After evaluating multiple solutions including Datadog SIEM and Cribl Search, FloQast implemented Scanner. The selection was based on Scanner's technical architecture and approach to data management.
Braden King, Security Engineer at FloQast, explained the need for more log source coverage, sharing that "several of our high volume sources were not returning enough value in Panther, but we wanted to have logs available for investigation and ideally some basic detections."
Technical Implementation
The deployment process centered around infrastructure as code using Terraform for consistent and repeatable deployments. The team implemented flexible S3 import rules to manage log ingestion efficiently, while role-based access control provided granular security management. Detection-as-code implementation with GitHub CI/CD integration enabled version control and collaborative development of detection rules.
Data Architecture
Scanner's approach to log management introduced several technical advantages to FloQast's infrastructure. The architecture allows log data to remain in FloQast's own S3 buckets, ensuring complete data sovereignty. The query engine operates without requiring rigid schema definitions, allowing for more flexible data analysis. Selective log ingestion capabilities minimize data duplication and associated costs. The system's flexible data structures readily adapt to changing log formats, reducing maintenance overhead.
Search Performance
Scanner's core search engine leverages a specialized inverted index architecture designed specifically to work with data in S3, enabling fast query performance at scale. For high-speed threat hunting, needle-in-haystack searches—like scanning for specific IP addresses, domains, or other indicators of compromise—can process 100TB of uncompressed log data in just 10 seconds.
The system automatically searches across all log sources simultaneously, eliminating data silos and enabling security engineers to quickly correlate activity across EDR logs, VPC flow logs, and other sources with a single query. This unified search capability is particularly valuable during incident investigations, where rapid cross-source analysis can reveal the full scope of potential security events.