Client: Large North American financial institution (NAFI)
-An important diversified financial services company in North America. The office is located in more than 30 countries and serves 12 million public, commercial and public sectors worldwide.
Business: Nafi has a strong position in several financial services sectors, including personal and commercial banking, investment management, private banking, business, community and investment banking, and insurance.
Income: US$60 billion
Business driving force:
• Reduce the cost of removing worms and viruses;
• Locating the source of infection;
• Protect notebooks on the road;
• Support the increased security of wireless LANs.
Business requirements:
• Support for Windows NT, XP, Ethernet and Token Ring networks;
• Agent and host firewall integrated together;
• Automatic premises induction;
• Adaptive strategy to support up to 14 different business scenarios;
• Integrity checks with VPN integration;
• Multilevel rules, policies, users, and administrators.
Let's go:
• A wide range of vendor selection processes;
• 6-month pilot program;
• All notebooks within the company range;
• Desktop and ATM cash machines for deployment;
• Tunnelguard VPN consolidation with Nortel to secure remote access.
Enterprise Improvement:
• Improved emergency response and forensic analysis;
• Blocked reconnaissance software access to the network, reducing the burden of corporate firewalls;
• Secure remote access using the Sygate and Nortel Tunnelguard.
Fight Worms
After having experienced SQL Slammer and other high-risk worms/viruses, a North American financial services company, referred to as NAFI, decided it was time to take a proactive approach to dealing with malicious code, which became more complex and less frequent. At the beginning of 2003, senior information security managers recommended to the company the endpoint protection scheme, including host firewall, host intrusion protection and secured VPN access. The Information security Project manager said, "We need tighter control over laptop safety, and we know they are the primary carriers that inject a lot of malicious code into the enterprise environment."