proactive security event monitoring system - soc

2
About the Client and their Business Need Vulnerable to cyber threats Proactive Security Event Monitoring System - SOC SECURITY EVENT MONITORING (PRIVATE SECTOR BANK IN INDIA) CASE STUDY [email protected] www.inspirisys.com Our client is a major private sector bank with 2136 branches across 27 states in India. The bank was evalua�ng poten�al enterprise security service providers to integrate and effec�vely monitor the security events in Windows, Linux, network and other devices. Being one of the top private sector banks in the country, it was vulnerable to cyber-a�acks. Cri�cal Banking data at risk Lack of proac�ve security event monitoring Business Challenges

Upload: others

Post on 08-Jan-2022

4 views

Category:

Documents


0 download

TRANSCRIPT

About the Clientand their Business Need

Vulnerable to cyberthreats

Proactive SecurityEvent MonitoringSystem - SOC

SECURITY EVENT

MONITORING

(PRIVATE SECTOR BANK IN INDIA)

CASE STUDY

[email protected]

Our client is a major private sector bank with 2136 branches across 27 states in India. The bank

was evalua�ng poten�al enterprise security service providers to integrate and effec�vely

monitor the security events in Windows, Linux, network and other devices. Being one

of the top private sector banks in the country, it was vulnerable to cyber-a�acks.

Cri�cal Banking dataat risk

Lack of proac�ve security event monitoring

Business Challenges

[email protected]

www.inspirisys.com

DISCLAIMERThe informa�on in this document is confiden�al to the person to whom it is addressed and should not be disclosed to any other person. It may not bereproduced in whole, or in part, nor may any of the informa�on contained therein be disclosed without the prior consent of the Chairman and ChiefExecu�ve Officer/President – Corporate of Inspirisys Solu�ons Limited (Formerly Accel Frontline Limited) (‘the Company’). A recipient may not solicit,directly or indirectly (whether through an agent or otherwise) the par�cipa�on of another ins�tu�on or person without the prior approval of the Directorsof the Company. The contents of this document have not been independently verified and they do not purport to be comprehensive or to contain all theinforma�on that a prospec�ve investor may need. No representa�on, warranty or undertaking, expressed or implied is or will be made or given and noresponsibility or liability is or will be accepted by the Company or by any of its directors, employees or advisors in rela�on to the accuracy or completenessof this document or any other wri�en or oral informa�on made available in connec�on with the Company @ 2020

Follow Us+91-44-4225 2000

Our Solution and Approach• 24/7 Security Monitoring• Malicious Ac�vity Repor�ng• Security Report on hourly, daily and weekly to meet the compliance• Use cases based on the requirement• Enhancing the exis�ng use case• Hardware and So�ware monitoring• Resolving the hardware and so�ware issues• Security Events Dashboard

Business Results

Increased securityvisibility on wide

infrastructure

Defence against securitybreaches, data exfiltra�onfrom internal & external

threats

Skilled experts incybersecurity