Case Study: Security Implementation for a Pharmaceutical Company

Similar documents
Case Study: Security Implementation for a Global Packaging Company

Defense in Depth Security in the Enterprise

Skybox Product Tour. Installation and Starting Your Product Tour Tour Login Credentials: User Name: skyboxview Password: skyboxview

securing your network perimeter with SIEM

Teradata and Protegrity High-Value Protection for High-Value Data

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Identity & Access Management

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Onapsis: The CISO Imperative Taking Control of SAP

Network Security Protection Alternatives for the Cloud

Security

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Security Information & Event Management (SIEM)

ISE Central Executive Forum and Awards 2012

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

align security instill confidence

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

NEXT GENERATION SECURITY OPERATIONS CENTER

Unlocking the Power of the Cloud

McAfee epolicy Orchestrator

Microsoft Security Management

From Managed Security Services to the next evolution of CyberSoc Services

Security Audit What Why

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Comprehensive Database Security

Cyber Attacks & Breaches It s not if, it s When

Top 10 use cases of HP ArcSight Logger

Simplify, Streamline and Empower Security with ISecOps

CHALLENGES GOVERNANCE INTEGRATION SECURITY

Think Like an Attacker

Carbon Black PCI Compliance Mapping Checklist

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

THE ACCENTURE CYBER DEFENSE SOLUTION

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cyber Security Technologies

QuickBooks Online Security White Paper July 2017

We re Gonna Need a Bigger Boat

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

locuz.com SOC Services

Cyber Defense Operations Center

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Incident Response Services

Exam: : VPN/Security. Ver :

ISO27001 Preparing your business with Snare

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

SIEMLESS THREAT DETECTION FOR AWS

Trustwave Managed Security Testing

TRIPWIRE VIA PLATFORM PROTECTING YOUR DATA WITH INTEGRATED SECURITY CONTROLS

FireMon Security manager

Understanding Perimeter Security

Securing Your Digital Transformation

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

TSPLUS PRODUCTS CATALOG RDP Software Editor 1

ManageEngine EventLog Analyzer Quick Start Guide

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

An ICS Whitepaper Choosing the Right Security Assessment

Compliance with CloudCheckr

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

CloudSOC and Security.cloud for Microsoft Office 365

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Security and Architecture SUZANNE GRAHAM

Comodo Certificate Manager

See What You ve Been Missing

ISE North America Leadership Summit and Awards

Simplify Your Network Security with All-In-One Unified Threat Management

Continuous Risk Assessment, Made Simple

Software Updating: Hitting the Mark

Watson Developer Cloud Security Overview

ITSM SERVICES. Delivering Technology Solutions With Passion

IBM Internet Security Systems Proventia Management SiteProtector

Managing Microsoft 365 Identity and Access

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

UNIFICATION OF TECHNOLOGIES

2015 VORMETRIC INSIDER THREAT REPORT

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

White Paper. View cyber and mission-critical data in one dashboard

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Sage Data Security Services Directory

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

RSA IT Security Risk Management

Designing and Building a Cybersecurity Program

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Symantec Security Monitoring Services

External Supplier Control Obligations. Cyber Security

Your Trusted Partner in Europe European Business Reliance Centre

New World, New IT, New Security

Mapping BeyondTrust Solutions to

INTELLIGENT CYBER THREAT DEFENSE. Fight tomorrow s cyber threats in real time with cutting edge machine learning

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Transcription:

Case Study: Security Implementation for a Pharmaceutical Company The Story Security Challenges and Analysis The Case The SmartPoint Guard Solution The Results

The Story About the Pharmaceutical Provider An international pharmaceutical company needed a way to protect their proprietary information and client data. To accomplish these goals, they needed to partner with a security company who could ensure both SOX compliance, ease of use, and robust security management. Quick Facts Serve over 100 markets, 41 biotech companies, 48 pharmaceutical companies 1,000 scientists 30 global sites 100 billion units produced annually 1,200 patents and patent applications Security Challenge Analysis Respond to threats in real time Needed perimeter protection for the financial information on their SAP. Wanted data center protection to ensure all the financials and other information flowing through their network were secure. Needed a solution that could detect, prevent, and analyze threats and attacks in real time. Maintain SOX Compliance Needed an easy-to-use tool they could use to report SOX compliance. Required a solution that could ensure they accurately proved compliance. Needed a solution that ensured they maintained federal, state, and industry compliance. Utilize External Security Team They wanted an external security team that could detect threats, analyze them, and protect against future threats.

SmartPoint Guard Security Solution Enterprise Vulnerability ScanningService (EVSS) Utilizes the security information portal, which evaluatesnetworks and performs diagnostics On-demand vulnerability scanning portal that identifies vulnerabilities efficiently and accurately, protecting critical network assets and intellectual property Can scan any of the following for threats: Firewalls IPS IDS Application servers Web servers Active Directory controllers Email servers Layer2 and Layer3 Switches Routers and gateways All networked workstations and peripherals Downloadexecutive summary and detailed reports after scans are complete to ensure compliance

SmartPoint Guard Security Solution Continued IDS/IPS Detects threats and creates security alerts Preventsbreaches from occurring Monitors the network in real-time, 24/7 Instantly notifies the security team if it identifies a hack or viable threat Generates reports and logs the security team can utilize to identify weaknesses in the network and repair them Log Management Aggregates logs from multiple services and devices. Stores logs safely and securely in a private cloud that only the company and security team can access. Reduces storage space needed for the company by storing all the logs on a secure cloud. Alerts customers to developing threats across the entire network. Maintains industry compliance without increasing network storage Provides additional insights into network flow and management reporting

SmartPoint Guard Security Solution Continued Security Information and Event Management(SIEM) Collects, analyzes, and correlates data to help better inform security decisions. Provides detailed reports that can be customized to meet any compliance standards. Responds to any threats in real-time so the security team can re-secure the network before any attacks occur.

Summary When a pharmaceutical company needed a security system to protect the large amounts of proprietary and private data they process a day, they partnered with SmartPoint Guard. By partnering with SmartPointGuard, the company was able to: Meet all SOX compliance requirements every year. Create customized audit reports to prove compliance and meet other audit standards. Ensure data processed on their network was safe from hackers with IPS/IDS solutions. Work with security specialists to improve overall security on their system by creating new policies and customizing reports for key stakeholders.