Infosys offers full potential of cloud ecosystem with Infosys Cobalt to increase business value and speed to market.

The client is an energy-based company. They had a legacy network of multiple on prem deployments which had become unmanageable. The user activities were not traceable, and network was exposed to high risk due to open internet access on remote sites.

Infosys proposed and implemented SASE based solutions (Zscaler ZIA, ZPA, ZPA PSE) across client’s global network and achieved ZTNA for them.

Key Challenges

  • Proxy solutions spread across multiple locations causing mismanagement of security controls and policies
  • Access to applications controlled by a single policy increasing their attack surface and risk
  • Limited security monitoring capabilities leading to security risks
  • Need for securing the hybrid cloud with enterprise grade security controls
Line

The Solution

2000+ applications onboarded with Zscaler SASE solution

  • Proposed SASE from Zscaler and successfully onboarded 150+ remote sites and 2000+ application servers on the framework
  • Implemented ZTNA for all remote access users and applications using Zscaler solution components
  • Implemented clientless VPN access for vendors to access client’s corporate applications in a secured way
Line

Benefits

Unique and enhanced user experience

Secured the perimeter-less network of 30,000+ users with proxy VPN and Zero Trust Network Access capabilities delivered as-a-service

Secured the perimeter-less network of 30,000+ users with proxy VPN and Zero Trust Network Access capabilities delivered as-a-service

Defended the client’s environment by strengthening security controls with intelligence of 500+ threat indicators

Defended the client’s environment by strengthening security controls with intelligence of 500+ threat indicators

Next generation security with proactive detection and containment of major threats such as system compromise and brute force attacks

Next generation security with proactive detection and containment of major threats such as system compromise and brute force attacks