Customer Success
Enterprise encryption strategy helps focus this Bank’s data security priorities

Already seen as a technology leader, this banking customer had ambitious plans to implement a consistent enterprise-wide data protection strategy. The challenges were great, however: updating legacy technologies and systems, responding to emerging regulatory requirements, and creating a rock-solid security framework were all necessary. Together with Sidechain, our client was able to tackle this multi-year effort.

Highlights

0
Total systems encrypted
0%
Reduction in support resolution with Sidechain Support Contract

Case Study

Many organizations find themselves in the same situation as our banking client did.

  • Security technologies implemented over time resulted in redundancy and unnecessary cost supporting too many vendors.
  • The lack of centralized management and reporting made compliance auditing an enormous resource drain. Performing a uniform data risk assessment was impossible.
  • Staff was taxed on learning any capability well and was spread too thin due to the volume of solutions implemented.

Additionally, pressure from business units to migrate workloads to the cloud created the need to evaluate even more data security solutions that were cloud friendly.

Needing a blank-sheet approach to these problems, the bank partnered with Sidechain to address these core issues. Our experience working with enterprises to evaluate their as-is state, provide data security assessments, and strong service delivery capabilities, enabled us to support our client end-to-end with their efforts.

Our Recommendations

We worked with our client in three key areas:

Assess data security technologies implemented across the enterprise. Our client was simply paying too much for data security. We illustrated that significant cost savings could be found by reducing the overall vendor footprint, and maximizing the use of fewer solutions.

Streamline the audit process. We helped create a set of runbooks that are used repeatedly to gather the right information at the right time across all solutions. We also helped create the specification for a data security dashboard that aggregates critical status and operational readiness for data protection technologies.

Provide training and enablement to staff. For several key technologies that would be relied on more, we created a bespoke training program for staff that enabled them to not only better support the products, but spread the work around. This creates less burden on the security staff, while providing better service capability to business units requiring data security.

Additionally, we have continued supporting this customer through an extended support contract that gives them instant access to our consultants, enabling us to achieve a nearly 30% decrease in mean time to resolve support tickets.

Results

  • 23% reduction in annual spend on data security products and solutions across 1000+ server.
  • 30% decrease in support ticket resolution time.
  • Shorter data-gathering effort for audit information. Centralized data risk shapshots and reporting, as well as operational dashboard of data security products deployed in the enterprise. Overall, a stronger security posture with comprehensive aggregate reporting.
Excellence and security for this institution of learning

This educational institution manages records for nearly 40,000 personnel and students. State privacy regulations prompted the creation of a data security effort to build upon existing security protections, including the hiring of a small team of security engineers responsible for managing products and systems.

Case Study

The problem

Our client needed a full data security assessment to understand where they were at and what needed to be done to comply with state regulations and security best practices. Cross-training was also a priority so that newly hired staff could manage existing products and technologies.

Our Approach

First, we performed an assessment of data security approaches and technologies to ensure we could find the most efficiency. We could also develop comprehensive enablement from this assessment.

We found that the technology was good but had been neglected due to staffing shortages over the years. A plan was developed to upgrade systems and products, stabilize the current deployments, and create a roadmap for further data security efforts. This plan also mapped to strategic initiatives to meet state regulations, and increase the security posture of the infrastructure.

We also developed a training program that not only transferred technical skills to new staff, but educated them on the WHY – an analysis of the state regulations, broader security impluciations, and data privacy issues that may need to be accommodated for in the future.

We work very closely with this customer as a resource for them when they have questions and issues with their data protection technologies. They have immediate access to our consultants, who are able to resolve issues quickly, many times in real time.

The results

  • Stable, managed data security effort to protect the privacy of each student and staff working for the institution.
  • Fully trained security staff to support data security products.
  • Close support relationship so that issues are identified, rapidly diagnosed, and fixed by our consultants.

Results

  • 23% reduction in annual spend on data security products and solutions across 1000+ server.
  • 30% decrease in support ticket resolution time.
  • Shorter data-gathering effort for audit information. Centralized data risk shapshots and reporting, as well as operational dashboard of data security products deployed in the enterprise. Overall, a stronger security posture with comprehensive aggregate reporting.

LET’S GET TO WORK

CONTACT