Large Financial Services Group chooses ARCON PAM for Group Wide implementation
Client Brief
It is one of India's leading and amongst most valuable financial services companies in the private sector. Client has interests in asset manage- ment, mutual funds, portfolio management services, pension funds, life and general insurance, private equity and proprietary investments, stock broking and depository services, investment banking, wealth management, home and commercial finance, financial products distribution, venture capital, exchanges, asset reconstruction and other activities in financial services.
Business Need
Our client operates in multiple geographies with more than nearly 6600+Bank ATMs and 2500+ branches. Bank has dedicated IT team to manage data center and IT for managing the bank’s core banking solution, infrastructure design, project management and services management. Technology has been key agenda for the bank over the years with impressive IT security. Banking Security team prides itself in being a market leader and as such not only adheres to industry regulations, but imposes strict security policies and procedures on itself to ensure sound security across all of its operations.
- Management of multiple shared IT Infrastructure
- Third Party Access Control
- Streamlining & Securing access for users
- Aligning shared IT teams with restrictive access
With a growing business and increasing responsibility of management of technology infrastructure, the group needed a solution to manage administrative access, infrastructure,equipment.
This group needed to overcome the manual, burdensome processes required to manage nearly 3000+ privileged
access across 7 different location to more than 1000+ target platforms across 7 lines of business.
The Challenges
The firm’s shared security & risk management team was under tremendous pressure from a resource and regulatory perspective to manage administrative, shared and third party access. An early adopter of
security related technologies, primary goals for investing in a privileged identity management solution were :
- To drive down costs for lines of business through better use of automation and reduced resources count
- Increase security for access to shared IT equipments
- Demonstrate compliance for managing shared access
Solutions
Approach
