Perhaps best known for its role in consumer credit ratings, Experian operates as a technology company, helping its clients manage and analyze massive amounts of financial data. The company is focused on integrating and standardizing technology across the organization, creating building blocks that would streamline global application development, and in turn help them better service their global customers.
It is important for the company to get a single view of their organizational risks. It was also clear that they needed a security partner to help move at the speed they needed to maintain innovation. Read the case study to learn how Prisma Cloud, the Cloud Native Security Platform, provides Experian with a unified view of security and compliance posture across the full cloud native stack, making life a lot easier for everyone involved.
Palo Alto Networks Cortex XDR™ enables you to satisfy multiple PCI DSS requirements and bolster your security posture with one integrated solution for prevention, detection, and response across your enterprise. Cortex XDR is the industry’s first extended detection and response platform that prevents advanced malware, exploits, and fileless attacks while also integrating endpoint, network, and cloud data to stop sophisticated attacks.
Experian operates as a technology company, helping its clients manage and analyze massive amounts of data. Looking to consolidate disparate security tools across CSPs and manage risk at-speed to support a global DevSecOps pipeline, Prisma Cloud provides Experian with a unified view of security and compliance posture across their cloud environments and full cloud native stack, making life a lot easier for everyone involved.
Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk.
Successful cyberattacks against a number of financial institutions across the globe from 2015-2018 have resulted in multiple instances of fraudulent fund transfers over the Society for Worldwide Interbank Financial Telecommunications, or SWIFT, network. As part of an effort to enhance the cybersecurity of the entire eco-system, members of SWIFT must annually self-attest to sixteen mandatory cybersecurity controls as of year-end 2017. In future years, non-compliance with these controls may result in notification to SWIFT counterparties and/or appropriate regulatory bodies. Furthermore, eleven advisory security controls are provided as best practices to further improve overall cyber hygiene across the SWIFT eco-system.
No single vendor can provide complete compliance with the entire set of SWIFT mandatory and advisory controls. However, the Palo Alto Networks Security Operating Platform delivers the following:
Support for nearly 75 percent of the SWIFT Customer Security Controls Framework, where various elements of the Security Operating Platform are able to address 12 of 16 mandatory controls and eight of 11 advisory controls.
Definitive least-privileged access control and other essential security capabilities to effectively segment and protect the local SWIFT environment.
Capabilities above and beyond the baseline specifications to more thoroughly protect your local SWIFT infrastructure and the rest of your organization’s computing environment from the latest unknown malware and advanced threats.
By leveraging the Palo Alto Networks Security Operating Platform, financial institutions will be well on their way to complying with or exceeding the SWIFT mandatory and advisory controls. Beyond merely an exercise in compliance, the prevention philosophy behind the platform will improve a financial institutions overall cyber hygiene and provide better security outcomes for the organization. The result will be a more secure environment for your financial institution – one in which legitimate traffic is known and limited, with automated security enforcement to detect and address deviations. Future annual self-attestations to SWIFT will be much less stressful as your institution’s cybersecurity posture will be above and beyond their required baseline level.
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
Businesses embrace digital technologies that modernize their operations and enable innovation. Yet these same technologies introduce new security vulnerabilities and new data that must be secured. The result is a costly cybersecurity arms race, in which businesses introduce new security products to counter new attack vectors. Individually-managed or standalone security products add complexity, reduce visibility, and strain under-resourced security teams.