Leading ERP Provider TOTVS Secures Workloads and Infrastructure Across Cloud Environment with CyberArk
公司规模
Large Corporate
地区
- America
国家
- Brazil
产品
- CyberArk Privileged Access Manager Solution
- CyberArk Privileged Session Manager
- CyberArk Enterprise Password Vault
技术栈
- REST APIs
- AWS
- Azure
实施规模
- Enterprise-wide Deployment
影响指标
- Cost Savings
- Productivity Improvements
- Customer Satisfaction
- Digital Expertise
技术
- 网络安全和隐私 - 身份认证管理
- 网络安全和隐私 - 网络安全
- 网络安全和隐私 - 安全合规
适用行业
- Software
- Professional Service
适用功能
- 商业运营
- 质量保证
服务
- 系统集成
- 云规划/设计/实施服务
- 网络安全服务
关于客户
Brazil-based TOTVS is the #1 enterprise resource planning (ERP) provider in Brazil, and one of the largest in the world, delivering intelligent and integrated technology solutions that give customers a competitive edge. Organizations in more than 41 countries trust TOTVS to integrate and manage core business processes — from finance and HR to manufacturing and supply chain management — to drive visibility and efficiency across the business. The company has a cloud platform underpinned by public cloud providers such as AWS and its own cloud that allows TOTVS customers to run their TOTVS ERP solutions in the cloud, while delivering enhanced performance, pay-as-you-go flexibility and scalability. But running IT workloads in the cloud is not without risk. As the platform’s usage skyrocketed, TOTVS sought to increase the security of its cloud assets and services, while enforcing consistent privileged access policies across the environment.
挑战
As cloud vendors including AWS and Azure make clear, security in the cloud is a shared responsibility. Though these public cloud vendors take great efforts to secure the cloud infrastructure — compute, storage, etc. — their customers are fully responsible for protecting everything above the hypervisor, including the operating system, applications, data, access to external resources and other assets and infrastructure. Fully appreciating this shared responsibility model, the TOTVS Cloud security team set out to identify a security solution that could not only bolster their cyber resilience but also add value to the TOTVS Cloud by driving automation, standardization and increased efficiency. TOTVS Information Security Cloud Team conducted an in-depth technical analysis of potential solutions, ultimately selecting and deploying the market-leading CyberArk Privileged Access Manager Solution based on overall performance, resilience, health checks, high availability/disaster recovery requirements and cost.
解决方案
The TOTVS cloud infrastructure enables new virtual servers, data stores, containers and other resources to be provisioned as needed. When each new ERP resource is initiated and launched, it is assigned corresponding, privileged credentials to facilitate programmatic requests. But these privileged credentials are unsecured, creating countless new vulnerabilities across the environment. With the CyberArk solution in place, the TOTVS team began automating the once-laborious process of provisioning new instances, securing their associated credentials and secrets in CyberArk’s centralized, encrypted Enterprise Password Vault and managing them using the principles of least privilege. Leveraging REST APIs, these privileged credentials can now be retrieved on-demand by authorized users and applications without requiring human interaction. And when the infrastructure is deprovisioned, the CyberArk solution removes its privileges automatically. To further reduce the size of the attack surface and secure assets across the cloud environment, CyberArk Privileged Session Manager acts as a gateway (or jump server) to limit RDP and SSH access, segregate and harden the network, monitor sessions and produce tamper-resistant audit logs. This enables TOTVS Cloud analysts to access customer servers without ever having direct access to passwords for customer environments. The CyberArk solution has also enabled TOTVS to eliminate hard-coded and visible applications and scripts that utilize the cloud platform’s API while providing a highly secure method for integrations between applications.
运营影响
数量效益
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.
Case Study
Factor-y S.r.l. – Establishes a cost-effective, security-rich development environment with SoftLayer technology
Factor-y S.r.l., a web portal developer, was faced with the challenge of migrating its development infrastructure to a reliable cloud services provider with highly responsive technical support. The company needed a solution that would not only provide a secure and reliable environment but also support its expansion by providing resources to create and deliver innovative offerings.
Case Study
UBM plc: Taking the pulse of the business and engaging employees with a far-reaching strategic transformation
UBM, a leading global events business, was undergoing a significant strategic transformation named 'Events First'. As part of this transformation, the company was preparing to complete the largest acquisition in its history - Advanstar, a US-based events and marketing services business valued at more than USD970m. The company faced the risk of human capital flight if it was unable to effectively engage top talent with the new strategic direction. UBM needed to make significant structural, process and systems changes, uniting its previously autonomous regional businesses. The challenge was to ensure all of its employees were engaged and aligned with the new future vision.
Case Study
Darwin Ecosystem: Accelerating discovery and insight through cutting-edge big data and cognitive technologies
Darwin Ecosystem was founded with a unique vision of harnessing chaos theory mathematics to uncover previously hidden connections in unstructured data. The company’s algorithms can look at all the data generated by any source (such as news, RSS feeds and Twitter), and analyze how a specific set of concepts within that data are evolving over time. This is particularly valuable in situations such as business and competitive intelligence, social research, brand monitoring, legal discovery, risk mitigation and even law enforcement. A common problem in these areas is that a regular web search will only turn up the all-time most popular answers to a given question – but what the expert researcher is actually interested in is the moment-tomoment evolution of the data available on that topic. Darwin’s algorithm is computationally intensive, and the sources of data it correlates can be vast. To bring its benefits to a larger commercial audience, Darwin needed to find a way to make it scale.
Case Study
Wittmann EDV-Systeme launches IT monitoring services
Small and medium-sized businesses often lack the know-how and resources required for thorough IT system monitoring. Wittmann EDV-Systeme wanted to launch a solution to plug the gap – enabling it to improve its own competitiveness and that of its customers. IT landscapes are becoming ever more complex and outsourcing is gaining popularity, IT systems must nonetheless remain easy-to-use and extremely reliable at all times. Automated, round-the-clock system monitoring therefore represents an immensely valuable proposition for companies: downtime for business-critical applications can be avoided, and IT systems remain available at all times.
Case Study
Zend accelerates, simplifies PHP development
Zend Technologies, a major contributor to the PHP open source community, needed to keep pace with emerging trends such as mobility, agile development, application lifecycle management and continuous delivery. The company needed to provide the right tools to the worldwide community of PHP developers. The challenge was to support enterprise-class capabilities from end to end, including mobile, compliance and security. The pace of business required developers to show results fast across a variety of devices without compromising quality or security.
Case Study
Delivering modern data protection with cloud scale backup from Cobalt Iron and IBM
Organizations are struggling to modernize their legacy data protection environments in the face of growing demands around new infrastructure, new applications, and budget consolidation. Virtualization and modern application development processes have significantly outgrown legacy backup architectures. In response, infrastructure teams have created multiple backup solution types to handle the varying SLAs (performance, scale, cost) required by their business sponsors. However, the sheer number and variety of solutions in this uncontrolled expansion creates huge amounts of work, threatening to overwhelm the IT team in many organizations. Today, developers may add new applications and virtual server instances by the hundreds per day without accounting for the restrictions of the existing backup infrastructure. They leverage the cloud for immediate compute and storage resources, yet rarely communicate succinctly with corporate IT to ensure that the appropriate data protection services are in place.