Go Summarize

a16z Podcast | When Large Scale Gets Really Massive -- Managing Today’s Enterprise Networks

a16z2019-01-02
81 views|5 years ago
💫 Short Summary

Atheneum was founded in 2007 to address the need for faster systems in response to increased cyber attacks. They refactored their data collection approach to make systems 10,000 times faster against modern threats. Traditional tools like BigFix are inadequate for targeted attacks from nation-states. New technology like Stephen's platform allows for instant network-wide information retrieval and analysis, impressing individuals at Andreessen Horowitz. The innovative system can quickly identify all machines on a network writing to USB sticks, providing real-time data on network activity. Mesh and peer-to-peer networking were used to efficiently address security vulnerabilities like Heartbleed. CEOs need to understand IT issues as technology advances, and real-time data processing will become crucial for handling security threats. Obtain IAM offers unique scaling capabilities with a focus on clusters rather than hub-and-spoke communication for real-time network monitoring.

✨ Highlights
📊 Transcript
Atheneum's founding in 2007 was driven by the need for faster systems in response to cyber attacks.
02:05
The company's focus shifted to collecting data from large networks in seconds instead of hours or days.
Atheneum completely refactored their data collection approach to address the ineffectiveness of traditional methods against modern threats.
The innovative approach aimed to make systems 10,000 times faster to prioritize quick response and data exfiltration prevention.
Outdated network management tools are not equipped to handle modern cybersecurity threats.
04:25
These tools were designed to address untargeted attacks like slammer and blaster.
Current threats include targeted attacks from professional organizations and nation-states.
BigFix, later acquired by IBM, was developed in a different era and is insufficient for evolving cybersecurity challenges.
The limitations of traditional security tools against insider and advanced persistent threats.
06:49
Security and systems management teams struggle with identifying and responding to vulnerabilities using separate tools.
Stephen's platform offers instant network-wide information retrieval and analysis, improving network security.
The demo of Stephen's platform impressed experienced individuals at Andreessen Horowitz.
The platform allows for quick and comprehensive network monitoring, advancing cybersecurity practices.
The system can quickly identify all machines on a network writing to USB memory sticks.
08:40
The fast response time provides real-time data on network activity, amazing the team.
Existing solutions' limitations are highlighted, with the new system reaching out and interacting with every endpoint synchronously.
The system's ring architecture aggregates data before sending a comprehensive response.
Automation in grouping machines based on proximity enables efficient communication among thousands of machines in various environments.
The system allows for automatic aggregation of data when a question is asked, providing all requested data efficiently.
10:34
The system is lightweight, can be used in various devices like VMs, process controllers, and ATMs, and doesn't require extensive infrastructure.
Multiple tools are utilized in systems management and security to identify indicators of compromise, such as file changes and software presence.
Collective knowledge from the Internet contributes to these indicators, which can now be used as inputs for further analysis and response.
Innovative use of mesh and peer-to-peer networking in addressing security vulnerabilities like Heartbleed.
13:26
Linear peer-to-peer networking implementation enabled quick identification and resolution of affected systems without manual scripts.
Immediate triage and resolution of security issues provided a more efficient response to threats.
Practical application of mesh networking showcased its potential for enhancing cybersecurity measures in real-world scenarios.
The need for a new architecture for handling IoT devices is highlighted by the Heartbleed incident.
15:37
CEOs need to have a better understanding of IT issues to prevent similar incidents in the future.
The current hub-and-spoke model is inadequate for handling the increasing number of connected devices.
A new architecture enabling peer-to-peer communication among devices is necessary for real-time data collection and analysis.
Real-time data is crucial for organizations to stay ahead of security threats.
The future of data is moving towards real-time processing.
17:33
Obtain IAM's innovative architecture allows for unique scaling capabilities.
The communication technique focuses on clusters rather than hub-and-spoke.
Obtain IAM offers a single API that can be accessed through a natural language interface or used to build custom models for network monitoring in real-time.