Sorting

Deployments found: 1

Infosys logo
Hidden supplier logo
The magnitude and complexity of the Infosys attack surface is significant; encompassing hundreds of thousands of endpoints spanning the entire globe, a highly mobile workforce and huge datacenters. Tasked with protecting the entire infrastructure, Vishal Salvi, senior vice president and chief information security officer, and his team have created a highly detailed framework that is used to model their environment: It utilizes a one-to-five scoring system to reflect the risk and readiness of each element across a selection of individual securityrelated functions. Salvi elaborated,
“The framework provides us with a very comprehensive maturity model to enable us to define risks and specific control requirements for cyber security across the company.”
Salvi recalled,
“We considered point products for advanced threat protection from individual suppliers as well as multi-capability offerings and conducted a proofof-concept with a shortlist of contenders. After exhaustive evaluations the integrated suite of best-in-class solutions from FireEye was our ultimate winner.”
... Learn more

The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.