Key Challenges
- Create a centralized and sustainable system for protecting corporate infrastructure.
After analyzing the client’s infrastructure, a detailed implementation plan was agreed upon.
During the preparatory phase, ICL Services specialists deployed server capacity in two regions and virtual machines to support the mail gateway.
During implementation, challenges arose due to the specific network architecture and restrictions on opening inter-network access.
The team proposed redesigning the architecture and implementing multiple update distribution points—one for each subnet. This improved the system's security and fault tolerance, but required redesigning and increased the implementation timeline.
As a result, the security system was adapted to the specifics of the customer's infrastructure, the number of false positives was reduced, and it functioned correctly on production, server, and user devices. Remote connection channels were also protected and synchronized after connection was restored.
The pilot project covered approximately 250 devices. At this stage, the correct operation of updates, encryption, and mail traffic filtering was verified. Following testing, the solution was scaled to all the company's sites.- The implementation of KSMG and KSC/KES provided comprehensive protection for email traffic and endpoints: KSMG significantly reduced the risk of phishing, spam, and malicious attachments, while KES strengthened the protection of workstations and servers through behavioral analysis, exploit protection, and ransomware protection.
Products and technologies
- Kaspersky Secure Mail Gateway
- Kaspersky Endpoint Security extended
Results
- A centralized endpoint and email traffic protection system was implemented.
- Compared to the previous configuration, infrastructure resilience increased by approximately 60 percent.
- Stable updates and functionality of solutions in isolated network segments were ensured.
- Web control tools and user rights delimitation by groups were introduced in the corporate directory system.
- Detailed operational instructions and recommendations were generated for the client’s IT department.