This product is primarily used for cloud security applications and exclusively for performance management.
The solution uses SCS, Secure Coding Standards. It is the framework of the program which is used to build an application. It's basically how the programming methodologies are built. It lays out how code is written and how configurations will be developed so the solution can work in unison with EPM.
Using tools such as Burp Suite, Wireshark, et cetera, we find out whatever are the code snippets or whatever are the code blocks being deployed are as per the security standards. There is a third-party code approval protocol. In a third-party code approval use case, whenever we see that these applications involve integration with any other application, rather than the one which you are dealing with, for example, say EPM is integrated with another product like SAP, we need to figure out the mode of integration. We need to ensure that the third-party application is able to be in sync from a security perspective,
We also use the solution as an architecture-based model. We can do risk modeling. If there is any kind of risk involved due to which product performance, product security, or product modulation gets affected. For example, if a Microsoft Windows operation system goes under an update. If OSSA goes down or ransomware is detected in MS operating system, we have risk models in place to initiate protocols.
In 2019, a very big conglomerate in the energy sector used this solution. In this use case, the data was extremely dynamic in nature, due to the nature of power consumption.
For example, if your house is consuming 200 watts today, you can't be sure that tomorrow it will be 200 watts. It can go to 205, 210 or it can go even down. Considering this dynamic, the company needed to ensure this dynamic process could not be attacked by any kind of ransomware, as ransomware are common in energy management companies. I had to analyze the data, and I found out that the processing was done in batches.
Ransomware was more prone to attack in alternative energy areas, such as wind. It will look like a virus on the surface and then activate. Without proper security, it could take out the energy completely.
I observed that there was ransomware coming from two provinces, Victoria and North Australia, and furthermore, I could see that ransomware was attacking non-conventional data which was not frequently processed. I was able to advise the company to move data to another server and follow the algorithms which I suggested.
The result was that they could see that non-conventional energy, wind energy, in these two provinces was performing well in terms of security. With this product, they could see that data was not getting stolen.