4
and Services Security Transformation System Integration HCL Information Security Practice

System Integration Services - HCL Technologies...For more details on HCL Security Transformation and System Integration Services and to have our representative on call, please write

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: System Integration Services - HCL Technologies...For more details on HCL Security Transformation and System Integration Services and to have our representative on call, please write

and Services

Security TransformationSystem Integration

HCL Information Security Practice

Page 2: System Integration Services - HCL Technologies...For more details on HCL Security Transformation and System Integration Services and to have our representative on call, please write

Why Security Transformation and System Integration Services?Today organizations are facing multiple challenges like increasing competition, regulatory measures, globalization, making their survival more difficult. Before evolution of Internet, antivirus used to be the only defense mechanism that used to be considered as most critical and floppy disks used to be most dangerous. As Internet made the technology available at the finger tips, antivirus is no more sufficient.

Now day’s attackers may not be interested in infecting machine & impacting its performance but may be more interested in stealing the information which can be million dollar worth. Systems can be compromised in multiple ways:

Thus now days the security solution has to ensure that it is covering all the areas stated above. No single layer of security is enough to survive various types of attack. So, you need to add as much layers of security as available and as easily possible & most importantly aligned to organization’s security risk.

HCL helps the organizations in the transformation process to plan, design and implement a proactive, enterprise-wide security strategy that aligns with their overall business objectives. HCL Security Consultants has successfully turned customer’s business and technical requirements into a best product solution for a large number of cases for different security technologies. HCL follows the basic principle of security while designing the solution architecture, ensuring it to be simple enough to be managed effectively and difficult enough to be broken. With the perfect blend of knowledge and experience, HCL’s Transformation and System Integration team ensures that the customer gets the expected functionality in the best possible manner.

HCL has a dedicated team of System Integrators & Project Management professionals who have a combined experience of more than 500+ man years in supervising the entire project throughout its lifecycle. HCL adopts a phased approach covering the entire security life-cycle, which begins with Design & Engineering and ends with Acceptance Testing & Sign-off, thus creating successful track history of delivering all kinds of projects within time frames.

§An USB stick causing some infection§Some removable media such as CD/DVD which has some malicious content §Through the means of file shares §Gaining remote control by exploiting some weakness/vulnerability in the system§Sniffing traffic flowing to/from specific server§Compromising some clients which are considered as trusted sources having full access to the server under consideration§Social engineering techniques - getting information directly or indirectly through administrative users

Our Approach

Solution Design & Integration

Project Management

Product Evaluation & Testing

Sustenance Service

�Solution design & implementation

�Solution Integration with other components

�Technical refresh�Migration service�Captive setup design�DC design and

implementation

�Project planning�Project management �Third party vendor

coordination�OEM coordination �M&A planning and

execution �Project governance

and management

�Business requirement assessment

�Technology evaluation�Vendor evaluation �Product mapping�Solution specification

mapping�Product UAT

�Device Management�Periodic maintenance�Upgrade & update�Configuration

management�Problem management�Change management�Vendor management�On-site facility

management

Security Professional Services Portfolio

Page 3: System Integration Services - HCL Technologies...For more details on HCL Security Transformation and System Integration Services and to have our representative on call, please write

The key differentiator in the engagement approach is HCL works with the customer as their partner in their business aligned Information Security program and not just as the reseller or an external service provider.

Gartner has recognized HCL for its strong partner eco-system. Our partner eco-system consists of leading vendors and OEM’s of Information Security solutions & products and we have a long history of working with each one of them, understanding their technology roadmap in pace with the latest industry trends. We also understand our customer’s challenges and design solutions with our eco-system partners to offer strategic, operational or financial benefit to our customers.

HCL Deliverables & Value Commitments

Transformation & SI Services

Sy

ste

m I

nte

gr

ati

on

Se

rv

ice

s

Pa

rti

al

Lis

t o

f S

ec

ur

ity

Te

ch

no

log

y

Va

lue

Co

mm

itm

en

ts

?Secure architecture & framework design

?Design and setup solution controls to meet any compliance requirement (PCI, ISO 27001, DPA etc.)

?Technology evaluation and selection

?Solution re-architecture to address merger, de-merger

?Technical refresh program for existing setup to replace EOL and out of support components

?Ongoing technology management and maintenance

?Setting up and migration to an integrated management framework (SOC)

?Multi-Tier firewall

?Network/host IDS/IPS

?Content filtering for mail & web

?Data Leakage Prevention Solution at end point or Network

?Encryption of Data at Rest - hard disk & storage encryption

?Anti-Phishing/Malware

?Remote Access VPN solution - Client based/Clientless

?Policy Compliance & Enforcement - NAC

?End Point Security Solutions

?Strong Authentication

?Security & Incident Management & Correlation

?Centralized Log Management

?Quick and effective address of business needs

?Involvement of industry experts and SMEs

?Timely delivery of project commitments every time

?Value delivery ensuring highest effectiveness for the customers

?Assurance of higher ROSI

?Safe guarding business requirements and interests of customers

?Reliable, scalable and resilient solution framework to meet any industry requirement

?Vendor neutral approach

Partner Ecosystem

Product RoadmapsTechnology

Technology Trends

Learning's

Industry Developments

Customer Experiences

Proof of Concept Lab Technology Evaluation

Strategic

Product Evaluation

Operational Financial

HCL Center of Excellence

Customer BenefitsCustomer

Requirements

Page 4: System Integration Services - HCL Technologies...For more details on HCL Security Transformation and System Integration Services and to have our representative on call, please write

For more details on HCL Security Transformation and System Integration Servicesand to have our representative on call, please write to [email protected]

§In-appropriate security management including gaps in event auditing and operational security management

§No proper root cause analysis to prevent the reoccurrence of the issues

§Lack of flexibility and emergency support from the current vendor

§Risk of unauthorized access and sharing of credentials removes accountability in the event of an incident

§Little understanding of the compliance required to manage the environment in line with standards and policies

§Increased complexity of migration/ transformation due to the acquisitions made by the client

The Case Study discusses the HCL’s capabilities for transforming/migrating the present state of architecture to a world class and agile Service Oriented Architecture of one of our international client in the Insurance industry having its Presence in more than 100 offices in 35 countries.

§Data centre services §End user computing and devices §Server-based application hosting &

Client applications (on end user devices and thin-client)

§Wide Area Network, remote access solutions, connectivity to 3rd parties including management of existing Data (WAN) contracts/services

§Financial and Service Management for 3rd party support contracts including the M2 printer contract

§Business continuity and disaster recovery planning & testing

§Software licence management and Hardware procurement/disposal

§Fully unitized based pricing model

§Delivered SLAs for Infra from Day 1 with no SLO Period

§Delivered Transition & BAU (Business as usual) in parallel

§Transition completed in 6 months

§More than 70% work done from offshore

§End to End Security Services Redesign & Deployment of security components within timeframe of 3 months

Case in Discussion

Business Challenges Scope of Operations Results / Benefits