21
Securing your Operational Data In a Rapid Growth Environment SPEAKER ERIC DITILLIO ECLIPSE RESOURCES

Securing your Operational Data In a Rapid Growth · PDF file · 2017-05-097.2 TB SAN NEEDED ... Starting with the IMP subnetwork and TSO or Time Share processing ARPANET would create

  • Upload
    lengoc

  • View
    216

  • Download
    2

Embed Size (px)

Citation preview

Securing your Operational Data In a Rapid Growth Environment

SPEAKER ERIC DITILLIO

ECLIPSE RESOURCES

ECLIPSE RESOURCES HISTORY

We are an independent exploration and production company engaged in the acquisition and development of oil and natural gas properties in the

Appalachian Basin. Our business strategy is to create stockholder value by aggressively developing our asset base while generating industry-

leading rates of return on our capital. We began assembling our acreage position in 2011 based upon an analytical evaluation of the shale

properties within the Utica and Point Pleasant formations across Eastern Ohio, and based upon this evaluation, we concentrated our acquisition

efforts in an area spanning parts of 5 counties that we believed would be the most prolific region of the play. This includes parts of Noble,

Guernsey, Monroe, Belmont and Harrison Counties. Since entering the play in 2011, we, or our operating partners have commenced drilling 75

gross wells in this 5 county area, which we believe to be the core of the Utica Shale play.

- See more at: http://www.eclipseresources.com/#sthash.TDcFR6xh.dpuf

INITIAL DATA FOOTPRINT

4 TB SERVER Dell Small business PowerEdge Server

CISCO ASA 5505 FIREWALL

LAYER 3 SWITCH

APPLE AIRPORT WIRELESS - AUTONOMOUS

OUTSOURCED VOIP

OUTSOURCED IT

OUTSOURCED BACKUP

OUTSOURCED EMAIL

12 MONTH GROWTH

7.2 TB SAN NEEDED

EXPANSION TO 3 LOCATIONS

100 EMPLOYEES

UPGRADED TO REDUNDANT FIREWALLS

UPGRADED TO REDUNDANT LAYER 3 SWITCH

IMPLEMENTED MERAKI WIRELESS

STANDARDIZE PC AND LAPTOP MODELS

INTERNAL IT – IT MANAGER

OUTSOURCED BACKUP

UPGRADE INTERNET CONNECTIVITY

IMPLEMENTATION OF REDUNDANT NIMBLE SANS

UPGRADED TO NEW CISCO ASA 5512X

175 EMPLOYEES

LAYER 3 – CISCO 3850X SWITCHES

SETUP MULTIPLE VLANS

EXPANDED MERAKI WIRELESS

INTRODUCTION OF CISCO TELEPRESENCE

IMPLEMENTED IPS WEB/SPAM and MESSAGE ARCHIVER

TABLET ROLLOUT

INTERNAL IT – Business Intelligence Manager and DBM

SETUP SNAPSHOTS AND BACKUP INTERNALLY

24 MONTH GROWTH

NEW NETWORK ROOM

ADDED EXPANSION SHELF TO NIMBLE SANS

IMPLEMENTED FIREPOWER SERVICES FOR CISCO ASA 5512X FIREWALLS

225 EMPLOYEES

CREATED MULTIPLE BASE IMAGES

INTERNAL IT – HIRED HELPDESK AND SUPPORTING DBA

SETUP ARCHIVE ON LEGACY SAN

UPGRADE TO CISCO VOIP

36 MONTH GROWTH

CONFERENCE ROOM UPGRADES

ADD ADDITIONAL EXPANSION SHELF TO NIMBLE SANS

OPENING A 3rd OFFICE WITH ANOTHER LAYER OF REDUNDANCY

275 EMPLOYEES

ADDITIONAL TELEPRESENCE VIDEO CONFERENCING CAPABILITIES

PHYSICAL SECURITY OF ALL FACILITIES

SURVEILLANCE

WELL PAD CONNECTIVITY

FUTURE GROWTH

MADE DATA SCALABLE AND RAPID GROWTH MANAGEABLE

SECURITY AND COMPLIANCE

MOBILE DEVICE MANAGEMENT

APPLICATION PERFORMANCE

SINGLE PANE OF GLASS MANAGEMENT CONSOLE FOR IT

MANAGEMENT

EMPLOYEE SATISFACTION AND ABILITY TO WORK FROM

ANYWHERE

CONNECTIVITY EFFICIENCY

CHALLENGES ADDRESSED

A brief history of "Galactic Network"

In 1962 a gent named J.C.R. Licklider of MIT imagines a plan for a globally interconnected network so computers can talk to

each other and access data from anywhere in the world.

Licklider becomes the head of the computer research program at DARPA in October 1962 and there he brings up his ideas and

convinces others of its merit.

In 1965 folks at DARPA connected the TX-2 computer in Mass. to the Q-32 in California with a low speed dial-up telephone

line creating the first wide-area computer network (sorta).

Between the years of 1966 and 1968 we get the IMP network and then ARPANET.

Constructing the Internet

Cyclades

DARPA

RAND

NPL

ARPANET

ARPANET became what we now call the internet and is constructed on the idea that there would be several independent

networks similar to a web, of rather uninformed designs, beginning with the ARPANET as the original packet switching

network soon to include packet satellite networks, ground-based packet radio networks and other networks.

The Internet as we now know embodies a fundamental technical idea, namely that of open architecture networking. This

approach, the choice of any individual network technology was not governed by any one particular network topology or

architecture but rather could be selected by a provider and made to work with the other networks through a meta-level

"Internetworking Architecture".

Starting with the IMP subnetwork and TSO or Time Share processing ARPANET would create NCP and later with Cyclades

TCP.

BLAH BLAH BLAH INTERNET!

Opening the door Internet security is a broad term that refers to the

various steps individuals and companies take to protect

computers or computer networks that are connected to

the Internet. One of the basic truths behind Internet

security is that the Internet itself is not a secure

environment.

How and Why

The Internet was originally conceived as an open, loosely linked computer network

that would facilitate the free exchange of ideas and information.

Due to the growth in Internet use, the number of computer security breaches

experienced by businesses has increased rapidly in recent years. At one time, 80

percent of security breaches came from inside the company.

Why Worry?

We still don’t know how many systems are vulnerable to the Shellshock bug, but it is likely in the millions.

Stuxnet’s evil twin highlights the

very real threat of cyber-warfare

Night Dragon

Attackers using several locations in China have leveraged C&C servers on purchased hosted services in the United States and compromised servers in the Netherlands to wage attacks against global oil, gas, and petrochemical companies,

FBI Director James Comey “I mean, there are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.”

How does Eclipse Resources Protect itself?

Within a 36 month time period Eclipse has increased its Servers by 500%, increased Network Bandwidth by 10 fold, and established wireless access.

Created a dedicated software and business intelligence team.

And now has a Physical Security Group.

What Next?

Questions and Ideas