November 07, 2017 / by jburks / In case-studies /

Securing BFS

Overview

Information security for banks, two decades ago, was all about access control policies, integration of firewalls, and a robust anti-virus platform.

Today, the close collaboration between BFS, IT, and cyber security companies is unlike that seen in any other industry. The collaboration became possible with the advent of new data processing and networking technologies, the challenges incurred during analysis, the urge for visualization and network security, and the the need to satisfy an extensive list of compliance requirements. Besides, BFS organizations began to work in tandem with government requirements across regions, leading to the adoption of additional measures to secure customer data.

Challenges faced
  • Lack of tools for monitoring privileged users with access to sensitive data
  • Threat detection and management
  • User behavior monitoring
  • Malware based attacks
  • Compliance monitoring with cyber security focus
How we help

DNIF helps enterprises fulfill compliance requirements across and delivers automated reports and real-time alerts that map directly to specific mandates. It enables banks and other financial institutions to meet some of the most stringent requirements w.r.t business and cyber security use cases.

  • Compliance Monitoring

    Besides being one of the heavily regulated sectors in most countries, BFS also has the added responsibility of managing and securing its consumer data - a process that requires seamless flow of information and extensive monitoring and reporting, whether for audit purposes or any other process requirements. The ability to monitor each and every compliance requirement from a single dashboard view, makes things easier for all the executives and consequently improves efficiency.

    Monitoring cyber security compliances, for example, as per the new RBI’s framework can be achieved by covering all sections, some of which are:

    1. Detection of internal and external threats based on network and database logs

    2. Enforcement of effective access management and network and data use policies

  • Real Time Network Monitoring and Log Management

    Organizations can effectively monitor their network infrastructures to proactively resolve problems, ensure consistent delivery of services, and accelerate the introduction of new devices via easy integration of devices and creation of context based widgets, reports, and dashboards within the platform.

    Continuous monitoring, along with effective rules, helps track anomaly detection by alerting required stakeholders on device/network usage patterns.

  • Detect Network Abuse

    Detecting malicious activity that occurs by correlating information across different devices such as firewall, Intrusion Detection Systems (IDS) , Intrusion Prevention Systems (IPS), WAF, CDN, etc.

    Detecting file downloads or network activity from fraudulent or known to be suspicious IP addresses, based on shared intel database This helps network administrators understand the usage patterns of their network and the possible signs of infiltration by further monitoring the network activity.

  • Gather insight from Tons of Data

    DNIF can help organizations reconcile all contextual data from a variety of infrastructure devices to quickly and accurately capture more insights w.r.t business and cyber security use cases