastic
クローラーを迅速に入手:効果的なWebクローラーの作成方法

Recently uploaded (20)

PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Advancing precision in air quality forecasting through machine learning integ...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
SaaS reusability assessment using machine learning techniques
giants, standing on the shoulders of - by Daniel Stenberg
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Co-training pseudo-labeling for text classification with support vector machi...
LMS bot: enhanced learning management systems for improved student learning e...
Ensemble model-based arrhythmia classification with local interpretable model...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
Electrocardiogram sequences data analytics and classification using unsupervi...
Early detection and classification of bone marrow changes in lumbar vertebrae...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Build Real-Time ML Apps with Python, Feast & NoSQL
Advancing precision in air quality forecasting through machine learning integ...
Module 1 Introduction to Web Programming .pptx
Introduction to MCP and A2A Protocols: Enabling Agent Communication
SaaS reusability assessment using machine learning techniques

From MSP to MSSP using Elastic

  • 1. From MSP to MSSP Our Journey with Elastic
  • 2. Eze Castle Integration Overview Managed Service Provider (MSP) Cloud Service Provider (CSP) Internet Service Provider (ISP) Managed Security Service Provider (MSSP)
  • 3. Technology Growth at Eze Castle
  • 4. The Challenge •Technology Silos Each department or team managing their own logs •Non-standard Formatting Logs stored in original format without normalization •Compliance with Regulatory Requirements and Guidelines Difficultly guaranteeing log retention •Search Finding needles in haystack •Detection and Response Lack of visibility on suspicious activity
  • 9. Do It Right the First Time One-on-one with experts Validate your design Ask anything! Less Headache Easy to scale Easy to upgrade No infrastructure Great feature parity Cost effective Do It Right All the Time Great instructors Instructor-led and on-demand Full-blown lab Great content Get Help When You Need It Good response time Knowledgeable Team Phone Support Dedicated Support Engineer ServicesWe Use ELASTIC CLOUD ELASTIC CONSULTING ELASTIC LEARNING ELASTIC SUPPORT
  • 10. YESWE CAN! Filebeat Dozens of built-in modules supporting ingest via syslog, API, or reading text files with Filebeat and Logstash Logstash No Filebeat module? No problem!
  • 11. Managed SIEM –Technology Integrations Elastic Built-in Filebeat Modules Custom Developed ActiveMQ Apache Auditd AWS AWS Fargate Azure Barracuda Bluecoat CEF Check Point Cisco CoreDNS Crowdstrike Cyberark Cyberark PAS Cylance Elasticsearch Envoyproxy F5 Fortinet Google Cloud Google Workspace GSuite haproxy IBM MQ Icinga IIS Imperva Infoblox Iptables Juniper Kafka Kibana Logstash Microsoft MISP MongoDB MSSQL MySQL MySQL Enterprise nats NetFlow Netscout Nginx Office 365 Okta Oracle Osquery Palo Alto Networks pensando PostgreSQL Proofpoint RabbitMQ Radware Redis Santa Snort Snyk Sonicwall Sophos Squid Suricata System Threat Intel Tomcat Traefik Zeek (Bro) Zoom Zscaler Citrix Netscaler DMARC iboss Microsoft DHCP Proofpoint TAP SentinelOne SpyCloud 2+ billion events per day avg. ingestion rate, that’s 23,148 events / second
  • 12. Eze Managed SIEM –Threat Feed Integrations Pre miu m Fee ds SOC Prime Bad Packets Co mm unit y Fee ds Alienvault OTX CINSscore CyberCrime Tracker Feodo Tracker FireHOL GreenSnow IPSum ListDynamic DNS providers MalShare MalSilo OpenPhish Phishtank Proofpoint Emerging Threats TOR Exit Nodes Vxvault
  • 13. What Happened Since Values shown are accurate as of June 02, 2021 < 2 Weeks avg. onboarding time per customer
  • 14. • More integrations • More enrichment • More machine learning • More beats • Elastic Agents Next Steps