Infosys offers full potential of cloud ecosystem with Infosys Cobalt to increase business value and speed to market.

The client is a European postal and logistics organization. They were looking for a vendor who could provide 24x7 monitoring of their cloud landscape, improve security posture of the Azure and AWS environments, and provide vulnerability management services to identify security gaps and protect from internal and external malware attacks.

Infosys deployed and utilized EDR, deception technology, SIEM + SOAR services, vulnerability assessment tools, DAST, pen testing along with 24x7x365 security monitoring and incident response support.

Key Challenges

  • Lack of security/vulnerability visibility in the cloud environment
  • Limited utilization of native cloud security controls
  • Lack of expertise to implement security controls on public cloud AWS and Azure
Line

The Solution

Fortifying client’s environment with Infosys Cyber Next

  • Implemented Infosys Cyber Next solution for SOC/SIEM, SOAR and vulnerability management
  • Performed log monitoring and incident response via Infosys CDC with 24x7 SOC support for cloud infrastructure
  • Implemented infrastructure vulnerability scans, vulnerability analysis, categorization and recommended remediation plans
  • Successfully implemented 50+ network decoy solutions to protect assets from attack vectors
  • Layered security by defense in depth via integration of multiple security tools (EDR, Decoy)
Line

Benefits

Round the clock security monitoring and cyber threat detection

Enhanced foundation level score of AWS cloud security by 37% and Azure cloud security by 10%

Enhanced foundation level score of AWS cloud security by 37% and Azure cloud security by 10%

Blocked 5000+ malicious attacker IP addresses within six months

Blocked 5000+ malicious attacker IP addresses within six months

Deployed 130+ security use cases and four SOAR playbooks for effective and automated detection of cyber threats

Deployed 130+ security use cases and four SOAR playbooks for effective and automated detection of cyber threats

Identified three critical risks within two months by 24x7 security monitoring

Identified three critical risks within two months by 24x7 security monitoring

Reduced organization’s threat exposure via proactive detection and reporting of incidents, brand monitoring, IP leakage monitoring, and threat advisory

Reduced organization’s threat exposure via proactive detection and reporting of incidents, brand monitoring, IP leakage monitoring, and threat advisory

Centralized tracking and monitoring of logging and correlation from a single console

Centralized tracking and monitoring of logging and correlation from a single console

Prevented client's environment from 70+ cyber attackers within 6 months

Prevented client's environment from 70+ cyber attackers within 6 months