Solutions for Access Control Challenges
Solutions for Access Control Challenges

“Vidder’s PrecisionAccess is helping us to enhance security and user experience while reducing costs by moving away from tradtitional hardware investment.”

Mo Ahhdoud, CISO, SGN

Establishing Trust in Complex Networks

Problem

A Fortune 500 leader is continually being attacked from the inside because of spearfishing and integration due to M&A activities. They looked for a practical solution to secure the internal network, as it was no longer adequately protected by traditional perimeter security products.  They evaluated numerous solutions, but hardware-centric access control solutions would require a substantial infrastructure upgrade. Security teams would also be burdened with either managing millions of access rules or living without them.

Solution

They chose PrecisionAccess to enhance security while reducing cost and complexity. The security team easily established granular access policies and initially shrank the attack surface associated with their most critical applications.  Over time they expanded protection to more applications, gaining ubiquitous protection transparent to user and business unit operations, at a fraction of the cost of alternatives.

Establishing Trust in Complex Networks

Establishing Trust with Limited Resources

Problem

A large public utility had a difficult time recruiting highly-skilled security pros. The small team had to protect critical infrastructure from advanced threats and yet allow thousands of employees proper access to critical applications. Traditional segmentation solutions required a $4 million infrastructure upgrade and additional skills training for the team.

Solution

They decided to use PrecisionAccess as a managed service to shrink the attack surface.  The security pros enhanced protection by segmenting apps into zones based on trust and necessary access and reduced costs by more than 75% using the same solution. They then could easily migrate apps to IaaS without any operating impacts or compromises.

Establishing Trust with Limited Resources

Establishing Trust in Shared Systems

Problem

A health care services company was challenged with securing access to centralized health record and workflow management applications.  Authorized users included thousands of remote nurses and home service workers. These non-technical users needed easy and quick access as they moved from home to home to read and add information to centralized health records.  Traditional multifactor authentication and VPN solutions were too cumbersome and costly.

Solution

The security team chose PrecisionAccess because it allowed them to easily protect their apps with dynamic, transparent multifactor authentication.  A common solution could be used for both remote and local users without needing to add temporary contractors to the internal network and VPN.   Integration with SAML/SSO meant that users could be given easy access to what they needed to perform their work, twenty-four hours a day, without exposing other apps to potential risk.

Establishing Trust in Shared Systems

Learn How to Reduce Security Complexity and Cost.
Request Briefing