A large automobile manufacturing company based in Mumbai

A large automobile manufacturing company based in Mumbai

Highlights

  • Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five
  • Centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release
  • Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

Challenge

  • Implementation of a comprehensive Big Data-based Security SIEM platform.
  • Enable log correlation and anomaly-driven analysis for over 5400 enterprise devices.
  • Requirement for fast query response time (within 30 seconds) for incident analysis.
  • Ensure high-availability solution architecture.
  • Address a sophisticated and continuously evolving threat landscape.
  • Quicker deployment and installation timelines.
  • Provide support for all types of queries (simple, complex, built-in, and custom).
  • Ensure faster response while maintaining compliance and quality across 5700+ core infrastructure assets.
  • Integrate existing and future IT infrastructure along with security solutions.

Scope

  • Implemented a SIEM platform with SOAR capabilities for enhanced security operations.
  • Integrated next-generation SIEM solution across 5700+ core data center infrastructure components.
  • Supported diverse operating systems including AIX, CentOS Linux, Cisco IOS, Linux, VMware, and Windows.
  • Integrated multiple databases such as DB2, ESSBASE, MS SQL, Oracle, MySQL, and SAP MaxDB.
  • Covered network and security devices including routers, core & access switches, load balancers, firewalls, IDS/IPS, SAN switches, TOR switches, VPN concentrators, and web security tools.

Automation benefits

  • Improved overall security posture ensuring confidentiality, integrity, and availability of assets.
  • Advanced threat monitoring and detection with automated alert triage, prioritization, and validation.
  • Faster incident response using analytical and incident management tools.
  • Reduced manual effort, enabling analysts to focus more on analysis than research.
  • Enhanced reporting capabilities including user activity, configuration changes, incident tracking, and attack source reports.

Related Readings