SlideShare a Scribd company logo
1 of 4
Download to read offline
CUSTOMER CASE STUDY


Insurance Industry
Overview                                        “The key features in EpiForce
Insurance company succeeds
at protecting PII and complying                  allowed us to implement network
with banking partner security
requirements, without changing
                                                 security across all the platforms we
the network infrastructure                       have, and it was up and running in
                                                 hours, not weeks.”
or modifying the insurance
software application

Industry: Insurance                                                                   Information Security Officer

Customer Profile:
A mortgage insurance leader,                   BACKGROUND
this company has been in                       This extremely successful insurance company generated over $3B in net
business for more than 30 years,               revenue last year by providing to banks a variety of options for mortgage
and provides services to the top               insurance, as well as other contract underwriting and real estate related
banking partners in the United
                                               services.
States. For security reasons,
anonymity was requested for
this case study.                               This insurance company leverages technology to streamline their business
                                               interaction with partner banks and increases productivity by providing them
                                               access to an insurance processing application. An employee from the bank
                                               will remotely log onto the insurance processing server and enter a customers
                                               personal identity information (PII). In real time the insurance software
                                               application processes the customer data and sends an evaluation report back
                                               to the bank regarding the customer’s qualifications and suggested insurance
                                               policies.

                                               The loan processing application is hosted, at the insurance company, on servers
                                               in the DMZ. The servers are also connected through a firewall to corporate
                                               servers on the internal network.

                                               CHALLENGE
                                               The insurance company had it’s own security requirements and compliance
                                               regulations. The banking partners had similiar compliance regulations but they
                                               had their own set of security requirements.




                                   © 2010 Apani, All rights reserved. All marks are the property of their respective owners.
CUSTOMER CASE STUDY


Insurance Industry
                                 The primary objective was to find a way to satisfy all of the security
                                 requirements and compliance regulations while protecting PII.

                                 INVESTIGATION
                                 The software application described above was custom developed for the
                                 insurance company. It runs on multiple platforms and basically requires
                                 little interaction from the IT department. In addition to meeting the security
                                 requirement, the other solution requirements were:

                                   • No or minimal changes to the software application
                                   • No changes to the hardware/OS platforms
“EpiForce hides                    • No significant ongoing management costs

 the complexity                  The servers and clients in this architecture were all running some form of
 of the network                  Microsoft operating system. The insurance company first attempted to use

 segmentation                    the IPsec and PKI (Public Key Infrastructure) functionality native to Windows
                                 2000. This idea seemed perfect because it didn’t require upgrades.
 and encryption
 from the users.”                However, it was soon discovered that one of the key components of the
                                 application was running on a Windows NT 4.0 server, which does not support
– Information Security Officer   IPsec. The insurance company decided to address this issue separately and to
                                 go ahead with a trial using IPsec.

                                 IPsec needs a system which can issue X.509 certificates. Security policies can
                                 then be applied, based on those certificates. During the testing, it quickly
                                 became apparent that this proposal was going to be much more complicated
                                 than initially expected. The insurance company soon faced a number of
                                 implementation issues surrounding private keys, software licensing, policy-
                                 based IPsec throughout the network and ongoing IT support for modifications
                                 and updates to the policy. Faced with all of these challenges, as well as the fact
                                 that the trial installation was not working properly and did not cover all servers,
CUSTOMER CASE STUDY


Insurance Industry
Solution:                          the insurance company decided to look for a better plan.
Apani® EpiForce® software
protected personal identity        SOLUTION
information by encrypting          EpiForce software is used to selectively encrypt data between the servers.
data in transit to and from the    EpiForce uses a centrally managed Administration Server and Agents to set
partner bank                       and control security policies simply and easily. Once in place, there is little
                                   administrator intervention required, and changes to policies can be made and
                                   distributed quickly and automatically. Another key element in deciding to use
                                   EpiForce was that it runs on the network layer and is agnostic to the application.
                                   It is transparent to the end user, as well as the systems on which it runs,
Benefits:                          making it ideal for use in the DMZ, through the firewall and on internal servers
                                   as well.
•   EpForce software complied
    with all of the security and
                                   In addition, EpiForce not only achieved compliance for the Windows 2000
    compliance requirements
                                   servers, but also met the needs for the legacy NT 4.0 systems. Using an Apani
•   Implementation was             Guardian appliance as a “bump-in-the-wire,” the software application was
    simple and quick on over       secured from end to end.
    20 servers
                                   BENEFITS
•   Transparent to existing
                                   EpiForce helped the insurance company secure their internal network and
    applications, requiring no
    code rewrites                  personal identity information in transit to and from the partner bank. EpiForce
                                   achieved this resolution with little impact to the network or applications.
•   Low ongoing maintenance
    requirements                   •   Apani provided an efficient, cost-effective solution that accomplished the
                                       goals quickly, without taxing IT department resources.
•   EpiForce provided a
    complete, end to end           •   Installing EpiForce allowed the insurance company to continue its business
    solution                           and revenue stream uninterrupted by security problems.

                                   •   EpiForce provided a scalable solution that can address future system
                                       requirements without adding complexity or requiring expensive upgrades.

                                   •   EpiForce provided a complete, end to end solution for this company’s data
                                       protection requirements.
CUSTOMER CASE STUDY


 Insurance Industry
                                              ABOUT APANI
                                              Apani is the provider of cross-platform server isolation solutions for large
                                              enterprises. Apani’s solution isolates and secures the communication between
                                              servers and endpoints without regard to operating system or physical location.

                                              Apani EpiForce, the company’s flagship product, is a software-based alternative
                                              to using firewalls and VLANs inside the corporate network. EpiForce enables
                                              two powerful disciplines—logical security zoning and policy-based encryption
                                              of data in motion. EpiForce is a distributed, centrally-managed solution that
                                              is transparent to users, applications and infrastructure – making it quicker to
                                              deploy and less costly to manage than hardware-centric solutions. Policy
                                              enforced by EpiForce is persistent, which enables protected resources to be
                                              relocated without compromising security.

                                              Providing an evolutionary improvement in efficiency, flexibility, manageability and
                                              total cost of ownership, Apani technology is used by much of the Fortune 500.

                                              Based in Southern California, Apani was founded in 2003 and is privately held.
                                              More information about the company may be found at www.apani.com.




    For More Information
    To learn more about EpiForce and Apani,
    United States    +1.714.674.1600
    United Kingdom +44 (0)118 9298060

               www.apani.com.




004cs0610v2

More Related Content

What's hot

Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiIBM Sverige
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiIBM Sverige
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 

What's hot (20)

Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 

Similar to Insurance Company Secures PII with EpiForce

USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityBob Guimarin
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Securing Public Web Servers
Securing Public Web ServersSecuring Public Web Servers
Securing Public Web Serverswebhostingguy
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 finalBlock Armour
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
case-study-cisco-ise-project copy
case-study-cisco-ise-project copycase-study-cisco-ise-project copy
case-study-cisco-ise-project copyLee Millington
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesPanoptica
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 

Similar to Insurance Company Secures PII with EpiForce (20)

USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Securing Public Web Servers
Securing Public Web ServersSecuring Public Web Servers
Securing Public Web Servers
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
case-study-cisco-ise-project copy
case-study-cisco-ise-project copycase-study-cisco-ise-project copy
case-study-cisco-ise-project copy
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
 
Topdanmark- Cisco
Topdanmark- CiscoTopdanmark- Cisco
Topdanmark- Cisco
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

Insurance Company Secures PII with EpiForce

  • 1. CUSTOMER CASE STUDY Insurance Industry Overview “The key features in EpiForce Insurance company succeeds at protecting PII and complying allowed us to implement network with banking partner security requirements, without changing security across all the platforms we the network infrastructure have, and it was up and running in hours, not weeks.” or modifying the insurance software application Industry: Insurance Information Security Officer Customer Profile: A mortgage insurance leader, BACKGROUND this company has been in This extremely successful insurance company generated over $3B in net business for more than 30 years, revenue last year by providing to banks a variety of options for mortgage and provides services to the top insurance, as well as other contract underwriting and real estate related banking partners in the United services. States. For security reasons, anonymity was requested for this case study. This insurance company leverages technology to streamline their business interaction with partner banks and increases productivity by providing them access to an insurance processing application. An employee from the bank will remotely log onto the insurance processing server and enter a customers personal identity information (PII). In real time the insurance software application processes the customer data and sends an evaluation report back to the bank regarding the customer’s qualifications and suggested insurance policies. The loan processing application is hosted, at the insurance company, on servers in the DMZ. The servers are also connected through a firewall to corporate servers on the internal network. CHALLENGE The insurance company had it’s own security requirements and compliance regulations. The banking partners had similiar compliance regulations but they had their own set of security requirements. © 2010 Apani, All rights reserved. All marks are the property of their respective owners.
  • 2. CUSTOMER CASE STUDY Insurance Industry The primary objective was to find a way to satisfy all of the security requirements and compliance regulations while protecting PII. INVESTIGATION The software application described above was custom developed for the insurance company. It runs on multiple platforms and basically requires little interaction from the IT department. In addition to meeting the security requirement, the other solution requirements were: • No or minimal changes to the software application • No changes to the hardware/OS platforms “EpiForce hides • No significant ongoing management costs the complexity The servers and clients in this architecture were all running some form of of the network Microsoft operating system. The insurance company first attempted to use segmentation the IPsec and PKI (Public Key Infrastructure) functionality native to Windows 2000. This idea seemed perfect because it didn’t require upgrades. and encryption from the users.” However, it was soon discovered that one of the key components of the application was running on a Windows NT 4.0 server, which does not support – Information Security Officer IPsec. The insurance company decided to address this issue separately and to go ahead with a trial using IPsec. IPsec needs a system which can issue X.509 certificates. Security policies can then be applied, based on those certificates. During the testing, it quickly became apparent that this proposal was going to be much more complicated than initially expected. The insurance company soon faced a number of implementation issues surrounding private keys, software licensing, policy- based IPsec throughout the network and ongoing IT support for modifications and updates to the policy. Faced with all of these challenges, as well as the fact that the trial installation was not working properly and did not cover all servers,
  • 3. CUSTOMER CASE STUDY Insurance Industry Solution: the insurance company decided to look for a better plan. Apani® EpiForce® software protected personal identity SOLUTION information by encrypting EpiForce software is used to selectively encrypt data between the servers. data in transit to and from the EpiForce uses a centrally managed Administration Server and Agents to set partner bank and control security policies simply and easily. Once in place, there is little administrator intervention required, and changes to policies can be made and distributed quickly and automatically. Another key element in deciding to use EpiForce was that it runs on the network layer and is agnostic to the application. It is transparent to the end user, as well as the systems on which it runs, Benefits: making it ideal for use in the DMZ, through the firewall and on internal servers as well. • EpForce software complied with all of the security and In addition, EpiForce not only achieved compliance for the Windows 2000 compliance requirements servers, but also met the needs for the legacy NT 4.0 systems. Using an Apani • Implementation was Guardian appliance as a “bump-in-the-wire,” the software application was simple and quick on over secured from end to end. 20 servers BENEFITS • Transparent to existing EpiForce helped the insurance company secure their internal network and applications, requiring no code rewrites personal identity information in transit to and from the partner bank. EpiForce achieved this resolution with little impact to the network or applications. • Low ongoing maintenance requirements • Apani provided an efficient, cost-effective solution that accomplished the goals quickly, without taxing IT department resources. • EpiForce provided a complete, end to end • Installing EpiForce allowed the insurance company to continue its business solution and revenue stream uninterrupted by security problems. • EpiForce provided a scalable solution that can address future system requirements without adding complexity or requiring expensive upgrades. • EpiForce provided a complete, end to end solution for this company’s data protection requirements.
  • 4. CUSTOMER CASE STUDY Insurance Industry ABOUT APANI Apani is the provider of cross-platform server isolation solutions for large enterprises. Apani’s solution isolates and secures the communication between servers and endpoints without regard to operating system or physical location. Apani EpiForce, the company’s flagship product, is a software-based alternative to using firewalls and VLANs inside the corporate network. EpiForce enables two powerful disciplines—logical security zoning and policy-based encryption of data in motion. EpiForce is a distributed, centrally-managed solution that is transparent to users, applications and infrastructure – making it quicker to deploy and less costly to manage than hardware-centric solutions. Policy enforced by EpiForce is persistent, which enables protected resources to be relocated without compromising security. Providing an evolutionary improvement in efficiency, flexibility, manageability and total cost of ownership, Apani technology is used by much of the Fortune 500. Based in Southern California, Apani was founded in 2003 and is privately held. More information about the company may be found at www.apani.com. For More Information To learn more about EpiForce and Apani, United States +1.714.674.1600 United Kingdom +44 (0)118 9298060 www.apani.com. 004cs0610v2