0% found this document useful (0 votes)
125 views

HCL Information Security Practice: Security Transformation System Integration

HCL provides security transformation and system integration services to help organizations address modern security challenges. This includes designing and implementing a holistic security strategy across multiple layers to protect against various attack types. HCL takes a phased, collaborative approach covering the entire security lifecycle from design to testing. It works with clients and technology partners to deliver customized, business-aligned security solutions that meet compliance requirements while providing strategic, operational and financial benefits.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views

HCL Information Security Practice: Security Transformation System Integration

HCL provides security transformation and system integration services to help organizations address modern security challenges. This includes designing and implementing a holistic security strategy across multiple layers to protect against various attack types. HCL takes a phased, collaborative approach covering the entire security lifecycle from design to testing. It works with clients and technology partners to deliver customized, business-aligned security solutions that meet compliance requirements while providing strategic, operational and financial benefits.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Security Transformation and

System Integration Services

HCL Information Security Practice


Why Security Transformation and
System Integration Services
?
Today organizations are facing multiple challenges like increasing competition, regulatory measures, globalization, making their survival
more difficult. Before evolution of Internet, antivirus used to be the only defense mechanism that used to be considered as most critical
and floppy disks used to be most dangerous. As Internet made the technology available at the finger tips, antivirus is no more sufficient.

Now day’s attackers may not be interested in infecting machine & impacting its performance but may be more interested in stealing the
information which can be million dollar worth. Systems can be compromised in multiple ways:

§An USB stick causing some infection


§Some removable media such as CD/DVD which has some malicious content
§Through the means of file shares
§Gaining remote control by exploiting some weakness/vulnerability in the system
§Sniffing traffic flowing to/from specific server
§Compromising some clients which are considered as trusted sources having full access to the server under consideration
§Social engineering techniques - getting information directly or indirectly through administrative users

Thus now days the security solution has to ensure that it is covering all the areas stated above. No single layer of security is enough to
survive various types of attack. So, you need to add as much layers of security as available and as easily possible & most importantly
aligned to organization’s security risk.

Our Approach
HCL helps the organizations in the transformation process to plan, design and implement a proactive, enterprise-wide security strategy
that aligns with their overall business objectives. HCL Security Consultants has successfully turned customer’s business and technical
requirements into a best product solution for a large number of cases for different security technologies. HCL follows the basic principle of
security while designing the solution architecture, ensuring it to be simple enough to be managed effectively and difficult enough to be
broken. With the perfect blend of knowledge and experience, HCL’s Transformation and System Integration team ensures that the
customer gets the expected functionality in the best possible manner.

HCL has a dedicated team of System Integrators & Project Management professionals who have a combined experience of more than
500+ man years in supervising the entire project throughout its lifecycle. HCL adopts a phased approach covering the entire security life-
cycle, which begins with Design & Engineering and ends with Acceptance Testing & Sign-off, thus creating successful track history of
delivering all kinds of projects within time frames.

Solution Design Project Product Evaluation Sustenance Service


& Integration Management & Testing

ŸDevice Management
ŸSolution design & ŸProject planning ŸBusiness requirement ŸPeriodic maintenance
implementation ŸProject management assessment ŸUpgrade & update
ŸSolution Integration with ŸThird party vendor ŸTechnology evaluation ŸConfiguration
other components coordination ŸVendor evaluation management
ŸTechnical refresh ŸOEM coordination ŸProduct mapping ŸProblem management
ŸMigration service ŸM&A planning and ŸSolution specification ŸChange management
ŸCaptive setup design execution mapping ŸVendor management
ŸDC design and ŸProject governance ŸProduct UAT ŸOn-site facility
implementation and management
management

Security Professional Services Portfolio


Gartner has recognized HCL for its strong partner eco-system. Our partner eco-system consists of leading vendors and OEM’s of
Information Security solutions & products and we have a long history of working with each one of them, understanding their technology
roadmap in pace with the latest industry trends. We also understand our customer’s challenges and design solutions with our eco-system
partners to offer strategic, operational or financial benefit to our customers.

Partner
Ecosystem

Industry
Product Roadmaps Developments
Technology

Technology Trends Customer Experiences

Learning's

HCL Center of Excellence

Proof of Concept Lab Technology Evaluation Product Evaluation

Customer Benefits
Customer
Requirements Strategic Operational Financial

HCL Transformation & SI Services Deliverables


& Value Commitments
The key differentiator in the engagement approach is HCL works with the customer as their partner in their business aligned Information
Security program and not just as the reseller or an external service provider.

Secure architecture &


? Multi-Tier firewall
? Quick and effective address of
?
framework design business needs
Network/host IDS/IPS
?
Partial List of Security Technology

Design and setup solution


? Involvement of industry
?
Content filtering for mail &
?
controls to meet any experts and SMEs
web
System Integration Services

compliance requirement
Timely delivery of project
?
(PCI, ISO 27001, DPA etc.) Data Leakage Prevention
?
commitments every time
Value Commitments

Solution at end point or


Technology evaluation and
?
Network Value delivery ensuring
?
selection
highest effectiveness for the
Encryption of Data at Rest -
?
Solution re-architecture to
? customers
hard disk & storage
address merger, de-merger
encryption Assurance of higher ROSI
?
Technical refresh program for
?
Anti-Phishing/Malware
? Safe guarding business
?
existing setup to replace EOL
requirements and interests of
and out of support Remote Access VPN solution
?
customers
components - Client based/Clientless
Reliable, scalable and
?
Ongoing technology
? Policy Compliance &
?
resilient solution framework
management and Enforcement - NAC
to meet any industry
maintenance
End Point Security Solutions
? requirement
Setting up and migration to
?
Strong Authentication
? Vendor neutral approach
?
an integrated management
framework (SOC) Security & Incident
?
Management & Correlation
Centralized Log Management
?
Case in Discussion
The Case Study discusses the HCL’s capabilities for transforming/migrating the present state of architecture to a world class and agile
Service Oriented Architecture of one of our international client in the Insurance industry having its Presence in more than 100 offices
in 35 countries.

Business Challenges Scope of Operations Results / Benefits

§In-appropriate security §Data centre services §Fully unitized based pricing


management including gaps §End user computing and devices model
in event auditing and §Server-based application hosting & §Delivered SLAs for Infra from
operational security Client applications (on end user Day 1 with no SLO Period
management devices and thin-client) §Delivered Transition & BAU
§No proper root cause §Wide Area Network, remote access (Business as usual) in parallel
analysis to prevent the solutions, connectivity to 3rd §Transition completed in 6
reoccurrence of the issues parties including management of months
§Lack of flexibility and existing Data (WAN) §More than 70% work done from
emergency support from the contracts/services offshore
current vendor §Financial and Service Management §End to End Security Services
§Risk of unauthorized access for 3rd party support contracts Redesign & Deployment of
and sharing of credentials including the M2 printer contract security components within
removes accountability in §Business continuity and disaster timeframe of 3 months
the event of an incident recovery planning & testing
§Little understanding of the §Software licence management and
compliance required to Hardware procurement/disposal
manage the environment in
line with standards and
policies
§Increased complexity of
migration/ transformation
due to the acquisitions made
by the client

For more details on HCL Security Transformation and System Integration Services
and to have our representative on call, please write to [email protected]

You might also like