SOTI MobiControl – MDM solution and implemented cases

Problem: employees using unapproved software at workplaces, losing mobile devices with service information.

 

Solution: allows centralized management of corporate devices to ensure security, support and management of business devices.

 

Implementation: this solution was implemented in LifeCell UA.

 

Result (s) achieved: loss of confidential information was minimized, the policy of installed software was regulated.

Thunder NSI solution and implemented cases

Problem:

Thunder NSI solution and implemented cases

Decision:

using a cloud platform, it takes care of all the DNS queries, analyzes them and sends only trusted queries to the client’s network.

Results Achieved:

300K + threats blocked, reduction in the number of calls to the support service, the database “Big Data” 2B + data points was created, the caching speed was increased to 90%.

IBM solution and implemented cases

Problem:

Collection and analysis of logs. Prioritization of information security events. Investigation of incidents. User Behavioral Analysis.

Decision:

IBM Qradar, UBA, Watson.

Results Achieved:

Collection and analysis of 1.3 TB of logs per day. Prioritize all information security events. The threat response time has been reduced from 5 hours to 10 minutes. The time to investigate incidents decreased from 6 days to 4 hours. Behavioral analysis of all employees for risks to the company and infrastructure. All events from different sources of information are now in one interface.

Splunk solution and implemented cases

Problem:

a wide variety of network devices.

Decision:

a wide variety of network devices.

Results Achieved:

  • the presence of a single processing center;
  • and monitoring data from network devices;
  • allowed to reduce response time;
  • for an incident up to 5 minutes, which reduced costs;
  • associated with downtime 1.8 times.

Qualys solution and implemented cases

Problem:

Vulnerability Management. Inventory of IT assets. Investigation of incidents. Reporting to management and regulators.

Decision:

Visibility picture of the vulnerability of the entire network 24/7. Inventory of all IT assets, certificates and licenses. Automatic reporting of closed vulnerabilities and the state of infrastructure today. Monitoring and compliance with regulatory requirements. Equipment settings according to world standards GDPR, PCI DSS, ISO.

Results Achieved:

Vulnerability visibility on the network 24/7. Prioritize vulnerabilities from most critical to less important. Ways to solve and patch each of the vulnerabilities found, which allows to reduce the incident closure time to 2 hours. The report preparation time for the regulator and top management was reduced to 1 hour, which saves the resources of IS employees by 1 business day. An inventory of IT assets and licenses increased the productivity of procurement and IT staff by 4 times. Investigation of incidents was reduced to 2.5 hours.

Endpoint protector solution and implemented cases

Problem:

one of the leaders of DLP solutions (Data Loss Prevention).

Decision:

monitors and analyzes all passing user data and identifies leaks or possible risk data.

Results Achieved:

  • loss prevention;
  • confidential information;
  • allowed to keep the news secret;
  • from competitors.

Lancom Systems solution and implemented cases

Problem:

variety of network equipment on the market.

Decision:

network equipment from one manufacturer.

Results Achieved:

reduction of equipment setup time.

Cobwebs solution and implemented cases

Problem:

Publication of confidential company data on social networks; leakage of your corporate or personal data.

Decision:

through its accounts and accesses, it collects information according to the criteria specified by the customer and issues a report.

Results Achieved:

unreliable employees found in companies.

Thunder NSI solution and implemented cases

Problem:

consolidation of a distributed network into a single virtual network.

Decision:

using a cloud platform and end physical devices allows you to build a virtual network of the enterprise.

Results Achieved:

single point of administration, simplicity of settings allowed to reduce the requirements for the qualifications of duty administrators Encrypted tunnels, DNS Security, Cloud Firewall, Load Balance are now all in one device and controlled automatically by Machine Learning.

Wallix solution and implemented cases

Problem:

What do system administrators, database administrators, remote programmers do on your system? Who controls them? What actions led to data loss, inaccessibility of resources?

Decision:

monitors and monitors the actions of privileged users of your network.

Results Achieved:

differentiation of access by device groups, access and action control, working hours, prohibition of critical teams, all this allowed to increase the level of performing discipline among privileged users and reduce incidents with a negligent attitude to work.