The client is a leading wind engineering company. They were looking for a partner who could address their varied security challenges, improve visibility and implement security automation for incident response.

Infosys designed and delivered a holistic security solution aligned with the client’s requirements.

Key Challenges

  • Heterogeneous security architecture
  • Legacy security tools limiting visibility on organization-wide security posture
  • Absence of security orchestration and automation for incident response including threat containment
  • Limited visibility of vulnerabilities and threats
  • Lack of visibility on their brand abuse
Line

The Solution

Elevating the security posture with cutting edge solutions

  • Infosys SASE solution in partnership with Zscaler for proxy and VPN services
  • Crowdstrike EDR solution for protection of all endpoints and servers
  • Next Gen firewalls in all DC, critical and remote sites for network security
  • CyberArk solution for protecting all privileged accounts and servers
  • Infosys Cyber Watch with automation-first, intelligence-led, threat-centric and risk driven approach for security operations
  • Orchestration and automation playbooks for reducing Mean time to detect (MTTD), Mean time to respond (MTTR), Mean time to Contain (MTTC) and Mean time to Remediate (MTTR)
  • Infosys Cyber Intel for detecting brand abuse across the public attack surface
  • Infosys Cyber Scan for risk-based vulnerability management
Line

Benefits

Defending against cyber threats

Secured the perimeter-less network of 30,000 users with proxy VPN and Zero Trust Network Access capabilities delivered as-a-service

Secured the perimeter-less network of 30,000 users with proxy VPN and Zero Trust Network Access capabilities delivered as-a-service

Managed 30,000+ endpoints, 3,500+ VDI's, and 1,500+ servers using CrowdStrike EDR solution

Managed 30,000+ endpoints, 3,500+ VDI's, and 1,500+ servers using CrowdStrike EDR solution

Defended the client’s environment by strengthening security controls with intelligence of 500+ threat indicators

Defended the client’s environment by strengthening security controls with intelligence of 500+ threat indicators

Proactively detected and contained major threats such as system compromise and brute force attacks

Proactively detected and contained major threats such as system compromise and brute force attacks