August 22, 2024 By Shmuel Shriker 3 min read

Cybersecurity is a 24/7 focus of 2Bsecure, an IBM Business Partner that empowers mid-sized and large organizations across all sectors to protect their systems and data against a rising tide of attacks and exploits. As a result, 2Bsecure has helped Bituach Haklai, a leading insurer in Israel, harden its databases with granular access controls backed by intelligent monitoring.

Addressing growing cybersecurity challenges

Our client, Bituach Haklai, originally offered insurance services to the farming industry. For years, they had no real need to enforce security policies on internal databases. But the combination of rising sophistication in cyberattacks and significant evolution in their business changed things.

They now offer a broader range of insurance products, including car, household and travel, to the general market in Israel, and their customers have 24/7 access to their insurance portfolio and personal details through web and mobile applications. This means that there are more attack surfaces—and more services and developers potentially accessing sensitive data. Because they work with EU customers and suppliers, our client wanted to ensure compliance with standards such as GDPR and NIS2, which meant locking down access to databases containing customer data. Using Guardium® data protection, they were able to provide databases firewall that prevents unauthorized access to critical tables and personal data.

Finding the right solution

When Bituach Haklai approached us for a solution, the key requirements were to stop any attempts at unauthorized access immediately and generate alerts. The difficulty lies in managing exactly what is authorized versus what is unauthorized, across a complex and constantly evolving set of people and services.

We recommended IBM Guardium Data Protection, which gave our client not only the database firewalls but also the sophisticated granular access controls and the monitoring and response capabilities they wanted. The solution also offers agentless monitoring capabilities, aligning with Bituach Haklai’s plans for a hybrid cloud architecture.

Locking down systems

Given the round-the-clock nature of our client’s business, 2Bsecure had to carefully plan and execute the deployment to minimize downtime. That’s part of our best-practice approach: we have a proven end-to-end methodology that helps us implement data security systems without disruption.

Currently, Bituach Haklai is using the Guardium solution to protect Microsoft SQL Server databases running on Windows, and they might extend it to their IBM i (AS/400) environment in the future.

Our client has many suppliers, and each one now has precise permissions to access the specific databases they’re supposed to handle. Guardium prevents unauthorized access and allows our client to see whether data is present where it shouldn’t be. They’re also taking advantage of the user-behavior profiling and the risk-spotter feature within Guardium’s active threat analytics capabilities.

We’ve provided training in system management and maintenance, data analysis, dashboards customization and policy configuration to our client so they can manage access rights for themselves, but we remain available around the clock to help resolve any issues or active threats. This can include consultation; assisting with issues, bugs and errors; and scheduled sessions where they share their needs, wants and questions regarding system capabilities. In cybersecurity, it’s valuable to have the peace of mind that comes from expert support!

Partnering to optimize client outcomes

Database security is a tricky topic for many organizations, particularly smaller ones that might lack specialized skills and knowledge. Recognizing this, we’re working with IBM on a new business plan to offer managed services for database security, using IBM Guardium Insights, which supports multitenant environments.

As an IBM Business Partner, it’s great to be able to get quick answers from experts if we have a question about IBM technology—they are responsive and helpful. We really feel like IBM is working with us to make sure every client is fully satisfied, and that makes it a great partnership!

About 2Bsecure

With 250 employees, 2Bsecure is one of the leading cybersecurity specialists in Israel, uniquely offering services across all three pillars of cybersecurity: professional services, consulting and 24/7 managed security services. 2Bsecure is a subsidiary of the Matrix Group, the largest IT company in Israel, employing more than 12,000 people in Israel and globally.

Explore IBM Partner Plus today
Was this article helpful?
YesNo

More from Security

Tech industry ramps up efforts to combat rising deepfake threats

2 min read - Deepfake fraud is surging, signaling an alarming trend in corporate security. Scammers can now create convincing voice impersonations of executives, potentially manipulating stock prices and orchestrating multi-million dollar frauds. As companies rush to bolster defenses, experts say many remain unprepared for this rapidly evolving threat. "Bad actors have a low barrier to entry," warns Srinivas Tummalapenta, an IBM Distinguished Engineer & CTO of IBM Security Services. With just $5 and a minute-long voice sample, scammers can now impersonate CEOs, potentially…

Palo Alto Networks acquires IBM QRadar SaaS assets: Strengthening joint AI security solutions and next-generation security operations to prevent threats at scale

2 min read - Today, Palo Alto Networks announced the completion of its acquisition of IBM's QRadar Software as a Service (SaaS) assets, strengthening the companies’ strategic alliance and paving the way for more organizations to benefit from our joint next-generation security operations and AI-powered solutions. The security industry is at a turning point in which AI will transform businesses and drive business growth; however the ever-growing threat landscape continues to challenge teams to adapt. In the recent IBM Cost of a Data Breach Report,…

When AI chatbots break bad

3 min read - A new challenge has emerged in the rapidly evolving world of artificial intelligence. "AI whisperers" are probing the boundaries of AI ethics by convincing well-behaved chatbots to break their own rules. Known as prompt injections or "jailbreaks," these exploits expose vulnerabilities in AI systems and raise concerns about their security. Microsoft recently made waves with its "Skeleton Key" technique, a multi-step process designed to circumvent an AI's ethical guardrails. But this approach isn't as novel as it might seem. "Skeleton…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters