Iraje Privileged Access Manager

Implementation of Iraje PAM on one a large
retailer part of USD $50 BN group

- CASE STUDY RETAIL

Introduction

Customer is a retail giant and part of a conglomerate with revenue exceeding USD 50 Bn and leading financial services and engineering company. It operates in 34 countries with more than 120,000 employees. The group has interests in viscose staple fibre, metals, cement, viscose filament yarn, branded apparel, carbon black, chemicals, fertilizers, insulators, financial services and telecom.

The group has more than 20 group companies spread around the world with infra spawning multiple countries

The retail arm of the group got our reference from an implementation by done in their cement business and got interested in reviewing our solution. They did a proof of value for a month and ran the solution live in their environment. They experienced the solution and support for a month while they evaluated 5 other competing solutions. They signed up for Iraje PAM with the commercials we signed up within the group.

Key Challenges

  • Retail business had no security around privileged users
  • All passwords were shared and they had no idea how to govern and control their infra
  • Full accesses given to their IT team and vendors
  • Random security incidents with no control on their core infra
  • Growing apparel business intensified the need to look for a solution to govern the privileged accesses

Iraje PAM Highlights

  • Iraje PAM deployed in their environment with all types of servers, network elements, databases and browser consoles configured in Iraje PAM
  • Their social media accounts of Facebook, YouTube, Instagram and Twitter also configured in Iraje PAM for their agents to login and work
  • IBM was managing their entire setup and all their administrators were configured in Iraje PAM
  • Enforced Iraje PAM for all their privileged users and configured with 2 factor auth and time restricted access to their devices

Outcomes and Benefits

  • Complete integration of all infra including social media accounts of the enterprise
  • Full visibility and control on the environment
  • Complete audit trail of all accesses within the enterprise with role based, time based access
  • Simplified audits and compliance requirements
  • Control on the vendors/partner resources managing their infrastructure
  • Brought security and controls on their internal environment