Customer Company Size
Large Corporate
Region
- America
Country
- United States
Product
- Vectra Cognito
- AWS Security Hub
- AWS Virtual Private Clouds (VPCs)
Tech Stack
- AI-driven threat detection
- Cloud-based data storage
- Traffic mirroring
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Customer Satisfaction
Technology Category
- Infrastructure as a Service (IaaS) - Cloud Computing
Applicable Industries
- Software
Applicable Functions
- Business Operation
Use Cases
- Cybersecurity
Services
- Cloud Planning, Design & Implementation Services
- Cybersecurity Services
About The Customer
The customer is a popular online gaming operator based in North America with operations in more than a dozen locations around the globe. The company runs many of the most beloved sites and collections of brands in its sector. Due to its large audience, cybersecurity is paramount for the gaming community as cybercriminals view these sites as prime attack targets for their new wave of threats. The company is publicly traded and is required to meet a wide range of regulatory and compliance mandates, including PCI-DSS and GDPR. The company's priorities include delivering the best experience for gamers, guarding its operations against attacks, and protecting its brands and intellectual property.
The Challenge
The online gaming company, with operations in more than a dozen locations worldwide, was facing a rapidly changing threat landscape. Gaming companies are lucrative targets for cybercriminals, who range from solo actors to organized crime rings. An outage or data breach can cause material damage to the firm’s income, customer retention and longterm value. As a publicly traded company, it is required to meet a wide range of regulatory and compliance mandates, including PCI-DSS and GDPR. The gaming firm needs to be able to detect threats and attacks, which means having the ability to hunt for malicious activity around the clock without requiring security teams to be on site 24/7. At the same time, security analysts were overwhelmed by the volume of alerts from their security tools, such as SIEMs, firewalls and other defenses. Before selecting Vectra’s AI-driven platform, the company experienced limited visibility into threat behaviors inside its networks, which did not support the company’s priorities to deliver the best experience for gamers, guard its operations against attacks, and protect its brands and intellectual property.
The Solution
The online gaming firm selected the Cognito® threat detection and response platform from Vectra® to detect complex, multistage attacks across cloud, data center, IoT, and enterprise networks. The Cognito platform from Vectra automatically identifies hidden cyberattacks and stops data breaches in hybrid and cloud deployments. With 360-degree visibility, the Cognito delivers a single view of all threat behaviors—across cloud, data center, IoT and enterprise networks, while providing invaluable security insights and context about attacks. The company relies on AWS for flexible, scalable workloads and any disruptions could seriously damage the online gaming firm’s reputation. Cognito automatically detects and responds to hidden cyberattack behaviors across the entire network. Cognito captures all network metadata at scale and enriches it with machine learning-derived security context, and reliably stores it in AWS for proactive threat hunting and conclusive incident investigations. Deep integration between Cognito and AWS allows the company to deploy Vectra sensors in AWS virtual private clouds (VPCs), which use traffic mirroring to extend AI-driven cyberattacker detection and response to AWS workloads. Integration with AWS Security Hub ensures that Cognito definitions are published as findings in Security Hub, where they can be correlated with other data sources for faster threat hunting and incident investigations in the cloud.
Operational Impact
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
WUN Systems Case Study
WUN Systems, a provider of an end-to-end Workspace Management Platform, wanted to offer a highly reliable and scalable VoIP service that would easily integrate into their platform. They were looking for an enterprise-grade, solid platform that would enable their customers to communicate seamlessly, whether they were working from their HQ, regional office or a remote location. WUN Systems was looking for an innovative, reliable and experienced communications vendor.
Case Study
Delivering modern data protection with cloud scale backup from Cobalt Iron and IBM
Organizations are struggling to modernize their legacy data protection environments in the face of growing demands around new infrastructure, new applications, and budget consolidation. Virtualization and modern application development processes have significantly outgrown legacy backup architectures. In response, infrastructure teams have created multiple backup solution types to handle the varying SLAs (performance, scale, cost) required by their business sponsors. However, the sheer number and variety of solutions in this uncontrolled expansion creates huge amounts of work, threatening to overwhelm the IT team in many organizations. Today, developers may add new applications and virtual server instances by the hundreds per day without accounting for the restrictions of the existing backup infrastructure. They leverage the cloud for immediate compute and storage resources, yet rarely communicate succinctly with corporate IT to ensure that the appropriate data protection services are in place.
Case Study
IT-Informatik: Staying ahead of the competition by cutting costs and deploying SAP systems faster
IT-Informatik, a provider of SAP solution hosting and cloud services for medium-sized companies, aimed to boost retention and win new business by creating highly competitive and flexible offerings. However, its complex hosting environment made it difficult to set up client environments cost-effectively. With existing systems at or near capacity, IT-Informatik looked for ways to expand the scope, performance and capabilities of its hosting and cloud services. The company realized that if it could accelerate the deployment of new SAP application environments, it could onboard new customers more rapidly and respond faster to clients’ changing business needs.
Case Study
Achieving near limitless scalability and flexibility with data in the cloud
Web-based publishing platform SpaceCraft found that as its client base grew, it was spending an increasing amount of time managing its databases, distracting its focus from product innovation. As its user base rapidly expanded, data volumes at SpaceCraft began to rise dramatically. Along with their main focus on maintaining and further developing a great platform for web publishing, the SpaceCraft team had the added pressure of managing the increasing quantities of data while ensuring ongoing high performance for clients.
Case Study
Zend accelerates, simplifies PHP development
Zend Technologies, a major contributor to the PHP open source community, needed to keep pace with emerging trends such as mobility, agile development, application lifecycle management and continuous delivery. The company needed to provide the right tools to the worldwide community of PHP developers. The challenge was to support enterprise-class capabilities from end to end, including mobile, compliance and security. The pace of business required developers to show results fast across a variety of devices without compromising quality or security.