Vendors offer us many powerful solutions, but sometimes the only solution is the one we create locally, especially if we need to achieve a very specific task--such as a versatile tool to merge threat data from outside with information on locally observed attackers--or to profile would-be attackers using a honeypot or honeynet. Join Michael Williams (UNC-CH Network Security Team Lead) and Charles Mewshaw (UNC FSU CISO) as they discuss unique approaches to local solutions they've each recently undertaken and the results they've seen.