The client is an American multinational corporation. They were lacking an intrusive transformation environment for consolidation of services and tools.

Infosys helped by providing managed security services involving Security Operations Center (SOC) monitoring.

Key Challenges

  • IT security infrastructure managed by multiple vendors leading to perceived business risks
  • Absence of an integrated asset view leading to ineffective security operations and governance
  • Administrative overheads increasing at a fast pace
  • Lack of scalable security monitoring solutions and next-gen security use cases
Line

The Solution

Providing 24×7 managed security services

  • Federated SOC by leveraging common SOC monitoring solution to ensure data segregation for compliance and regulatory needs
  • Provided 24x7x365 end-to-end managed security services
  • Implemented advanced security uses cases inline with MITRE ATT&CK framework
  • Initiated cross system threat sharing for proactive threat monitoring
  • Provided proactive brand monitoring, threat monitoring, and intel sharing via Cyber Intel service
  • Proactively secured customer network and infrastructure through strategic blocks and actions on Indicators of Compromise (IoCs) and Indicators of Attack (IoAs)
Line

Benefits

A cost-effective threat monitoring solution

Reduced cost and administrative overheads due to scalable and affordable federated SOC

Reduced cost and administrative overheads due to scalable and affordable federated SOC

Decreased incident response time and increased true positive maturity

Decreased incident response time and increased true positive maturity

Secured 30,000+ internal users, 50,000+ external users, 27,000+ endpoints, and 2,500+ servers via managed services

Secured 30,000+ internal users, 50,000+ external users, 27,000+ endpoints, and 2,500+ servers via managed services

Addressed 5000+ overall and 100+ priority fraudulent entities impersonating customer to ensure no reputation or business loss

Addressed 5000+ overall and 100+ priority fraudulent entities impersonating customer to ensure no reputation or business loss

150+ use case detection controls enabled, 10+ automation playbooks enabled, and brand and threat monitoring implemented from Cyber Intel perspective

150+ use case detection controls enabled, 10+ automation playbooks enabled, and brand and threat monitoring implemented from Cyber Intel perspective