Erecting secure infrastructure
One firm rebuilt its security and enterprise management systems, saving money
Computerworld - Lend Lease Corp. had antivirus software running on all of the gateways, e-mail servers and desktops that serve its 10,000 workers worldwide, but that wasn't enough to prevent a Blaster attack on Aug. 3, 2003. That incident prompted the global real estate management and financing company to begin a process that resulted in a sweeping revamp of its IT infrastructure.
"Blaster hit us rather hard and on a global scale," says Chief Security Officer John Miles. The antivirus protections notwithstanding, he says, "we didn't have the right tools for proper insight to tell where the virus was coming from."
Sydney, Australia-based Lend Lease appraised its security, systems and service management software. The goal: to be better prepared for attacks and to improve how the business deals with internal and external customers.
A little more than a year after the Blaster attack, the company had completed a $1.8 million project to purchase and install 18 software products from six vendors, including Remedy, a unit of BMC Software Inc. Lend Lease dubbed the project HighRISE, after the company's work on skyscrapers and because it includes Remedy identity, system and endpoint management tools. The products, deployed together, went live in early September.
Miles describes HighRISE as a five-level pyramid, with service management functions at the top (see diagram, next page). These include help desk, service level, asset and change management products from Remedy, as well as remote-control and business intelligence products from ManageSoft Corp.
John Miles and Jay Skibinski of Lend Lease
Image Credit: Ann States
The directory management tier includes administration products from NetIQ Corp., plus directory software from Microsoft Corp. and Oracle Corp.
The configuration and vulnerability management layer includes configuration, security path and vulnerability management tools.
The bottom tier, threat and availability management, includes application, security and inventory management functions.
Lend Lease CIO Jay Skibinski says he wanted the products to be integrated at the same time to keep the project rollout time short. "Integrating all the products in series would have taken years to complete, and integration would have been a challenge," he says.
Lend Lease set up a bidding process, invited three vendors for each functional area and then picked the one with the best features and technical quality. As part of the deal, Skibinski required the vendors to meet upfront and agree to make their products interoperate. By doing so, Lend Lease was able to avoid hiring an independent integrator. "The vendors understand it's a big win for them as well to interoperate, and it's something that leads to better business," Skibinski says.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts