• About
  • FAQ
  • Earn Bitcoin while Surfing the net
  • Buy & Sell Crypto on Paxful
Newsletter
Approx Foundation
  • Home
    • Home – Layout 1
  • Bitcoin
  • Ethereum
  • Regulation
  • Market
  • Blockchain
  • Business
  • Guide
  • Contact Us
No Result
View All Result
  • Home
    • Home – Layout 1
  • Bitcoin
  • Ethereum
  • Regulation
  • Market
  • Blockchain
  • Business
  • Guide
  • Contact Us
No Result
View All Result
Approx Foundation
No Result
View All Result
Home Blockchain

Defending sensitive personal data with granular access controls

Moussa by Moussa
January 28, 2025
in Blockchain
0
Defending sensitive personal data with granular access controls
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Cybersecurity is a 24/7 focus of 2Bsecure, an IBM Business Partner that empowers mid-sized and large organizations across all sectors to protect their systems and data against a rising tide of attacks and exploits. As a result, 2Bsecure has helped Bituach Haklai, a leading insurer in Israel, harden its databases with granular access controls backed by intelligent monitoring.

Addressing growing cybersecurity challenges

Our client, Bituach Haklai, originally offered insurance services to the farming industry. For years, they had no real need to enforce security policies on internal databases. But the combination of rising sophistication in cyberattacks and significant evolution in their business changed things.

They now offer a broader range of insurance products, including car, household and travel, to the general market in Israel, and their customers have 24/7 access to their insurance portfolio and personal details through web and mobile applications. This means that there are more attack surfaces—and more services and developers potentially accessing sensitive data. Because they work with EU customers and suppliers, our client wanted to ensure compliance with standards such as GDPR and NIS2, which meant locking down access to databases containing customer data. Using Guardium® data protection, they were able to provide databases firewall that prevents unauthorized access to critical tables and personal data.

Finding the right solution

When Bituach Haklai approached us for a solution, the key requirements were to stop any attempts at unauthorized access immediately and generate alerts. The difficulty lies in managing exactly what is authorized versus what is unauthorized, across a complex and constantly evolving set of people and services.

We recommended IBM Guardium Data Protection, which gave our client not only the database firewalls but also the sophisticated granular access controls and the monitoring and response capabilities they wanted. The solution also offers agentless monitoring capabilities, aligning with Bituach Haklai’s plans for a hybrid cloud architecture.

Locking down systems

Given the round-the-clock nature of our client’s business, 2Bsecure had to carefully plan and execute the deployment to minimize downtime. That’s part of our best-practice approach: we have a proven end-to-end methodology that helps us implement data security systems without disruption.

Currently, Bituach Haklai is using the Guardium solution to protect Microsoft SQL Server databases running on Windows, and they might extend it to their IBM i (AS/400) environment in the future.

Our client has many suppliers, and each one now has precise permissions to access the specific databases they’re supposed to handle. Guardium prevents unauthorized access and allows our client to see whether data is present where it shouldn’t be. They’re also taking advantage of the user-behavior profiling and the risk-spotter feature within Guardium’s active threat analytics capabilities.

We’ve provided training in system management and maintenance, data analysis, dashboards customization and policy configuration to our client so they can manage access rights for themselves, but we remain available around the clock to help resolve any issues or active threats. This can include consultation; assisting with issues, bugs and errors; and scheduled sessions where they share their needs, wants and questions regarding system capabilities. In cybersecurity, it’s valuable to have the peace of mind that comes from expert support!

Partnering to optimize client outcomes

Database security is a tricky topic for many organizations, particularly smaller ones that might lack specialized skills and knowledge. Recognizing this, we’re working with IBM on a new business plan to offer managed services for database security, using IBM Guardium Insights, which supports multitenant environments.

As an IBM Business Partner, it’s great to be able to get quick answers from experts if we have a question about IBM technology—they are responsive and helpful. We really feel like IBM is working with us to make sure every client is fully satisfied, and that makes it a great partnership!

About 2Bsecure

With 250 employees, 2Bsecure is one of the leading cybersecurity specialists in Israel, uniquely offering services across all three pillars of cybersecurity: professional services, consulting and 24/7 managed security services. 2Bsecure is a subsidiary of the Matrix Group, the largest IT company in Israel, employing more than 12,000 people in Israel and globally.

Explore IBM Partner Plus today

Was this article helpful?

YesNo

Chief Operating Officer (COO), 2Bsecure

Related articles

How Crypto Audits Prevent Fraud and Financial Risk?

How Crypto Audits Prevent Fraud and Financial Risk?

May 3, 2026
Top Crypto Compliance Frameworks Worldwide

Top Crypto Compliance Frameworks Worldwide

April 29, 2026



Source link

Share76Tweet47

Related Posts

How Crypto Audits Prevent Fraud and Financial Risk?

How Crypto Audits Prevent Fraud and Financial Risk?

by Moussa
May 3, 2026
0

Cryptocurrencies have become an integral component of global finance and shattered all assumptions about their potential. You will find many...

Top Crypto Compliance Frameworks Worldwide

Top Crypto Compliance Frameworks Worldwide

by Moussa
April 29, 2026
0

Cryptocurrencies have emerged as a prominent innovation in the domain of digital finance in the last few years. You may...

AML & KYC Requirements for Digital Assets Explained

AML & KYC Requirements for Digital Assets Explained

by Moussa
April 25, 2026
0

The digital asset ecosystem is evolving beyond cryptocurrencies with the addition of new digital assets. You can find enterprises discussing...

Success Story: Douglas Vernon’s Learning Journey with 101 Blockchains

Success Story: Douglas Vernon’s Learning Journey with 101 Blockchains

by Moussa
April 21, 2026
0

About Douglas Vernon Full Name: Douglas Vernon Designation: AVP, Engineering Information Security Manager, with extensive experience across organizations, including BNY...

How to Become a Digital Assets Compliance Expert?

How to Become a Digital Assets Compliance Expert?

by Moussa
April 17, 2026
0

The evolution of the digital asset landscape has called for attention towards effective ways to achieve compliance. It is time...

Load More

youssufi.com

sephina.com

[vc_row full_width="stretch_row" parallax="content-moving" vc_row_background="" background_repeat="no-repeat" background_position="center center" footer_scheme="dark" css=".vc_custom_1517813231908{padding-top: 60px !important;padding-bottom: 30px !important;background-color: #191818 !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}" footer_widget_title_color="#fcbf46" footer_button_bg="#fcb11e"][vc_column width="1/4"]

We bring you the latest in Crypto News

[/vc_column][vc_column width="1/4"][vc_wp_categories]
[/vc_column][vc_column width="1/4"][vc_wp_tagcloud taxonomy="post_tag"][/vc_column][vc_column width="1/4"]

Newsletter

[vc_raw_html]JTNDcCUzRSUzQ2RpdiUyMGNsYXNzJTNEJTIydG5wJTIwdG5wLXN1YnNjcmlwdGlvbiUyMiUzRSUwQSUzQ2Zvcm0lMjBtZXRob2QlM0QlMjJwb3N0JTIyJTIwYWN0aW9uJTNEJTIyaHR0cHMlM0ElMkYlMkZhcHByb3gub3JnJTJGJTNGbmElM0RzJTIyJTNFJTBBJTBBJTNDaW5wdXQlMjB0eXBlJTNEJTIyaGlkZGVuJTIyJTIwbmFtZSUzRCUyMm5sYW5nJTIyJTIwdmFsdWUlM0QlMjIlMjIlM0UlM0NkaXYlMjBjbGFzcyUzRCUyMnRucC1maWVsZCUyMHRucC1maWVsZC1maXJzdG5hbWUlMjIlM0UlM0NsYWJlbCUyMGZvciUzRCUyMnRucC0xJTIyJTNFRmlyc3QlMjBuYW1lJTIwb3IlMjBmdWxsJTIwbmFtZSUzQyUyRmxhYmVsJTNFJTBBJTNDaW5wdXQlMjBjbGFzcyUzRCUyMnRucC1uYW1lJTIyJTIwdHlwZSUzRCUyMnRleHQlMjIlMjBuYW1lJTNEJTIybm4lMjIlMjBpZCUzRCUyMnRucC0xJTIyJTIwdmFsdWUlM0QlMjIlMjIlM0UlM0MlMkZkaXYlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMnRucC1maWVsZCUyMHRucC1maWVsZC1lbWFpbCUyMiUzRSUzQ2xhYmVsJTIwZm9yJTNEJTIydG5wLTIlMjIlM0VFbWFpbCUzQyUyRmxhYmVsJTNFJTBBJTNDaW5wdXQlMjBjbGFzcyUzRCUyMnRucC1lbWFpbCUyMiUyMHR5cGUlM0QlMjJlbWFpbCUyMiUyMG5hbWUlM0QlMjJuZSUyMiUyMGlkJTNEJTIydG5wLTIlMjIlMjB2YWx1ZSUzRCUyMiUyMiUyMHJlcXVpcmVkJTNFJTNDJTJGZGl2JTNFJTBBJTNDZGl2JTIwY2xhc3MlM0QlMjJ0bnAtZmllbGQlMjB0bnAtcHJpdmFjeS1maWVsZCUyMiUzRSUzQ2xhYmVsJTNFJTNDaW5wdXQlMjB0eXBlJTNEJTIyY2hlY2tib3glMjIlMjBuYW1lJTNEJTIybnklMjIlMjByZXF1aXJlZCUyMGNsYXNzJTNEJTIydG5wLXByaXZhY3klMjIlM0UlQzIlQTBCeSUyMGNvbnRpbnVpbmclMkMlMjB5b3UlMjBhY2NlcHQlMjB0aGUlMjBwcml2YWN5JTIwcG9saWN5JTNDJTJGbGFiZWwlM0UlM0MlMkZkaXYlM0UlM0NkaXYlMjBjbGFzcyUzRCUyMnRucC1maWVsZCUyMHRucC1maWVsZC1idXR0b24lMjIlM0UlM0NpbnB1dCUyMGNsYXNzJTNEJTIydG5wLXN1Ym1pdCUyMiUyMHR5cGUlM0QlMjJzdWJtaXQlMjIlMjB2YWx1ZSUzRCUyMlN1YnNjcmliZSUyMiUyMCUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmZvcm0lM0UlMEElM0MlMkZkaXYlM0UlM0NiciUyRiUzRSUzQyUyRnAlM0U=[/vc_raw_html][/vc_column][/vc_row]
No Result
View All Result
  • Contact Us
  • Homepages
  • Business
  • Guide

© 2024 APPROX FOUNDATION - The Crypto Currency News