SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Telekom Malaysia: Keeping the Good
Data Inside with Safetica

 Profile – Telekom Malaysia is the second largest telecommunications provider in South Asia
 with an annual turnover of $5.5 billion.

 Problem – Loose data handling processes resulted in stolen data, bribery, and manipulated
 contracts.

 Solution – Create a leak-proof office and data loss protection system supported by Safetica
 software.

 Benefits – Monitor and control access to sensitive documents without requiring costly hard-
 ware.




Lost data costs money and reputation
Data loss was costly for Telekom Malaysia. The company, the second largest telecommunications
provider in South Asia with an annual turnover of $5.5 billion, discovered that its tender process
was undermined by stolen data.

An $85 million contract had been awarded to Alcatel-Lucent as the result of confidential information
from a bribed official. This was no one-off incident. The French IT company had admitted multiple
instances of this behavior and was fined $137 million by a United States court for its actions in
Malaysia and other countries.

The bribery incident led to substantial changes at Telekom Malaysia(TM). “Before the scandal hit,
they really had no data handling procedures,” points out Mitthiran Raman, founder of Safetica
distributor Iconic Innovations. “Their tender room was a long table with open files, laptops every-
where, no monitoring – even vendors could come in.”

Creating a leak-proof office
In response to government demands that TM improve data handling standards, the company re-
sponded with plans for the Telekom Malaysia Tender Evaluation Centre(TMTEC), a locked-down
office with the latest desktop and data security systems for processing confidential tenders.

The future location of TMTEC was a given: It would be sited on the 50th floor of the TM building in
Kuala Lumpur with a dedicated elevator, controlled access, and individually checked-in employees.
But the data control system was less clear. The tender called for a data loss prevention (DLP) solution
to be installed on nearly 90 employees’ computers, use of encrypted flash drives, and document
storage on a secure intranet.

Nimble approach to problem solving
TM invited its registered suppliers to compete in the tender and received bids from industry leaders
such as Symantec and IronKey. Safetica participated via its distributor Iconic Innovations and their
partner firm Privasia Technologies.

“We went through every clause and requirement in the RFP (Request For Proposal) and showed
them how Safetica really exceeded their requirements with its 360 degree DLP approach,” remem-
bers Mitthiran. “They didn’t know exactly what they wanted, so we thought ‘lets give them more
than just a secure thumbdrive’.”

Open communication between Safetica and Iconic Innovations during the bid preparation was criti-
cal, points out Jakub Mahdal, CEO of Safetica. “DLP systems are notoriously complex and we were
talking with Mitthiran at all hours. This allowed us to quickly answer questions before they could
become an issue.”

These fast response times and operational flexibility helped Iconic Innovations implement the project
despite delays due to changes in Project Timeline. “It was only after we were announced as the bid
winner that they finalized the network architecture and workflows,” adds Mitthiran. “It’s good to be
small and nimble.”




Safe data without expensive hardware
With Safetica, Iconic Innovations was able to beat back competitors offering expensive hardware
or a DLP add-on to an antivirus solution. The winning bid incorporated Safetica software with 86
flashdrives, one console in the TMTEC secretariat, and a management server and a database
server residing at an external TM data center 30 km away.
The new DLP solution has employees daily checking in at the TMTEC secretariat, with each receiv-
ing a computer and an encrypted flashdrive to use as their working space. At the close of the day,
the secretariat checks the hardware back in, uploads the documents to a secure server, and shreds
the data on the flashdrives ahead of the next day.

Safetica substantially lowered the cost of lost data for TMTEC. “It usually costs around $400 for
each secure thumbdrive, and with 86 of them – someone’s going to lose it. But with Safetica, any
ordinary USB flash drive can be encrypted. This was the real deal maker. Even in training, they lost
four of them,” remembers Mitthiran.

Moving up the learning curve
For both Iconic Innovations and Safetica Technologies, successfully implementing the DLP system
at the Telekom Malaysia Tender Evaluation Centre was proof that Safetica could compete against
established players.

“Telekom Malaysia knew they had a big need for data security before we even started,” says Mit-
thiran. “From our side, we learned to be bold in proposing new tender conditions to better meet
customer needs. We fell in love with the problem as we learned what could be done with Safetica
– and we did it.”




© Copyright 2012 Safetica Technologies s.r.o. All rights reserved. Safetica is a registered trademark of Safetica Technologies s.r.o. For more infor-
mation you can contact Safetica Technologies partners, whose list you can find on www.safetica.com.
Prague | Czech Republic | October 12, 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTStylight
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction BriefNováccent
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_DeckEtheralabs
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Augmate connect summary
Augmate connect summaryAugmate connect summary
Augmate connect summaryEtheralabs
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet BankingGoutama Bachtiar
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 

Was ist angesagt? (20)

Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoT
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Augmate connect summary
Augmate connect summaryAugmate connect summary
Augmate connect summary
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet Banking
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 

Andere mochten auch

Our Project During Professional Communication II
Our Project During Professional Communication IIOur Project During Professional Communication II
Our Project During Professional Communication IIAs-Sufi Safwan Hashim
 
IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17APNIC
 
TM Forum Case study handbook_2013
TM Forum Case study handbook_2013TM Forum Case study handbook_2013
TM Forum Case study handbook_2013Locutus1of3
 
Internet connection in malaysia 2
Internet connection in malaysia 2Internet connection in malaysia 2
Internet connection in malaysia 2Farzana Yusoff
 
El cosmo y el universo
El cosmo y el universoEl cosmo y el universo
El cosmo y el universoichigokurama
 
Annual Report 2006 2700kb
Annual Report 2006 2700kbAnnual Report 2006 2700kb
Annual Report 2006 2700kbsbc.corporation
 
SBC Corporation Announcement On Litigation
SBC Corporation  Announcement On LitigationSBC Corporation  Announcement On Litigation
SBC Corporation Announcement On Litigationsbc.corporation
 
Generos de anime y manga andres velez 1234321
Generos de anime y manga andres velez 1234321Generos de anime y manga andres velez 1234321
Generos de anime y manga andres velez 1234321AndresVelez84
 
Igdaş inovasyon yolculuğu
Igdaş inovasyon yolculuğuIgdaş inovasyon yolculuğu
Igdaş inovasyon yolculuğuigdasinovasyon
 
Rcbks bulletin vol 19 no 6
Rcbks bulletin vol 19 no 6Rcbks bulletin vol 19 no 6
Rcbks bulletin vol 19 no 6jamescheong
 
Volume 18. Number 5.
Volume 18. Number 5.Volume 18. Number 5.
Volume 18. Number 5.guest931d279
 
Bib no budget_præs
Bib no budget_præsBib no budget_præs
Bib no budget_præsSkybrud.dk
 
Annual Report 2007 1600kb
Annual Report 2007 1600kbAnnual Report 2007 1600kb
Annual Report 2007 1600kbsbc.corporation
 
Bursa Announcement - Share Buy-Back Statement
Bursa Announcement - Share Buy-Back Statement Bursa Announcement - Share Buy-Back Statement
Bursa Announcement - Share Buy-Back Statement sbc.corporation
 

Andere mochten auch (20)

Our Project During Professional Communication II
Our Project During Professional Communication IIOur Project During Professional Communication II
Our Project During Professional Communication II
 
Tmq209 present
Tmq209 presentTmq209 present
Tmq209 present
 
Domestic bandwidth
Domestic bandwidthDomestic bandwidth
Domestic bandwidth
 
Faq oiab
Faq oiabFaq oiab
Faq oiab
 
IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17IPv6 deployment in Telekom Malaysia, PTC17
IPv6 deployment in Telekom Malaysia, PTC17
 
TM Forum Case study handbook_2013
TM Forum Case study handbook_2013TM Forum Case study handbook_2013
TM Forum Case study handbook_2013
 
Internet connection in malaysia 2
Internet connection in malaysia 2Internet connection in malaysia 2
Internet connection in malaysia 2
 
Telekom Tower
Telekom TowerTelekom Tower
Telekom Tower
 
El cosmo y el universo
El cosmo y el universoEl cosmo y el universo
El cosmo y el universo
 
Annual Report 2006 2700kb
Annual Report 2006 2700kbAnnual Report 2006 2700kb
Annual Report 2006 2700kb
 
SBC Corporation Announcement On Litigation
SBC Corporation  Announcement On LitigationSBC Corporation  Announcement On Litigation
SBC Corporation Announcement On Litigation
 
Klasicroo
KlasicrooKlasicroo
Klasicroo
 
Generos de anime y manga andres velez 1234321
Generos de anime y manga andres velez 1234321Generos de anime y manga andres velez 1234321
Generos de anime y manga andres velez 1234321
 
Igdaş inovasyon yolculuğu
Igdaş inovasyon yolculuğuIgdaş inovasyon yolculuğu
Igdaş inovasyon yolculuğu
 
Rcbks bulletin vol 19 no 6
Rcbks bulletin vol 19 no 6Rcbks bulletin vol 19 no 6
Rcbks bulletin vol 19 no 6
 
Volume 18. Number 5.
Volume 18. Number 5.Volume 18. Number 5.
Volume 18. Number 5.
 
Bib no budget_præs
Bib no budget_præsBib no budget_præs
Bib no budget_præs
 
Annual Report 2007 1600kb
Annual Report 2007 1600kbAnnual Report 2007 1600kb
Annual Report 2007 1600kb
 
Food and Cancer: What is the story?
Food and Cancer: What is the story?Food and Cancer: What is the story?
Food and Cancer: What is the story?
 
Bursa Announcement - Share Buy-Back Statement
Bursa Announcement - Share Buy-Back Statement Bursa Announcement - Share Buy-Back Statement
Bursa Announcement - Share Buy-Back Statement
 

Ähnlich wie Telekom malaysia keeping the good data inside with Safetica - By Safetica Benelux

Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...flashnewsrelease
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last standGeorge Delikouras
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Elastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdf
Elastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdfElastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdf
Elastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdfErwin Halmans | www.man-friday.nl
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09tverbeck
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesMartyn Taylor
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006tom termini
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019iExec
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 

Ähnlich wie Telekom malaysia keeping the good data inside with Safetica - By Safetica Benelux (20)

Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...Department of Transportation and Communications of Philippines Selects Guardt...
Department of Transportation and Communications of Philippines Selects Guardt...
 
Encrytpion information security last stand
Encrytpion information security last standEncrytpion information security last stand
Encrytpion information security last stand
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
Elastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdf
Elastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdfElastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdf
Elastic Meetup 24-05-2023 - Network Observability at T-Mobile .pdf
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
How Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising StatsHow Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising Stats
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
2
22
2
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 

Telekom malaysia keeping the good data inside with Safetica - By Safetica Benelux

  • 1. Telekom Malaysia: Keeping the Good Data Inside with Safetica Profile – Telekom Malaysia is the second largest telecommunications provider in South Asia with an annual turnover of $5.5 billion. Problem – Loose data handling processes resulted in stolen data, bribery, and manipulated contracts. Solution – Create a leak-proof office and data loss protection system supported by Safetica software. Benefits – Monitor and control access to sensitive documents without requiring costly hard- ware. Lost data costs money and reputation Data loss was costly for Telekom Malaysia. The company, the second largest telecommunications provider in South Asia with an annual turnover of $5.5 billion, discovered that its tender process was undermined by stolen data. An $85 million contract had been awarded to Alcatel-Lucent as the result of confidential information from a bribed official. This was no one-off incident. The French IT company had admitted multiple instances of this behavior and was fined $137 million by a United States court for its actions in Malaysia and other countries. The bribery incident led to substantial changes at Telekom Malaysia(TM). “Before the scandal hit, they really had no data handling procedures,” points out Mitthiran Raman, founder of Safetica distributor Iconic Innovations. “Their tender room was a long table with open files, laptops every- where, no monitoring – even vendors could come in.” Creating a leak-proof office In response to government demands that TM improve data handling standards, the company re- sponded with plans for the Telekom Malaysia Tender Evaluation Centre(TMTEC), a locked-down office with the latest desktop and data security systems for processing confidential tenders. The future location of TMTEC was a given: It would be sited on the 50th floor of the TM building in Kuala Lumpur with a dedicated elevator, controlled access, and individually checked-in employees.
  • 2. But the data control system was less clear. The tender called for a data loss prevention (DLP) solution to be installed on nearly 90 employees’ computers, use of encrypted flash drives, and document storage on a secure intranet. Nimble approach to problem solving TM invited its registered suppliers to compete in the tender and received bids from industry leaders such as Symantec and IronKey. Safetica participated via its distributor Iconic Innovations and their partner firm Privasia Technologies. “We went through every clause and requirement in the RFP (Request For Proposal) and showed them how Safetica really exceeded their requirements with its 360 degree DLP approach,” remem- bers Mitthiran. “They didn’t know exactly what they wanted, so we thought ‘lets give them more than just a secure thumbdrive’.” Open communication between Safetica and Iconic Innovations during the bid preparation was criti- cal, points out Jakub Mahdal, CEO of Safetica. “DLP systems are notoriously complex and we were talking with Mitthiran at all hours. This allowed us to quickly answer questions before they could become an issue.” These fast response times and operational flexibility helped Iconic Innovations implement the project despite delays due to changes in Project Timeline. “It was only after we were announced as the bid winner that they finalized the network architecture and workflows,” adds Mitthiran. “It’s good to be small and nimble.” Safe data without expensive hardware With Safetica, Iconic Innovations was able to beat back competitors offering expensive hardware or a DLP add-on to an antivirus solution. The winning bid incorporated Safetica software with 86 flashdrives, one console in the TMTEC secretariat, and a management server and a database server residing at an external TM data center 30 km away.
  • 3. The new DLP solution has employees daily checking in at the TMTEC secretariat, with each receiv- ing a computer and an encrypted flashdrive to use as their working space. At the close of the day, the secretariat checks the hardware back in, uploads the documents to a secure server, and shreds the data on the flashdrives ahead of the next day. Safetica substantially lowered the cost of lost data for TMTEC. “It usually costs around $400 for each secure thumbdrive, and with 86 of them – someone’s going to lose it. But with Safetica, any ordinary USB flash drive can be encrypted. This was the real deal maker. Even in training, they lost four of them,” remembers Mitthiran. Moving up the learning curve For both Iconic Innovations and Safetica Technologies, successfully implementing the DLP system at the Telekom Malaysia Tender Evaluation Centre was proof that Safetica could compete against established players. “Telekom Malaysia knew they had a big need for data security before we even started,” says Mit- thiran. “From our side, we learned to be bold in proposing new tender conditions to better meet customer needs. We fell in love with the problem as we learned what could be done with Safetica – and we did it.” © Copyright 2012 Safetica Technologies s.r.o. All rights reserved. Safetica is a registered trademark of Safetica Technologies s.r.o. For more infor- mation you can contact Safetica Technologies partners, whose list you can find on www.safetica.com. Prague | Czech Republic | October 12, 2012