securing your operational data in a rapid growth · pdf file · 2017-05-097.2 tb...
TRANSCRIPT
Securing your Operational Data In a Rapid Growth Environment
SPEAKER ERIC DITILLIO
ECLIPSE RESOURCES
ECLIPSE RESOURCES HISTORY
We are an independent exploration and production company engaged in the acquisition and development of oil and natural gas properties in the
Appalachian Basin. Our business strategy is to create stockholder value by aggressively developing our asset base while generating industry-
leading rates of return on our capital. We began assembling our acreage position in 2011 based upon an analytical evaluation of the shale
properties within the Utica and Point Pleasant formations across Eastern Ohio, and based upon this evaluation, we concentrated our acquisition
efforts in an area spanning parts of 5 counties that we believed would be the most prolific region of the play. This includes parts of Noble,
Guernsey, Monroe, Belmont and Harrison Counties. Since entering the play in 2011, we, or our operating partners have commenced drilling 75
gross wells in this 5 county area, which we believe to be the core of the Utica Shale play.
- See more at: http://www.eclipseresources.com/#sthash.TDcFR6xh.dpuf
INITIAL DATA FOOTPRINT
4 TB SERVER Dell Small business PowerEdge Server
CISCO ASA 5505 FIREWALL
LAYER 3 SWITCH
APPLE AIRPORT WIRELESS - AUTONOMOUS
OUTSOURCED VOIP
OUTSOURCED IT
OUTSOURCED BACKUP
OUTSOURCED EMAIL
12 MONTH GROWTH
7.2 TB SAN NEEDED
EXPANSION TO 3 LOCATIONS
100 EMPLOYEES
UPGRADED TO REDUNDANT FIREWALLS
UPGRADED TO REDUNDANT LAYER 3 SWITCH
IMPLEMENTED MERAKI WIRELESS
STANDARDIZE PC AND LAPTOP MODELS
INTERNAL IT – IT MANAGER
OUTSOURCED BACKUP
UPGRADE INTERNET CONNECTIVITY
IMPLEMENTATION OF REDUNDANT NIMBLE SANS
UPGRADED TO NEW CISCO ASA 5512X
175 EMPLOYEES
LAYER 3 – CISCO 3850X SWITCHES
SETUP MULTIPLE VLANS
EXPANDED MERAKI WIRELESS
INTRODUCTION OF CISCO TELEPRESENCE
IMPLEMENTED IPS WEB/SPAM and MESSAGE ARCHIVER
TABLET ROLLOUT
INTERNAL IT – Business Intelligence Manager and DBM
SETUP SNAPSHOTS AND BACKUP INTERNALLY
24 MONTH GROWTH
NEW NETWORK ROOM
ADDED EXPANSION SHELF TO NIMBLE SANS
IMPLEMENTED FIREPOWER SERVICES FOR CISCO ASA 5512X FIREWALLS
225 EMPLOYEES
CREATED MULTIPLE BASE IMAGES
INTERNAL IT – HIRED HELPDESK AND SUPPORTING DBA
SETUP ARCHIVE ON LEGACY SAN
UPGRADE TO CISCO VOIP
36 MONTH GROWTH
CONFERENCE ROOM UPGRADES
ADD ADDITIONAL EXPANSION SHELF TO NIMBLE SANS
OPENING A 3rd OFFICE WITH ANOTHER LAYER OF REDUNDANCY
275 EMPLOYEES
ADDITIONAL TELEPRESENCE VIDEO CONFERENCING CAPABILITIES
PHYSICAL SECURITY OF ALL FACILITIES
SURVEILLANCE
WELL PAD CONNECTIVITY
FUTURE GROWTH
MADE DATA SCALABLE AND RAPID GROWTH MANAGEABLE
SECURITY AND COMPLIANCE
MOBILE DEVICE MANAGEMENT
APPLICATION PERFORMANCE
SINGLE PANE OF GLASS MANAGEMENT CONSOLE FOR IT
MANAGEMENT
EMPLOYEE SATISFACTION AND ABILITY TO WORK FROM
ANYWHERE
CONNECTIVITY EFFICIENCY
CHALLENGES ADDRESSED
A brief history of "Galactic Network"
In 1962 a gent named J.C.R. Licklider of MIT imagines a plan for a globally interconnected network so computers can talk to
each other and access data from anywhere in the world.
Licklider becomes the head of the computer research program at DARPA in October 1962 and there he brings up his ideas and
convinces others of its merit.
In 1965 folks at DARPA connected the TX-2 computer in Mass. to the Q-32 in California with a low speed dial-up telephone
line creating the first wide-area computer network (sorta).
Between the years of 1966 and 1968 we get the IMP network and then ARPANET.
ARPANET
ARPANET became what we now call the internet and is constructed on the idea that there would be several independent
networks similar to a web, of rather uninformed designs, beginning with the ARPANET as the original packet switching
network soon to include packet satellite networks, ground-based packet radio networks and other networks.
The Internet as we now know embodies a fundamental technical idea, namely that of open architecture networking. This
approach, the choice of any individual network technology was not governed by any one particular network topology or
architecture but rather could be selected by a provider and made to work with the other networks through a meta-level
"Internetworking Architecture".
Starting with the IMP subnetwork and TSO or Time Share processing ARPANET would create NCP and later with Cyclades
TCP.
BLAH BLAH BLAH INTERNET!
Opening the door Internet security is a broad term that refers to the
various steps individuals and companies take to protect
computers or computer networks that are connected to
the Internet. One of the basic truths behind Internet
security is that the Internet itself is not a secure
environment.
How and Why
The Internet was originally conceived as an open, loosely linked computer network
that would facilitate the free exchange of ideas and information.
Due to the growth in Internet use, the number of computer security breaches
experienced by businesses has increased rapidly in recent years. At one time, 80
percent of security breaches came from inside the company.
Why Worry?
We still don’t know how many systems are vulnerable to the Shellshock bug, but it is likely in the millions.
Stuxnet’s evil twin highlights the
very real threat of cyber-warfare
Night Dragon
Attackers using several locations in China have leveraged C&C servers on purchased hosted services in the United States and compromised servers in the Netherlands to wage attacks against global oil, gas, and petrochemical companies,
FBI Director James Comey “I mean, there are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.”
How does Eclipse Resources Protect itself?
Within a 36 month time period Eclipse has increased its Servers by 500%, increased Network Bandwidth by 10 fold, and established wireless access.
Created a dedicated software and business intelligence team.
And now has a Physical Security Group.