{"id":7019,"date":"2023-07-18T07:35:00","date_gmt":"2023-07-18T07:35:00","guid":{"rendered":"https:\/\/redingtongroup.com\/mea\/?p=7019"},"modified":"2023-07-31T10:25:11","modified_gmt":"2023-07-31T10:25:11","slug":"transforming-security-by-implementing-splunk-into-framework-and-architecture","status":"publish","type":"post","link":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/","title":{"rendered":"Transforming Security by Implementing Splunk into Framework and Architecture"},"content":{"rendered":"<div class=\"study-short\" style=\"padding-left: 10px\">\n<ul>\n<li><span class=\"sub-title\">Region <\/span> MEA<\/li>\n<li><span class=\"sub-title\">Industry<\/span>Real Estate<\/li>\n<li>\n      <span class=\"sub-title\">Overview<\/span><\/p>\n<ul class=\"inner-lists\">\n<li>A leading real estate firm in UAE wanted to set up a monitoring centre for security and analytics. With technologies that were antiquated and almost obsolete, the client was vulnerable to cyberattacks. Redington partner, MDS Dubai, reviewed and revamped the client\u2019s security by implementing Splunk, which would also serve as the brain for a detection centre. MDS also assisted the firm with developing the right detection use cases with their expertise in security maturity assessment.\n<\/li>\n<li>\n      <span class=\"sub-title\">Objective<\/span> To develop robust security infrastructure and protect critical assets\n<\/li>\n<li>\n      <span class=\"sub-title\">Challenges <\/span><\/p>\n<ul class=\"inner-lists\">\n<li>Create an automated detection centre\n<\/li>\n<li>Implement efficient incident response framework for entire security operations\n<\/li>\n<\/ul>\n<\/li>\n<li>\n      <span class=\"sub-title\">Outcomes<\/span><\/p>\n<ul class=\"inner-lists\">\n<li>Implemented Splunk to create a detection centre\n<\/li>\n<li>Increased visibility on security threats and compliance\n<\/li>\n<li>Versatile technology\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Region MEA IndustryReal Estate Overview A leading real estate firm in UAE wanted to set up a monitoring centre for [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7115,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[112,2,117,105],"tags":[],"class_list":["post-7019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-by-technology","category-cases-study","category-security","category-solution"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Transforming Security by Implementing Splunk into Framework and Architecture - Middle East<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ritika\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/\"},\"author\":{\"name\":\"Ritika\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2\"},\"headline\":\"Transforming Security by Implementing Splunk into Framework and Architecture\",\"datePublished\":\"2023-07-18T07:35:00+00:00\",\"dateModified\":\"2023-07-31T10:25:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/\"},\"wordCount\":132,\"publisher\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#organization\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png\",\"articleSection\":[\"By Technology\",\"Case Study\",\"Security\",\"Solution\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/\",\"url\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/\",\"name\":\"Transforming Security by Implementing Splunk into Framework and Architecture - Middle East\",\"isPartOf\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png\",\"datePublished\":\"2023-07-18T07:35:00+00:00\",\"dateModified\":\"2023-07-31T10:25:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage\",\"url\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png\",\"contentUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png\",\"width\":850,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/redingtongroup.com\/mea\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Transforming Security by Implementing Splunk into Framework and Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#website\",\"url\":\"https:\/\/redingtongroup.com\/mea\/\",\"name\":\"Middle East\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/redingtongroup.com\/mea\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#organization\",\"name\":\"Middle East\",\"url\":\"https:\/\/redingtongroup.com\/mea\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg\",\"contentUrl\":\"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg\",\"caption\":\"Middle East\"},\"image\":{\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2\",\"name\":\"Ritika\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g\",\"caption\":\"Ritika\"},\"url\":\"https:\/\/redingtongroup.com\/mea\/author\/ritika\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transforming Security by Implementing Splunk into Framework and Architecture - Middle East","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/","twitter_misc":{"Written by":"Ritika","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#article","isPartOf":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/"},"author":{"name":"Ritika","@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2"},"headline":"Transforming Security by Implementing Splunk into Framework and Architecture","datePublished":"2023-07-18T07:35:00+00:00","dateModified":"2023-07-31T10:25:11+00:00","mainEntityOfPage":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/"},"wordCount":132,"publisher":{"@id":"https:\/\/redingtongroup.com\/mea\/#organization"},"image":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png","articleSection":["By Technology","Case Study","Security","Solution"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/","url":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/","name":"Transforming Security by Implementing Splunk into Framework and Architecture - Middle East","isPartOf":{"@id":"https:\/\/redingtongroup.com\/mea\/#website"},"primaryImageOfPage":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage"},"image":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png","datePublished":"2023-07-18T07:35:00+00:00","dateModified":"2023-07-31T10:25:11+00:00","breadcrumb":{"@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#primaryimage","url":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png","contentUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/07\/23_shutterstock_2137304159.png","width":850,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/redingtongroup.com\/mea\/cases-study\/transforming-security-by-implementing-splunk-into-framework-and-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/redingtongroup.com\/mea\/"},{"@type":"ListItem","position":2,"name":"Transforming Security by Implementing Splunk into Framework and Architecture"}]},{"@type":"WebSite","@id":"https:\/\/redingtongroup.com\/mea\/#website","url":"https:\/\/redingtongroup.com\/mea\/","name":"Middle East","description":"","publisher":{"@id":"https:\/\/redingtongroup.com\/mea\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/redingtongroup.com\/mea\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/redingtongroup.com\/mea\/#organization","name":"Middle East","url":"https:\/\/redingtongroup.com\/mea\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/","url":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg","contentUrl":"https:\/\/redingtongroup.com\/mea\/wp-content\/uploads\/sites\/2\/2023\/04\/logo-white.svg","caption":"Middle East"},"image":{"@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/redingtongroup.com\/mea\/#\/schema\/person\/60fb2ae4efa2cad954010daf69b819c2","name":"Ritika","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/721dc7100c5131fa51190f4935252849fbb34078198248d5b364eba10b4f2e14?s=96&d=mm&r=g","caption":"Ritika"},"url":"https:\/\/redingtongroup.com\/mea\/author\/ritika\/"}]}},"_links":{"self":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/posts\/7019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/comments?post=7019"}],"version-history":[{"count":0,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/posts\/7019\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/media\/7115"}],"wp:attachment":[{"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/media?parent=7019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/categories?post=7019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redingtongroup.com\/mea\/wp-json\/wp\/v2\/tags?post=7019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}