Case Study Case Study
Perspectives

Case Studies

Customer Stories

Testimonials

ALM Media, LLC

Josh Gazes, Senior Vice President – Operations

British Gas

Jess Johnson, Head of Operational Excellence

Mosaic Insurance

Mitch Blaser, Co-CEO

Mosaic Insurance

Krishnan Ethirajan, COO

Oxford Nanopore Technologies

Jason Hendrey, Senior Director, Global Customer Services

WS Audiology (WSA)

Christof Steube, Director of Finance Excellence

Kiwi.com

Leonard McCullie, Director, Vendor Management

Kiwi.com

Petra Reiter, Vice President, Customer Services

Flight Centre

Aaron Fadelli, Business Leader

Healius Pathology

Alex Cook, Head of Finance Operations

Varo Bank

Breanna Rivers, Partner Performance Manager

Yorkshire Building Society Group (YBS)

Jessica Lockwood, Process Automation Manager

WS Audiology (WSA)

Sharang Patil, Director of Group Finance Excellence

Priya Madan Mohan, VP for Group Accounting & Controlling

United Airlines

Chris Kenny, VP and Controller

GFG Alliance

Phillip Irish, General Manager, Shared Services Delivery, Quality & Governance

Energy Australia

Steve Corden, Outsource Operations Leader

Delaware North

Christopher Lozipone, Senior Vice President and Global Business Services Head

Moneycorp

Nick Haslehurst, Chief Financial & Operating Officer

Prodigy Finance

Nico Barnard, Head of Operations

M&T Bank

Chris Tolomeo, Senior VP & Head of Banking Services

Minerals Technologies Inc. (MTI)

Khem Balkaran, CIO

Church's Chicken

Louis J. Profumo, CFO & EVP

This is our story of co-creating a trusted remote security management and monitoring solution with a leading manufacturing company

 

As we know…

In the wake of businesses becoming increasingly digital, there is a rise in data security challenges on multiple fronts. These challenges include significant disruptions and losses resulting from malware outbreaks, loss of data, Denial of Service (DoS) attacks that cripple operations, and even threats from internal employees.

As a result, cybersecurity has become one of the major issues that any digitally connected enterprise, both large and small, must address. It’s an organization-wide imperative to have a robust strategy to proactively monitor and manage risks.

The challenge for a manufacturer was…

It lacked a baseline IT security framework with well-defined processes and policies for operations across 150+ global locations. As the company had grown inorganically, its IT infrastructure was fragmented. A lean IT team and a virtually non-existent security workforce were unable to effectively monitor and manage the security of all systems and data.

Dissimilar standalone anti-malware solutions, lack of visibility on infrastructure assets and network connections, inadequate computer security and hardening measures, and limited security patch management for servers and end-points further added to the problem. There was limited visibility on the security aspects for controls and automation technologies deployed across various operations supporting the factory environment. In addition, the manufacturer did not have adequate security threat monitoring or response capabilities.

Here’s what we co-created as a solution…

WNS partnered with the manufacturer to develop a security strategy, and provide consulting and guidance to enhance its cybersecurity posture in a phased and realistic manner.

This multi-pronged solution included:

  • Designing Server Patch Management process to enable remote patching for the entire global server infrastructure in a 11-week rolling cycle

  • Designing and implementing System Center Configuration Manager (SCCM) for software asset management, end-point remediation and patching for end-user computing devices across the globe

  • Consolidating multiple anti-virus platforms and migrating end-points to a centralized anti-malware solution

  • Implementing best-in-class, cloud-hosted Security Information and Event Management (SIEM) to enable active threat intelligence coupled with the delivery of 24x7 security operations

  • Establishing robust vulnerability assessment solution for servers, end-points and applications

The outcomes from the process of co-creation are…

  • Establishment of a trusted remote security management and monitoring arm for the client

  • Global view of client infrastructure with complete visibility across all end-points, servers and devices on the network

  • Catalog of all software installed within the infrastructure, and elimination of all unlicensed and undesired software installations

  • Well-defined policies and procedures for security management and monitoring

  • Real-time reporting of incidents, monthly trend analysis and user behavior analytics

  • Re-assurance to the board and auditors on significant uplift of the cybersecurity posture within the organization

  • Creation of a culture of ‘being secure’ as a key priority within the organization

The Road Ahead...

WNS continues to collaborate with the manufacturer to build a secure organization for the future.

Some of the initiatives on the horizon include:

  • Operational Technology (OT) security platform to protect and monitor industrial control systems and associated networks for the manufacturing lines

  • Cloud-based End-point Detection and Response (EDR) platform for improved anti-malware detection and intelligence

  • Implementation of User and Entity Behavior Analytics (UEBA) embedded with artificial intelligence and machine learning

Join the conversation