Case Studies
Crosskey Gains Complete Security Visibility with AlienVault USMTM
Overview
Application Infrastructure & Middleware - Data Exchange & Integration Cybersecurity & Privacy - Security Compliance | |
Finance & Insurance | |
Business Operation Quality Assurance | |
Cybersecurity Services System Integration | |
Operational Impact
The very nature of managing financial systems for customers meant that there were a vast amount of logs to go through and keep pushing to a third party provider. By taking the security in-house and installing AlienVault’s USM platform, Crosskey could improve the security and visibility and use a much smaller security team and still deliver superior security in its own systems that are now PCI compliant. | |
The solution provides consolidated log management, consolidated security event and incident management, real-time threat analysis, and real-time event and incident analysis, all with configurable alerting. With AlienVault, Crosskey could correlate all logs, not just IDS logs but Unix, Windows, system, and firewall logs as well giving the security team a more complete security view. | |
Halavakoski expects that in the future, breaches on payment systems will continue to be a problem and coping in “finding badness” from environments will become more and more difficult. Therefore, security products that incorporate threat intelligence, like USM, will gain importance. | |
Quantitative Benefit
Crosskey selected AlienVault Unified Security Management (USM) due to its many features, in particular the threat intelligence and OTX integration gave it the edge over the competition. | |
By taking the security in-house and installing AlienVault’s USM platform, Crosskey was able to improve security and visibility, use a much smaller security team, and still deliver superior security in its own systems that are now PCI compliant. | |
With AlienVault, Crosskey was able to correlate all logs, not just IDS logs but Unix, Windows, system, and firewall logs, as well as give the security team a more complete security view. | |