Home Case Studies insta-group Giving cybercriminals nowhere to hide

Insta Advance Oy elevates its SOC services with advanced automatic threat detection

People talking about cybercriminals
It’s not about if you’ll be attacked, but when,” says Jouni Jääskeläinen, Director of Business Development at Insta Advance Oy (Insta). “Our goal is to prepare our customers for the inevitable, by detecting cyberthreats, prioritizing the most serious breaches and responding as soon as possible. While this is easy to say, it’s extremely difficult to do.

In cybersecurity, the goalposts move constantly. Attackers invent new ways to identify and exploit vulnerabilities in their targets’ IT environments, and to cover their tracks once they gain access. In response, more companies are taking advantage of security operations center (SOC) services to mitigate risks.

“Effective cybersecurity measures are often highly resource-intensive,” explains Jääskeläinen. “So, it make sense for companies to outsource this part of their technology strategy. Our SOC takes on the hassle of 24/7 monitoring so that our customers can focus on their core business, with peace of mind that their systems and critical operational reliability are well-protected.”

To ensure it can rise to the challenge of an ever-changing threat landscape, Insta cultivates up-to-the-minute cybersecurity expertise. A recent study showed that the time it takes for criminals to execute an attack has dropped by 94 percent over the last few years, putting these specialists under increasing pressure to identify and respond to threats quickly.

Jääskeläinen comments: “For our SOC, time is of the essence. And yet the data we must analyze to uncover breaches is growing exponentially all the time. To stay one step ahead of cyberattackers, we wanted to harness the latest security technology to help our trained specialists optimize their use of time. The search was on for the right technology solution.”

Time in minutes


Cuts detection time for potential threats to minutes rather than hours

By operationalizing our SOC services with IBM Security solutions, we keep our service levels high and our fees competitive. Jouni Jääskeläinen Director of Business Development Insta
Zoning in on attackers

To differentiate its SOC services from those of the competition, Insta selected IBM Cloud® Pak for Security. Using the solution, the company centralizes log management and security information and event management (SIEM).

“We chose IBM following a thorough review of the market,” recalls Jääskeläinen. “IBM Security solutions are top-rated by analysts including Gartner and have many stellar references worldwide. Most importantly to us, IBM Security solutions are continually developed to stay one step ahead of changes in the cyberthreat landscape.”

IBM Cloud Pak for Security gives Insta’s SOC team immediate, real-time insight into each customer’s security posture. The solution automatically detects potential breaches, gathering threat intelligence to establish likely urgency. Where appropriate, the system issues an alert with an accompanying priority level, helping SOC specialists filter out the noise to hone in on the most hazardous threats.

“With IBM Cloud Pak for Security, we can root out a wide range of cyberattacks,” says Jääskeläinen. “For example, the IBM solution has alerted us to ransomware in a customer’s environment, enabling us to quickly isolate it before it spread and encrypted their files, stopping the attack in its tracks with help from IBM, we’ve found many malwares.”

Insta integrates IBM Cloud Pak for Security with a wide range of customer environments, hosting a multi-tenant and dedicated platform on-premises. When going to market, the company draws on support from IBM to attract new customers.

“One of the best things about IBM Cloud Pak for Security is the seamless interoperability with different types of technologies,” adds Jääskeläinen. “At last count, we believe there are as many as 400 different supported integrations. This makes it easy to onboard new customers. And when we do meet with prospects, we always mention that we use IBM technology, and the IBM team often helps us close the deal.”

IBM solutions play a central role in allowing our customers to trust our SOC services, because they enhance our ability to protect their environments 24/7 without interruption. Jouni Jääskeläinen Director of Business Development Insta
Inspiring Trust

By enabling Insta’s SOC to react faster and more effectively, IBM technology is helping the company to develop long-lasting, fulfilling relationships with its customers. Insta can provide exceptional protection for customer systems round the clock.

Jääskeläinen explains: “Loosely translated, our company motto is ‘permission to trust’. IBM solutions play a central role in allowing our customers to trust our SOC services, because they enhance our ability to protect their environments 24/7 without interruption.”

Insta is also driving up efficiency for its SOC using IBM solutions. The company can reach agreed service levels while optimizing utilization of valuable resources.

“By operationalizing our SOC services with IBM Security solutions, we keep our service levels high and our fees competitive,” says Jääskeläinen. “This adds up to a compelling proposition that is helping us to expand our market share.”

Insta Logo
About Insta Group Oy

Insta is one of the leading cyber security service providers in Finland. Insta offers cyber security services, from consulting to cyber defence, and from network security to secure digital identity. Insta’s services and products are trusted by large companies and public sector organizations both domestically and worldwide.

In addition to cyber security, Insta is a front runner and a reliable partner for our industry, defence and software consulting customers, employing more than 1, 100 experts. By combining the state of the art know-how with intelligent technology, we improve our customers’ safety and performance in a digitalizing world. For more information, please visit: www.insta.fi (link resides outside of ibm.com)

    Next up:
    Fueling the sustainable e-commerce revolution

    Turnr pioneers customer-to-customer returns and one-click exchanges

    Read more
    A flexible supply chain produces more renewable fuels

    Neste builds a global ERP platform in its drive to become the world’s leading renewable fuels and circular solutions producer

    Read more
    Accelerating digital transformation and reducing environmental impact

    BlueIT uses IBM Turbonomic and IBM Instana to assure app performance and cut carbon emissions

    Read more

    © Copyright IBM Corporation 2023. IBM Corporation, IBM Security, New Orchard Road, Armonk, NY 10504

    Produced in the United States of America, May 2023.

    IBM, the IBM logo, ibm.com, [in alphabetical order, insert IBM brand that materials relate to ONLY IF it appears on our trademark website, and present it as it appears on that site (e.g., including “IBM,” if applicable, but without trademarks)] and [insert IBM product name that materials relate to ONLY IF it appears on our trademark website, and present it as it appears on that site (e.g., including “IBM,” if applicable, but without trademarks)] are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.

    This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates.

    The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.

    Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.