Ask the Experts: How Does Cloud Security Leverage Big Data?

Welcome to Ask the Experts, brought to you by CloudServicesUniversity.com. In this video, Intelisys’ SVP Cloud Transformation Andrew Pryfogle discusses how companies are leveraging big data to make accurate and predictive calculations around security threats with Masergy’s Andy Singleton. Learn more about cloud-based security solutions from the Masergy team here: https://cloudservicesuniversity.com/supplier-directory/masergy/

Andrew: Well, welcome back again to another Ask the Experts session. We love these, we get great feedback from our students out there in the world that are learning great, great pearls of wisdom from these Ask the Experts sessions. Back to the studio again, Andy Singleton, who is the Director of Security Solutions Engineering for Masergy. A really compelling provider of cloud-based security solutions for our customers. Andy, welcome back, man.
Andy: Thank you, it’s good to be here.
Andrew: I want to talk about something pretty interesting in the world of cloud-based security. It has to do with big data. I know that there are tons of data points that we’re now collecting on, right? It’s not just computers and laptops. It’s the explosion around mobility; it’s the explosion around the Internet of Things. I’m curious how Masergy and others perhaps are leveraging big data technologies to look at all those data points to make more accurate and predictive calculations around security threats. Talk about that.
Andy: Absolutely. Big data has become a concern for a lot of companies out there, whether you’re a small manufacturer or pharmaceutical, or even a banking type customer. Data is money for these companies. How do I ingest that data? How do I get meaningful information out of it that will help my business? At the same time, a lot of this data can be used and should be used for information security, cybersecurity, analytics, and really understanding trending of this data as it comes into their systems. Understanding that the trends around machine spend or machine usage, those sorts of things. Or at the same time understand if there’s something malicious being injected in there because it is a point of threat that can be leveraged by cybercriminals. If I can take and manipulate that data coming into our company, I can really upset the applecart, so to speak, with these companies on what they’re analyzing. Understanding those trends, but also being able to ingest all that data, is immensely important.
You take a pharmaceutical-type company where you’re understanding, “How much did I manufacture today? How much human resources am I using? Are those being used appropriately?” Then flip that around to security. Are things operating the way they should? Am I predicting their behavior over time? Am I understanding that data? To do this, it takes really machine learning. We’re talking about artificial intelligence, machine learning, kind of the next phase in the way data is analyzed. You take a lot of the same principles, a lot of the technologies that are around.
As an example: credit card theft. If you ever get your credit card stolen or skimmed. All of us have at one time. You get that alert from, say, American Express who says, “Hey, are you trying to charge $1000 in California and another $1000 at London right now?” Probably not. They end up with kind of the same technologies as we are adhering to as well. It’s a lot about machine learning and pattern recognition.
Andrew: Wow. That’s some Star Wars stuff, man. That’s pretty cool. We’ve had to get really smart about this, right? The criminal element is definitely getting smart about this. Am I right?
Andy: Absolutely. They’re adapting. If you look at what the criminals are doing now, I mean it’s not just one weakness or one vulnerability that they’re leveraging. There’s actually kits out there, right? As a criminal, I can go buy a whole kit that may leverage an Adobe vulnerability. It may leverage an IE vulnerability. It may leverage some other vulnerability in the system and maybe one of them hits.
Andrew: Yeah.
Andy: If you’re not looking at all those inputs—and this goes for the Internet of Things—as you have hop off points, potentially, from these maybe sensors or other technologies out there that are inputting data into a general system. If I can find a leverage point of that, that’s a point of weakness. You’ve got to be looking at all this traffic as it passes in and out of your network of your business and really pattern match that over a long period of time.
Andrew: Is it as if there’s fingerprints on this all the way through at all these different points that artificial intelligence is looking for? Are there certain signatures that, for lack of a better word, that they’re looking for to determine if those patterns exist and that there’s a threat impending?
Andy: That’s part of it.
Andrew: Okay.
Andy: See, you’ve got to have a part of it where it is looking for certain pattern matches, but you’ve also got to have a part of it where the machine just learns. It learns trending and that’s … And it learns kind of via an AI model what is normal? What is the normal operating behavior of these data flows over a long period of time? Not only do you want to pick up the easily skimmed off stuff, such as signature type threats, but also the unstructured data. The methods of these criminals that get into business now are really not to set off signature alerts, not to set off log alerts, but to very stealthily sneak in and bypass all of that and use some system as a hop-off point. You’ve got to be trending that in a manner where you can really understand normalization over a long period of time.
Andrew: Andy, I think you’re describing exactly why I’m losing in fantasy football this year.
Andy: Exactly.
Andrew: They say all these data scientists are using big data to win fantasy football. That’s just wrong. It’s very, very wrong. Can you help me with that?
Andy: Oh yeah, I agree, agree. You take all the inputs of possible scenarios and you input it into it and mangle up all that data, as our chief scientist would say, he’s a data mangler. You take all that unstructured information in there and you got a machine that can say, “Oh, well because of this, this team’s going to win.” I guess who can afford … The top dogs that can afford those systems … They probably produce pretty good results.
Andrew: No doubt. They’re whooping my butt this year. Well, hey, there you go. That’s a great analogy because whether it be something as harmless as fantasy football, or as egregious as hurting what you call this, which is data is money, right? I mean, that’s a very, very big deal and that can be extremely destructive to a company. Andy, great, great stuff, man. Thanks again for jumping in.
Andy: Absolutely, glad to be here. Thank you.
Andrew: Very cool. Guys, that’s Andy Singleton. He is the Director of Security Solutions Engineering for Masergy, one of our go-to providers in the cloud for cloud-based security solutions. Really impressed with their story. Check out their learning center here at the University and get smart about how they can help you design a holistic unified security solution and strategy for your client. You can win big in the cloud with Masergy. Good selling.

 

Ken Mills

President

Ken Mills serves as President of Intelisys and is committed to driving growth for Intelisys and our partners. As a distinguished technology executive with over two decades of experience, Ken has previously held leadership roles at EPIC iO, Dell Technologies and Cisco, and served as a fellow with the U.S. Department of State. His strategic mindset has been an integral part of launching innovative products and solutions in the fields of AI, IoT, and 5G. Ken is driven by his curiosity and passion for groundbreaking technology and complex problems, and constantly explores new frontiers in the world of technology.

Monica Lutes

Manager, People & Culture, ScanSource, Inc. and Intelisys

As Manager, People & Culture, Monica has worked closely with Intelisys employees and leaders since 2018 and has worked with ScanSource companies since 2016. A Human Resources professional with 11 years of experience encompassing all areas of HR, especially employee relations, recruiting, compliance, and training, Monica approaches her role as Manager, People & Culture from a consultative perspective. Her goal is to provide advice and guidance to leaders so they can focus on growing the best teams for the business while also supporting employees’ goals.

Ansley Hoke

SVP Marketing, ScanSource, Inc. and Intelisys

Ansley Hoke is the Senior Vice President of Marketing at ScanSource, Inc., a role she has held since 2019, and extended her leadership to include Intelisys in 2023. She joined the company in 2001, serving in merchandising leadership roles for ScanSource POS and Barcode, including acting Vice President of Merchandising and then later VP of Merchandising for ScanSource Catalyst and overall VP of ScanSource Catalyst. She oversaw sales, supplier relations, and services. Known for her pivotal role in creating effective marketing strategies, Ansley has been integral in driving demand, enhancing partner programs, and significantly contributing to the company’s revenue growth and channel relationships.

Mike Baur

CEO of ScanSource, Inc. and Interim President of Intelisys

Mike Baur serves as Chairman and Chief Executive Officer at ScanSource. Mike has served as the Company’s President or CEO since its inception, as a director since December 1995, and as Chairman of the Board since February 2019. Mike has developed a deep institutional knowledge and perspective regarding ScanSource’s strengths, challenges and opportunities. He has more than 30 years of experience in the IT industry, having served in various leadership and senior management roles in the technology and distribution industries before joining ScanSource. Mike brings strong leadership, entrepreneurial, business building and development skills and experience to the Board.

Stephanie Bouras

Regional Vice President, Southeast

Driven by a partner-first philosophy and a passion for innovation, Bouras embodies a leadership style that’s both compassionate and data-driven. As the Regional Vice President, Southeast, at Intelisys, she’s leveraged her extensive marketing and sales experience to propel her team to new heights. A firm believer in aligning herself with her partners, she sees herself as a collaborator and an integral part of their business. This perspective has allowed her to forge deep connections and drive success. A Florida native, Stephanie’s attention to detail and unwavering commitment to her partners have been key factors in her success.

Michael Raspanti

Regional Vice President, Northeast

Michael joined Intelisys in June of 2020, as a long-time channel veteran. He is responsible for leading the Northeast Region, helping continue the tremendous momentum in one of our strongest markets while also recruiting new up and coming partners that will be the growth engine of our future success.

Kristy Thomas

Vice President, Partner Experience and Enablement

Thomas is responsible for Sales Partner enablement and education for all our technology segments, including CX, managed security, mobility, and connectivity. With over 20 years of executive background in telephony, UCaaS, CCaaS and Cloud services, Kristy enables her customers to think broader and deeper as she guides them through their decision journey. Some of the biggest deals in the channel have become a reality thanks to the expertise and humble excellence Kristy brings to her client’s projects.