Securing Beats at Scale — Hysolate

  1. The transport layer itself must be secure and encrypted
  2. The receiving end must be able to authenticate the sender in a secure manner, at scale
  3. The receiving end must be able to withstand (D)DoS attacks
  • Elasticsearch , for storing the collected telemetry events; and -
  • , as an additional preprocessing pipeline.
  1. Elasticsearch and Logstash support TLS as a server.
  2. Elasticsearch supports multiple authentication options: TLS client certificates, API key, and user credentials (basic authentication). Logstash supports only TLS client certificates with the Lumberjack protocol. Unfortunately, there is no easy way to rotate and distribute them to all devices that are sending telemetry data.
  3. Elasticsearch and Logstash do not provide anti-(D)DoS protection for unauthenticated requests.

Hysolate’s Elegant Solution

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Hysolate

Hysolate

Hysolate is a software platform that enables locally deploying and remotely managing virtual, secured, environments on a single endpoint.