A large automobile manufacturing company based in Mumbai
A large automobile manufacturing company based in Mumbai
Highlights
- Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five
- Centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release
- Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
Challenge
- Implementation of a comprehensive Big Data-based Security SIEM platform.
- Enable log correlation and anomaly-driven analysis for over 5400 enterprise devices.
- Requirement for fast query response time (within 30 seconds) for incident analysis.
- Ensure high-availability solution architecture.
- Address a sophisticated and continuously evolving threat landscape.
- Quicker deployment and installation timelines.
- Provide support for all types of queries (simple, complex, built-in, and custom).
- Ensure faster response while maintaining compliance and quality across 5700+ core infrastructure assets.
- Integrate existing and future IT infrastructure along with security solutions.
Scope
- Implemented a SIEM platform with SOAR capabilities for enhanced security operations.
- Integrated next-generation SIEM solution across 5700+ core data center infrastructure components.
- Supported diverse operating systems including AIX, CentOS Linux, Cisco IOS, Linux, VMware, and Windows.
- Integrated multiple databases such as DB2, ESSBASE, MS SQL, Oracle, MySQL, and SAP MaxDB.
- Covered network and security devices including routers, core & access switches, load balancers, firewalls, IDS/IPS, SAN switches, TOR switches, VPN concentrators, and web security tools.
Automation benefits
- Improved overall security posture ensuring confidentiality, integrity, and availability of assets.
- Advanced threat monitoring and detection with automated alert triage, prioritization, and validation.
- Faster incident response using analytical and incident management tools.
- Reduced manual effort, enabling analysts to focus more on analysis than research.
- Enhanced reporting capabilities including user activity, configuration changes, incident tracking, and attack source reports.