News Security

IBM Security to Shield CIBIL from Cyber-Attacks

New arrangement includes real-time monitoring of threats, identification of frauds and enhanced protection of sensitive data

Credit Information Bureau India Limited (CIBIL) has selected IBM Security to strengthen security and protect their critical business systems from cyber-attacks. Under the agreement, IBM Security Services has developed a customized security operations framework to monitor real-time threats and help CIBIL proactively identify fraud.

CIBIL is India’s pioneer Credit Information Company that collects credit information pertaining to borrowers from banks and credit institutions which are its members. CIBIL collates this information into credit reports and credit information solutions and provides them to banks and credit institutions to help evaluate risk while lending to a consumer. An individual’s CIBIL Report and CIBIL TransUnion Score, other than his/her income, is one of the most important tools used by a lender to evaluate application for any loan or credit card.

IBM Security Services provides a round-the-clock proactive security log monitoring and real time validation of suspicious threats using IBM X Force Intelligence. IBM also built an integrated Security Operations Center (SOC) for incident reporting and management, which detects and monitors security events and phishing attacks in real time. The CIBIL website is also monitored in real-time with daily scanning for malware infections, the release said.

Satish Pillai, MD & CEO, CIBIL said, “IBM has helped us to reduce incident identification time from hours to minutes and streamlined operations further by reducing risks and associated costs. Our overall security architecture has improved with an enterprise-wide security intelligence platform that correlates events from IT and business critical systems and applications.”

Sandeep S Roy, Business Unit Executive, IBM Security Services, India/ South Asia commented, “The threat landscape has changed today with new attack vectors and complex attack motives. Attackers are more sophisticated and organized than ever before, and breaches are reported on an almost daily basis making existing models of security protection inadequate to meet these security challenges. While security technologies have been widely implemented, what is missing is the centralized & integrated operation & management for operational excellence and a result driven approach to security management. For an organization such as CIBIL the implementation of an integrated SOC ensures operational excellence and a result driven approach to security management.”

Related posts

Zoho Corp’s Qntrl Launches New Capabilities

enterpriseitworld

Vertiv Predicts Industry Efforts to Support, Enable, Leverage and Regulate AI

enterpriseitworld

LogRhythm | Exabeam Opens Regional Office in Riyadh

enterpriseitworld
x