Leading entertainment company improves security with an Enterprise Vulnerability Management program

TCS established an Enterprise Vulnerability Management Program for a leading entertainment organization which resulted in improved security position, along with significant cost savings.


"TCS developed a sophisticated risk-based model for prioritizing our vulnerability assessment process. This has allowed us to focus efforts where they have the highest payback and greatly increased the effectiveness of our vulnerability scanning and management program."

                                                                  - Senior Vice President, Information Technology 

About the Client
The company is a US-based subsidiary of a large media conglomerate. The organization's portfolio includes film, television, online, and mobile entertainment, as well as games.  

Business Challenge
The security hack resulted in the theft of millions of records, along with application breaches and compromised infrastructure. As a result, the company’s reputation was adversely impacted. The security team was under immense pressure to set safeguards in place that would protect the company from future threats. 

TCS’ Solution 
TCS conducted a root cause analysis to understand the current state of information security within the organization, identify gaps, and offer recommendations. This was followed by a comprehensive Enterprise Vulnerability Management Program. A team of security penetration testers, strategists, and consultants have been involved in end-to-end program management. The solution involved:

  • A new security model
  • Streamlined and comprehensive application scanning
  • Tool optimization
  • Reporting

The company benefitted from the implementation of enhanced security measures. Apart from 100 applications being successfully scanned within just 30 days, value additions were offered in the form of technical and process oriented solutions, resulting in the following enhancements: 

  • Quicker discovery of critical issues
  • Improved organizational security sensing
  • Quality scanning measures
  • Stringent testing and review processes
  • Cost-effective operations

Reach Us.