Our secure remote connectivity tool provides full video recording of all work our engineers perform on client systems. We have requirements to analyze the video log to detect suspicious activity, provide forensic and root cause analysis capabilities. Some of the obvious use cases include detection of credit card patterns or personally identifiable information (PII) as well as malicious activity like dropping database objects. We need to process hundreds of gigabytes per day representing thousands of hours of video. Our solution leverages a variety of Hadoop components to perform optical text recognition and indexing, keyboard and mouse movement analysis as well as integration with variety of other data sources such as our monitoring, documentation, ticketing and communication systems. We will present our complete architecture starting from multi-source data ingestion through data processing and analysis up to the end user interface, reporting and integration layer.
Moore’s lawConsolidationVirtualizationEngineered systemsMulti-tenant databases like in 12cBusiness/IT convergence
Established 1997235 people and grew 50% in 2012Manages data infrastructure running Oracle, SQL Server, MySQL, Netezza, Hadoop and MongoDB plus UNIX Sysadmin and Oracle appsClients in diverse industries including Western Union, Virgin America Airlines, The New York Times, UPenn, Sunnybrook Hospital, Sonos, PPL, Australia Post