Welcome!

SDN Journal Authors: Pat Romanski, Destiny Bertucci, Liz McMillan, Elizabeth White, Amitabh Sinha

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Cloud Security, @DXWorldExpo, SDN Journal

@CloudExpo: Case Study

What Retailer BCBG Learned About Cloud Security

Succeeding with CloudAccess SIEM and log management managed from the cloud

There was a time the only security issues retailers needed to be concerned with was theft. Put a guard in the store and a couple of video cameras and prevent as much loss as possible. Those days are long gone.

The overall security of a retail organization has grown increasingly complex. The smash and grab has been supplanted by the hack and breach.   A retailer’s IT environment is at as much risk as the product on the retail shelf. Every year hundreds of retailers fall victim to electronic intrusion. Ask Raley’s, Zaxby’s, Mapco, Michaels’s and dozens of retailers about how their POS and other exposed systems were not only breached, but cost them untold millions of dollars in stolen customer credit cards, abused sensitive data, and reparations and fines.

But if you ask, most of the named companies and the hundreds and hundreds of others attest that they apply a variety of security measures to maintain the sanctity of customer information and secure the workings of their network. Industrial and regulatory compliance demands this.

This is obviously not enough.

But this is not a lesson on the failings of retailers. That would be unfair. The issue is considerably multifaceted, especially when trying to mitigate risk. For any company, including retailers, risk must be balanced between budget, available resources, recognized vulnerability and maintaining compliance. For each company the answer is unique, but there are certain realities any retailer should consider to better protect customer assets…and do so without compounding costs, burdening infrastructure resources and taxing manpower.

Here’s how one retailer overcame similar challenges by incorporating CloudAccess solutions.

Like most retailers of its size, BCBG (BCBGMAXAZRIA) was challenged with a variety of security issues; a great many devices across the country creating vast amounts of log data that overwhelmed existing IT resources. On top of that, there were questions about levels of POS exposure across a substantial distributed network (which necessitated the use of internet resources), regulating and monitoring online account access and internal threats.

According to CIO Nader Karimi they understood that firewall, malware detection, and weekly system-log reviews were generally enough to satisfy compliance (PCI DSS) audits, but because of unseen vulnerability gaps BCBG was still at risk from external breach and internal intrusion. They simply did not have enough visibility to see what was happening to their prolific network assets and not enough eyes to catch issues amongst a sea of data to find the problems quickly enough to solve them. This was not due to lack of talent or effort, but simply an issue of being stretched way too thin (like most other companies).

BCBG recognized they needed to address the issue:

We looked at different options including where we purchased appliances, put them in our data center and managed them ourselves. But with limited data center space and budget, we didn’t want to deal with all the hardware, redundancy and backup.  We also had limited manpower here internally; so we couldn’t keep up with all the security trends and fine-tune the rules on a daily basis,” said Karl Ma, BCBG’s Senior Manager of Global Information Security.

CloudAccess' cloud-based security offering solved several of their problems:

1. Institute real time monitoring 7/24/365
Continuous monitoring is a requirement dictated by most compliance agencies. However, the issue BCBG and other retailers face is that sys-log collection may be applied around the clock, but its review is primarily accomplished in hindsight. Weekly or infrequent reviews can only detect suspicious activity after the damage is potentially done. However combining SIEM (Security Incident and Event Management) and log management in the cloud provides a cost-effective means to speed up detection and response in real time. By deploying sensors across its enterprise BCBG was able to collect thousands of events per second, and quickly and decisively identify suspicious activity. Whether during traditional work hours or in the middle of the night, or during holidays, the SIEM/Log combination is actively collecting, reviewing, and when necessary alerting all data and activity on BCBG’s network and system footprint. Moreover, this approach to monitoring also allows an analyst to see potential problems before they necessitate alerts. As BCBG utilizes security-as-a-service analysis from the cloud, they gain additional expertise and nimbleness to employ preventive measures and reduce their risk even further.

2. Incorporate data from all POS and register devices

Knowing that POS systems come with inherent susceptibilities, BCBG proactively added a sensor to coordinate data from all of its POS devices.  This new ability to centralize information from thousands of devices (combined with automatic intelligent correlation) allows for a new level of analysis, and response. BCBG can now recognize anomalies that could lead to more significant problems. This includes noting excessive logins, lockouts, and invalid users looking to access the system. Earlier this year, BCBG analysts were able to pinpoint activity on a specific terminal in a specific store to determine who was accessing the system. All this promotes faster identification of potential issues and quicker responses.

3. Create alert process via correlation
With so much data streaming into system logs, it is often difficult to tell suspicious activity from white noise and false positives. Cloud SIEM’s powerful correlation engine, combined with BCBG’s unique process, makes it easier to determine what they consider actionable issues. It takes into consideration several factors and provides BCBG with situational awareness. For example, when someone accesses a BCBG online account with the right user name, but takes 3 times to enter the right password; is this an issue? Further investigation shows, they didn’t buy anything and only visited the My Account page. Again is this trouble? The visit happened at 2am local time. Cloud-based SIEM also shows that the IP address was from China. Individually these clues are generally harmless, yet when correlated and combined in real time, BCBG discovered a much different story. An alert was created and an immediate remediation process shut the user down. The result was BCBG prevented an unauthorized user from accessing its sensitive systems and possibly a customers’ personal data.

One of the chief benefits of using cloud-based security-as-a-service is it promotes analysis. This is accomplished not just by a machine, but by a security expert. Collecting data is one thing, sifting through it is another, but the true critical mass happens when that information can be properly analyzed—by someone who can read between the lines and connect the dots the correlated data provides. BCBG says it is like having an expert on staff without having to incur the payroll, benefits, vacation, and training.   It is part and parcel of a good cloud security service. The service is more than pushing buttons, it becomes the continuance of corporate knowledge.

4. Reduce costs, yet expand capability
BCBG discovered security developed, deployed and managed from the cloud provided additional enterprise-class functionality they NEVER HAD BEFORE. And because the cloud strategically changes the emphasis from limiting scope (let’s just do what we can with what we have!) to performance, BCBG was able to implement several best practices that not only kept assets more secure, but also tremendously reduced the monthly capital expenditures. This cloud security initiative exponentially expanded their visibility and enhanced their ability to immediately recognize issues and remediate. In short, they now know what they didn’t know before and could take decisive preventive action to keep their environment safe…for considerably less than they were funding before.

5. Streamline compliance reporting
Most retailers (and others beholden to compliance requirements) complain about the time and resources it takes to satisfy audits. Important as it is, it forces reprioritization against other core competency and revenue-generating projects. Through the automations built into the cloud-security initiative, BCBG has reduced the compilation (from multiple divisions, departments and information silos), review and building of compliance reports to a fraction of what it used to take: both person hours AND cost…and a return of the freedom allowing BCBG’s IT team to do what they do best-take care of the digital infrastructure of an international retail leader.

6. Transition to a proactive defense without adding resources

Security-as-a-service does all the heavy lifting…and it’s done at a fraction of on premise costs. But more importantly, it allows a company to become proactive against various threats. Moving from a reactive to proactive policy gets you ahead of the issue rather than chasing after it. BCBG provides a case in point. Within the first two hours of activating the service, cloud based monitoring captured 20 times the amount of activity that BCBG’s existing process was recording at the same time.  Certainly most of the logs showed harmless traffic, but the SIEM correlation discovered several troubling alerts that would have otherwise gone unnoticed and could have damaged not only the IP assets, but also BCBG’s online reputation.

Mr. Karl Ma added, “Initially I was a little bit skeptical putting our log data into someone else’s hands, but after talking to their engineers and overseeing some of their security processes, I felt much more comfortable. “

Risk is rising…especially for retailers. From every survey, report and anecdote, security issues are becoming a more significant and louder talking point.  Everything from the introduction of new technologies, the morphing of infrastructures beyond network perimeters, to threats of breach, shadow IT and other internal vulnerabilities indicates that managing a firewall and filtering email is not enough.  Security must be woven into the fabric of the modern retail enterprise. As retail moves to the cloud, so must retail security.  You can add every security solution to the internal network, but that will not stop threats that target e-commerce and other public facing resources. It isn't a local issue anymore, so security can’t be just local either.

And, security for retail is not simply for the protection of data and other proprietary assets, but the proliferation of trust and confidence that spans across the dependent connections and interactions among partners, vendors, customers and even employees.

And as BCBG discovered, through the cloud, compliance is easier, enhanced security best-practices are more than affordable (low TCO, high ROI), and security-as-a-service has proven to be considerably less intrusive on resources. According to Karimi, “BCBG is now more confident in protecting the personal and sensitive data entrusted to us by employees, partners, vendors, suppliers, and especially customers.”

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

@CloudExpo Stories
SYS-CON Events announced today that Synametrics Technologies will exhibit at SYS-CON's 22nd International Cloud Expo®, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Synametrics Technologies is a privately held company based in Plainsboro, New Jersey that has been providing solutions for the developer community since 1997. Based on the success of its initial product offerings such as WinSQL, Xeams, SynaMan and Syncrify, Synametrics continues to create and hone inn...
As many know, the first generation of Cloud Management Platform (CMP) solutions were designed for managing virtual infrastructure (IaaS) and traditional applications. But that's no longer enough to satisfy evolving and complex business requirements. In his session at 21st Cloud Expo, Scott Davis, Embotics CTO, explored how next-generation CMPs ensure organizations can manage cloud-native and microservice-based application architectures, while also facilitating agile DevOps methodology. He expla...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
DevOps promotes continuous improvement through a culture of collaboration. But in real terms, how do you: Integrate activities across diverse teams and services? Make objective decisions with system-wide visibility? Use feedback loops to enable learning and improvement? With technology insights and real-world examples, in his general session at @DevOpsSummit, at 21st Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, explored how leading organizations use data-driven DevOps to close th...
Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams. In his session at 22nd Cloud Expo | DXWorld Expo, Daniel Jones, CTO of EngineerBetter, will answer: How can we improve willpower and decrease technical debt? Is the present bias real? How can we turn it to our advantage? Can you increase a team’s effective IQ? How do DevOps & Product Teams increase empathy, and what impact does empath...
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software. They hope to capture value from emerging technologies such as IoT, SDN, and AI. Ultimately, irrespective of the vertical, it is about deriving value from independent software applications participating in an ecosystem as one comprehensive solution. In his session at @ThingsExpo, Kausik Sridhar, founder and CTO of Pulzze Systems, discussed how given the magnitude of today's application ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
You know you need the cloud, but you're hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You're looking at private cloud solutions based on hyperconverged infrastructure, but you're concerned with the limits inherent in those technologies. What do you do?
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Mobile device usage has increased exponentially during the past several years, as consumers rely on handhelds for everything from news and weather to banking and purchases. What can we expect in the next few years? The way in which we interact with our devices will fundamentally change, as businesses leverage Artificial Intelligence. We already see this taking shape as businesses leverage AI for cost savings and customer responsiveness. This trend will continue, as AI is used for more sophistica...
The 22nd International Cloud Expo | 1st DXWorld Expo has announced that its Call for Papers is open. Cloud Expo | DXWorld Expo, to be held June 5-7, 2018, at the Javits Center in New York, NY, brings together Cloud Computing, Digital Transformation, Big Data, Internet of Things, DevOps, Machine Learning and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding busin...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and B...
The past few years have brought a sea change in the way applications are architected, developed, and consumed—increasing both the complexity of testing and the business impact of software failures. How can software testing professionals keep pace with modern application delivery, given the trends that impact both architectures (cloud, microservices, and APIs) and processes (DevOps, agile, and continuous delivery)? This is where continuous testing comes in. D
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
"WineSOFT is a software company making proxy server software, which is widely used in the telecommunication industry or the content delivery networks or e-commerce," explained Jonathan Ahn, COO of WineSOFT, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.