ESTABLISH PROTOCOL & STRENGTHEN RESPONSE: MISSION ACCOMPLISHED READ MORE >


Establish Protocol & Strengthen 

Response: Mission Accomplished   


When thinking of the top industries that face cybersecurity threats, where does industrial products rank on your list? For Inversion6, it's right on top. We didn't miss the mark with their production, security monitoring and incident protocol. Our loyal customer and leader in the industrial products space trusted us to take the ropes. Read how we stepped up to the plate. 

 




PERFORMANCE BASELINE

A unified network performance management solution provided broad visibility and analytics across all applications

 

RESPONSE TABLETOP

Presented a scenario and evaluated the process, procedures, and steps involved in responding to and resolving it

SOC MONITORING

Identifies and addresses a security event as quickly as possible when an alert is triggered to prevent it from becoming larger.



HOW IT STARTED

 When scrutiny hit cybersecurity, Inverison6 knew the industrial products space was headed to tank and we were not going to let that happen. This struck up a two-phase program between us and an industrial products lead supplier.  

Our relationship with this leading organization began over five years ago thanks to the existing community of our sister companies; River Capital Finance and TRG. The first collaboration focused on enterprise storage. Back then, the company had IBM servers and storage solutions but was bothered by the continuation of payment for outdated technology. Inversion6 was asked to evaluate new storage options, eventually recommending Hitachi HUS and VSP Hybrid Arrays with replication for disaster recovery purposes. This strategy gave the client a second copy while reducing cost. We also provided the benefit of all flash solutions to be used for critical applications (Pure Flash X&M Arrays). This all-flash SSD-based storage is one of the quickest on the market.

Security was then tied into the company’s storage to protect against ransomware. Some storage was vaulted, and some was kept on-site. A Quantum Tape library was provided in addition to give the company an Air Gap copy of its application data in case of emergency.

A few years later, difficulty arose with the organization's remote bandwidth performance. The implementation of RiverBed SteelCentral — a unified network performance management solution provided broad visibility and analytics across all networks and applications. With SteelCentral, the company was able to identify problems sooner and work faster, not harder. Its NetProfiler solution allowed the company to create a baseline for performance and set notifications for anything outside the norm.

SteelCentral changed everything for this industry leader. It prevents network outages by automated network mapping, discovers new devices automatically, prioritizes events, and fixes any issue that occurs throughout the network.


HOW IT WENT

Phase 1: Building a Consultative Security Practice and Foundation

The company’s cybersecurity program was very siloed from early on. No internal cybersecurity team and no collaboration - this was a recipe for disaster. Organizations need to bring their teams and departments together to build, execute, and monitor a cybersecurity program, and that’s exactly whatInversion6 set out to do for this global brand.

Our first step was more consultative and foundational: we made it our mission to understand what the company had done thus far, evaluate those findings, and recommend any changes to executive leadership.

A number of security products were established during this time to ensure the company had the essentials for a truly resilient cybersecurity space. These included solutions that protected against ransomware, phishing and other email spam, common types of malware, network security solutions, and more.

Additionally, we conducted a thorough assessment to identify the company’s most urgent risks. After addressing these risks, we also conducted an incident response tabletop. There is no better way to tackle something new than to bring teams and leaders together. With a tabletop, we presented them with a scenario and evaluated the process, procedures, and steps involved in responding to and resolving it.



Phase 2: Strengthening Monitoring Capabilities

It was all about focus, support and strength. The company determined that it wasn’t getting the support needed from its existing managed security provider. Inversion6 stepped in with its 24/7/365 security operations center (SOC), monitoring the company’s network and systems, utilizing a hosted Security Incident Event Monitoring (SIEM). This allows Security Analysts to investigate potential security events and incidents.

Our diligence paid off, the company now has an established protocol and response procedure whenever incidents are detected. This ensures the company and Inversion6 SOC analysts are able to take action right away to prevent a security event from becoming larger. Our SOC identifies and addresses as quickly as possible when an alert is triggered. 


HOW IT'S GOING

Inversion6 is grateful to this industrial products supplier for their partnership and trust. We appreciate the opportunity to not only support existing operations for its cybersecurity program but also to expand and strengthen them for the future.

If your organization identifies with any of the challenges presented here, or if you’re considering solutions to enhance your own cybersecurity program, our expert team is here to help. Our chief information security officers (CISOs), supported by a 24/7/365 SOC team, can partner with your organization to manage your cybersecurity initiatives and assist with you communicating their importance throughout your organization.


"Thanks to Inversion6, we now have an established protocol and 

response procedure whenever incidents are detected. Now, we are able to

 act immediately to prevent a security event from becoming a larger incident."