Leading Hedge Fund in the US

As part of their overall IT Stabilization plan, the client required a network security intrusion detection and prevention system (IDPS) to monitor and alert IT operations on malicious network activities coverage for the policy domain.

The primary goal was to evaluate an enterprise-wide intrusion detection and/or prevention solution that can provide 24x7 visibility of the current threat landscape and to design the right solution and processes to support enterprise-wide adoption and implementation. A well planned and structured approach was leveraged to map business drivers and requirements with technical capabilities to drive the selection of the right vendor product. A formal RFP was issued and supported by vendor orals to align stakeholder understanding of vendor capabilities against gathered requirements.

Impact

  • A thorough selection and evaluation criteria that enabled the client to compare different IDPS solutions in terms of features, performance, reliability, scalability, and support
  • Ability to negotiate better contract terms around pricing, licensing, and support
  • Actionable IDPS Implementation Roadmap

Fortify with Modern Security

Talk to Experts

Case Studies

Cybersecurity Program & Remediation Strategy

The goal here was to help the client identify and mitigate potential cybersecurity risks in order to protect its information systems and assets

icon

Control Assessment & AFIS and IRIS-based forensic product review

The engagement involved evaluating the client's security controls and policies, as well as assessing the effectiveness of digital forensic products based on Automated Fingerprint Identification System (AFIS) and Iris Recognition Integrated System (IRIS) technologies.

icon

Forensic analysis of GDPR breach & Annual audit of control readiness

The engagement involved investigating and analyzing a security incident to determine the cause and extent of a potential data breach while the annual audit of control readiness involved reviewing the client's security controls and policies to assess their effectiveness in addressing potential security risks and compliance with relevant regulations.

icon

Cyber Risk Map

The goal here was to develop a visual representation of the client's cyber risk exposure.

icon

Cybersecurity Policies & Procedures Review

The goal here was to help the client identify gaps and areas for improvement across their existing cybersecurity policies and procedures.

icon

Compliance Assessments

The goal here was to help the client comply with applicable cybersecurity and privacy regulations while ensuring secure handling of credit card information that aligns with PCI-DSS requirements.

icon