SlideShare une entreprise Scribd logo
1  sur  4
Security Transformation and
     System Integration Services




HCL Information Security Practice
Why Security Transformation and
System Integration Services
                                                                             ?
Today organizations are facing multiple challenges like increasing competition, regulatory measures, globalization, making their survival
more difficult. Before evolution of Internet, antivirus used to be the only defense mechanism that used to be considered as most critical
and floppy disks used to be most dangerous. As Internet made the technology available at the finger tips, antivirus is no more sufficient.

Now day’s attackers may not be interested in infecting machine & impacting its performance but may be more interested in stealing the
information which can be million dollar worth. Systems can be compromised in multiple ways:


§ USB stick causing some infection
 An
§Some removable media such as CD/DVD which has some malicious content
§Through the means of file shares
§Gaining remote control by exploiting some weakness/vulnerability in the system
§Sniffing traffic flowing to/from specific server
§Compromising some clients which are considered as trusted sources having full access to the server under consideration
§Social engineering techniques - getting information directly or indirectly through administrative users


Thus now days the security solution has to ensure that it is covering all the areas stated above. No single layer of security is enough to
survive various types of attack. So, you need to add as much layers of security as available and as easily possible & most importantly
aligned to organization’s security risk.




Our Approach
HCL helps the organizations in the transformation process to plan, design and implement a proactive, enterprise-wide security strategy
that aligns with their overall business objectives. HCL Security Consultants has successfully turned customer’s business and technical
requirements into a best product solution for a large number of cases for different security technologies. HCL follows the basic principle of
security while designing the solution architecture, ensuring it to be simple enough to be managed effectively and difficult enough to be
broken. With the perfect blend of knowledge and experience, HCL’s Transformation and System Integration team ensures that the
customer gets the expected functionality in the best possible manner.

HCL has a dedicated team of System Integrators & Project Management professionals who have a combined experience of more than
500+ man years in supervising the entire project throughout its lifecycle. HCL adopts a phased approach covering the entire security life-
cycle, which begins with Design & Engineering and ends with Acceptance Testing & Sign-off, thus creating successful track history of
delivering all kinds of projects within time frames.




      Solution Design                          Project                       Product Evaluation                Sustenance Service
       & Integration                         Management                          & Testing

                                                                                                             ŸDevice Management
 ŸSolution design &                    ŸProject planning                  ŸBusiness requirement              ŸPeriodic maintenance
     implementation                    ŸProject management                    assessment                     ŸUpgrade & update
 ŸSolution Integration with            ŸThird party vendor                ŸTechnology evaluation             ŸConfiguration
     other components                      coordination                   ŸVendor evaluation                     management
 ŸTechnical refresh                    ŸOEM coordination                  ŸProduct mapping                   ŸProblem management
 ŸMigration service                    ŸM&A planning and                  ŸSolution specification            ŸChange management
 ŸCaptive setup design                     execution                          mapping                        ŸVendor management
 Ÿ design and
  DC                                   ŸProject governance                ŸProduct UAT                       ŸOn-site facility
     implementation                        and management
                                                                                                                 management



                     Security Professional Services Portfolio
Gartner has recognized HCL for its strong partner eco-system. Our partner eco-system consists of leading vendors and OEM’s of
Information Security solutions & products and we have a long history of working with each one of them, understanding their technology
roadmap in pace with the latest industry trends. We also understand our customer’s challenges and design solutions with our eco-system
partners to offer strategic, operational or financial benefit to our customers.


                                  Partner
                                 Ecosystem

                                                                                                                                       Industry
                                     Product Roadmaps                                                                                Developments
                                        Technology

                                                                                                               Technology Trends                                      Customer Experiences

                                                                                                                                                                    Learning's

                                                                                                                       HCL Center of Excellence

                                                       Proof of Concept Lab                                           Technology Evaluation                             Product Evaluation



                                                                                                                                           Customer Benefits
                                                            Customer
                                                          Requirements                                                     Strategic           Operational                           Financial




HCL Transformation & SI Services Deliverables
& Value Commitments
The key differentiator in the engagement approach is HCL works with the customer as their partner in their business aligned Information
Security program and not just as the reseller or an external service provider.



                                 ? architecture &
                                 Secure                                                                     Multi-Tier firewall
                                                                                                            ?                                                        Quick and effective address of
                                                                                                                                                                     ?
                                    framework design                                                                                                                    business needs
                                                                                                            Network/host IDS/IPS
                                                                                                            ?
                                                                      Partial List of Security Technology




                                 ? and setup solution
                                 Design                                                                                                                              Involvement of industry
                                                                                                                                                                     ?
                                                                                                            ? filtering for mail &
                                                                                                            Content
                                    controls to meet any                                                                                                                experts and SMEs
                                                                                                               web
   System Integration Services




                                    compliance requirement
                                                                                                                                                                     ? delivery of project
                                                                                                                                                                     Timely
                                    (PCI, ISO 27001, DPA etc.)                                              Data Leakage Prevention
                                                                                                            ?
                                                                                                                                                                        commitments every time
                                                                                                                                                Value Commitments




                                                                                                               Solution at end point or
                                 Technology evaluation and
                                 ?
                                                                                                               Network                                               Value delivery ensuring
                                                                                                                                                                     ?
                                    selection
                                                                                                                                                                        highest effectiveness for the
                                                                                                            Encryption of Data at Rest -
                                                                                                            ?
                                 ? re-architecture to
                                 Solution                                                                                                                               customers
                                                                                                               hard disk & storage
                                    address merger, de-merger
                                                                                                               encryption                                            Assurance of higher ROSI
                                                                                                                                                                     ?
                                 Technical refresh program for
                                 ?
                                                                                                            Anti-Phishing/Malware
                                                                                                            ?                                                        Safe guarding business
                                                                                                                                                                     ?
                                    existing setup to replace EOL
                                                                                                                                                                        requirements and interests of
                                    and out of support                                                      ? Access VPN solution
                                                                                                            Remote
                                                                                                                                                                        customers
                                    components                                                                 - Client based/Clientless
                                                                                                                                                                     ? scalable and
                                                                                                                                                                     Reliable,
                                 ? technology
                                 Ongoing                                                                    Policy Compliance &
                                                                                                            ?
                                                                                                                                                                        resilient solution framework
                                    management and                                                             Enforcement - NAC
                                                                                                                                                                        to meet any industry
                                    maintenance
                                                                                                            End Point Security Solutions
                                                                                                            ?                                                           requirement
                                 ? up and migration to
                                 Setting
                                                                                                            ? Authentication
                                                                                                            Strong                                                   ? neutral approach
                                                                                                                                                                     Vendor
                                    an integrated management
                                    framework (SOC)                                                         ? & Incident
                                                                                                            Security
                                                                                                               Management & Correlation
                                                                                                            Centralized Log Management
                                                                                                            ?
Case in Discussion
The Case Study discusses the HCL’s capabilities for transforming/migrating the present state of architecture to a world class and agile
Service Oriented Architecture of one of our international client in the Insurance industry having its Presence in more than 100 offices
in 35 countries.



Business Challenges                         Scope of Operations                               Results / Benefits


§In-appropriate security                    §Data centre services                             §Fully unitized based pricing
 management including gaps                  § user computing and devices
                                             End                                                  model
 in event auditing and                      §Server-based application hosting &               §Delivered SLAs for Infra from
 operational security                        Client applications (on end user                     Day 1 with no SLO Period
 management                                  devices and thin-client)                         §Delivered Transition & BAU
§ proper root cause
 No                                         §Wide Area Network, remote access                     (Business as usual) in parallel
 analysis to prevent the                     solutions, connectivity to 3rd                   §Transition completed in 6
 reoccurrence of the issues                  parties including management of                      months
§Lack of flexibility and                     existing Data (WAN)                              §More than 70% work done from
 emergency support from the                  contracts/services                                   offshore
 current vendor                             §Financial and Service Management                 § to End Security Services
                                                                                               End
§Risk of unauthorized access                 for 3rd party support contracts                      Redesign & Deployment of
 and sharing of credentials                  including the M2 printer contract                    security components within
 removes accountability in                  §Business continuity and disaster                     timeframe of 3 months
 the event of an incident                    recovery planning & testing
§Little understanding of the                §Software licence management and
 compliance required to                      Hardware procurement/disposal
 manage the environment in
 line with standards and
 policies
§Increased complexity of
 migration/ transformation
 due to the acquisitions made
 by the client




                     For more details on HCL Security Transformation and System Integration Services
                     and to have our representative on call, please write to InfraPMGSecurity@hcl.com

Contenu connexe

Plus de HCL Technologies

Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioHCL Technologies
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesHCL Technologies
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimeHCL Technologies
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyHCL Technologies
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)HCL Technologies
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and DigitizationHCL Technologies
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in DigitalHCL Technologies
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...HCL Technologies
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...HCL Technologies
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...HCL Technologies
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...HCL Technologies
 
"Cost Savings Enabled for European Financial Services company "
"Cost Savings Enabled for European Financial Services company ""Cost Savings Enabled for European Financial Services company "
"Cost Savings Enabled for European Financial Services company "HCL Technologies
 
Transforming the Product Portfolio
Transforming the Product PortfolioTransforming the Product Portfolio
Transforming the Product PortfolioHCL Technologies
 
Improved Underwriting Capabilities for Life Insurance Provider
Improved Underwriting Capabilities for Life Insurance ProviderImproved Underwriting Capabilities for Life Insurance Provider
Improved Underwriting Capabilities for Life Insurance ProviderHCL Technologies
 
HCL's transformation services for Europe's largest Global Life and Annuity In...
HCL's transformation services for Europe's largest Global Life and Annuity In...HCL's transformation services for Europe's largest Global Life and Annuity In...
HCL's transformation services for Europe's largest Global Life and Annuity In...HCL Technologies
 
Driving Underwriting Efficiency for a US based Integrated Financial Service P...
Driving Underwriting Efficiency for a US based Integrated Financial Service P...Driving Underwriting Efficiency for a US based Integrated Financial Service P...
Driving Underwriting Efficiency for a US based Integrated Financial Service P...HCL Technologies
 
Improving Operational Efficiencies through HCL solution
Improving Operational Efficiencies through HCL solutionImproving Operational Efficiencies through HCL solution
Improving Operational Efficiencies through HCL solutionHCL Technologies
 
How Ideapreneurs take Relationships Beyond the Contract
How Ideapreneurs take Relationships Beyond the ContractHow Ideapreneurs take Relationships Beyond the Contract
How Ideapreneurs take Relationships Beyond the ContractHCL Technologies
 
Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...
Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...
Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...HCL Technologies
 

Plus de HCL Technologies (20)

Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic Diseases
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real Time
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and Digitization
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in Digital
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
 
"Cost Savings Enabled for European Financial Services company "
"Cost Savings Enabled for European Financial Services company ""Cost Savings Enabled for European Financial Services company "
"Cost Savings Enabled for European Financial Services company "
 
Transforming the Product Portfolio
Transforming the Product PortfolioTransforming the Product Portfolio
Transforming the Product Portfolio
 
Improved Underwriting Capabilities for Life Insurance Provider
Improved Underwriting Capabilities for Life Insurance ProviderImproved Underwriting Capabilities for Life Insurance Provider
Improved Underwriting Capabilities for Life Insurance Provider
 
HCL's transformation services for Europe's largest Global Life and Annuity In...
HCL's transformation services for Europe's largest Global Life and Annuity In...HCL's transformation services for Europe's largest Global Life and Annuity In...
HCL's transformation services for Europe's largest Global Life and Annuity In...
 
Driving Underwriting Efficiency for a US based Integrated Financial Service P...
Driving Underwriting Efficiency for a US based Integrated Financial Service P...Driving Underwriting Efficiency for a US based Integrated Financial Service P...
Driving Underwriting Efficiency for a US based Integrated Financial Service P...
 
Improving Operational Efficiencies through HCL solution
Improving Operational Efficiencies through HCL solutionImproving Operational Efficiencies through HCL solution
Improving Operational Efficiencies through HCL solution
 
How Ideapreneurs take Relationships Beyond the Contract
How Ideapreneurs take Relationships Beyond the ContractHow Ideapreneurs take Relationships Beyond the Contract
How Ideapreneurs take Relationships Beyond the Contract
 
Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...
Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...
Novel VLSI Design & Verification Strategies for Advanced Wireless Technologie...
 

Dernier

Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Dernier (20)

Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 

HCLT Brochure: Security Transformation System Integration Services

  • 1. Security Transformation and System Integration Services HCL Information Security Practice
  • 2. Why Security Transformation and System Integration Services ? Today organizations are facing multiple challenges like increasing competition, regulatory measures, globalization, making their survival more difficult. Before evolution of Internet, antivirus used to be the only defense mechanism that used to be considered as most critical and floppy disks used to be most dangerous. As Internet made the technology available at the finger tips, antivirus is no more sufficient. Now day’s attackers may not be interested in infecting machine & impacting its performance but may be more interested in stealing the information which can be million dollar worth. Systems can be compromised in multiple ways: § USB stick causing some infection An §Some removable media such as CD/DVD which has some malicious content §Through the means of file shares §Gaining remote control by exploiting some weakness/vulnerability in the system §Sniffing traffic flowing to/from specific server §Compromising some clients which are considered as trusted sources having full access to the server under consideration §Social engineering techniques - getting information directly or indirectly through administrative users Thus now days the security solution has to ensure that it is covering all the areas stated above. No single layer of security is enough to survive various types of attack. So, you need to add as much layers of security as available and as easily possible & most importantly aligned to organization’s security risk. Our Approach HCL helps the organizations in the transformation process to plan, design and implement a proactive, enterprise-wide security strategy that aligns with their overall business objectives. HCL Security Consultants has successfully turned customer’s business and technical requirements into a best product solution for a large number of cases for different security technologies. HCL follows the basic principle of security while designing the solution architecture, ensuring it to be simple enough to be managed effectively and difficult enough to be broken. With the perfect blend of knowledge and experience, HCL’s Transformation and System Integration team ensures that the customer gets the expected functionality in the best possible manner. HCL has a dedicated team of System Integrators & Project Management professionals who have a combined experience of more than 500+ man years in supervising the entire project throughout its lifecycle. HCL adopts a phased approach covering the entire security life- cycle, which begins with Design & Engineering and ends with Acceptance Testing & Sign-off, thus creating successful track history of delivering all kinds of projects within time frames. Solution Design Project Product Evaluation Sustenance Service & Integration Management & Testing ŸDevice Management ŸSolution design & ŸProject planning ŸBusiness requirement ŸPeriodic maintenance implementation ŸProject management assessment ŸUpgrade & update ŸSolution Integration with ŸThird party vendor ŸTechnology evaluation ŸConfiguration other components coordination ŸVendor evaluation management ŸTechnical refresh ŸOEM coordination ŸProduct mapping ŸProblem management ŸMigration service ŸM&A planning and ŸSolution specification ŸChange management ŸCaptive setup design execution mapping ŸVendor management Ÿ design and DC ŸProject governance ŸProduct UAT ŸOn-site facility implementation and management management Security Professional Services Portfolio
  • 3. Gartner has recognized HCL for its strong partner eco-system. Our partner eco-system consists of leading vendors and OEM’s of Information Security solutions & products and we have a long history of working with each one of them, understanding their technology roadmap in pace with the latest industry trends. We also understand our customer’s challenges and design solutions with our eco-system partners to offer strategic, operational or financial benefit to our customers. Partner Ecosystem Industry Product Roadmaps Developments Technology Technology Trends Customer Experiences Learning's HCL Center of Excellence Proof of Concept Lab Technology Evaluation Product Evaluation Customer Benefits Customer Requirements Strategic Operational Financial HCL Transformation & SI Services Deliverables & Value Commitments The key differentiator in the engagement approach is HCL works with the customer as their partner in their business aligned Information Security program and not just as the reseller or an external service provider. ? architecture & Secure Multi-Tier firewall ? Quick and effective address of ? framework design business needs Network/host IDS/IPS ? Partial List of Security Technology ? and setup solution Design Involvement of industry ? ? filtering for mail & Content controls to meet any experts and SMEs web System Integration Services compliance requirement ? delivery of project Timely (PCI, ISO 27001, DPA etc.) Data Leakage Prevention ? commitments every time Value Commitments Solution at end point or Technology evaluation and ? Network Value delivery ensuring ? selection highest effectiveness for the Encryption of Data at Rest - ? ? re-architecture to Solution customers hard disk & storage address merger, de-merger encryption Assurance of higher ROSI ? Technical refresh program for ? Anti-Phishing/Malware ? Safe guarding business ? existing setup to replace EOL requirements and interests of and out of support ? Access VPN solution Remote customers components - Client based/Clientless ? scalable and Reliable, ? technology Ongoing Policy Compliance & ? resilient solution framework management and Enforcement - NAC to meet any industry maintenance End Point Security Solutions ? requirement ? up and migration to Setting ? Authentication Strong ? neutral approach Vendor an integrated management framework (SOC) ? & Incident Security Management & Correlation Centralized Log Management ?
  • 4. Case in Discussion The Case Study discusses the HCL’s capabilities for transforming/migrating the present state of architecture to a world class and agile Service Oriented Architecture of one of our international client in the Insurance industry having its Presence in more than 100 offices in 35 countries. Business Challenges Scope of Operations Results / Benefits §In-appropriate security §Data centre services §Fully unitized based pricing management including gaps § user computing and devices End model in event auditing and §Server-based application hosting & §Delivered SLAs for Infra from operational security Client applications (on end user Day 1 with no SLO Period management devices and thin-client) §Delivered Transition & BAU § proper root cause No §Wide Area Network, remote access (Business as usual) in parallel analysis to prevent the solutions, connectivity to 3rd §Transition completed in 6 reoccurrence of the issues parties including management of months §Lack of flexibility and existing Data (WAN) §More than 70% work done from emergency support from the contracts/services offshore current vendor §Financial and Service Management § to End Security Services End §Risk of unauthorized access for 3rd party support contracts Redesign & Deployment of and sharing of credentials including the M2 printer contract security components within removes accountability in §Business continuity and disaster timeframe of 3 months the event of an incident recovery planning & testing §Little understanding of the §Software licence management and compliance required to Hardware procurement/disposal manage the environment in line with standards and policies §Increased complexity of migration/ transformation due to the acquisitions made by the client For more details on HCL Security Transformation and System Integration Services and to have our representative on call, please write to InfraPMGSecurity@hcl.com