- Case: Telecom Operator implemented a Security Perimeter multi-vendor solution. The information from each vendor is isolated. Analysis are difficult and slow; reporting and data correlation is manual prone to human error.
- Requirement: We implemented a Security Perimeter Analytic System vendor-agnostic, multi-domain, with automatic event correlation and reporting.
- Result: Security Analytic System is operational and supporting the analysis of risk and threats successfully