Get in Touch Close Menu

CASE STUDY: SAPPHIRE UTILITY SOLUTIONS

9 January 2023

Introduction

Sapphire Utility Solutions (no relation to Sapphire Technologies Ltd) are a trusted name in the utility, transport, and highways sectors, known for delivering innovative solutions to the clean water, manufacturing, petrochemical, construction and highway industries.

Like all organisations, Sapphire Utility Solutions (SUS) is a target for cybercriminals. This is only exasperated by its rapid growth.

Whilst having extensive security experience within the team, SUS wanted to enhance its cybersecurity capabilities and provide the best resources for its team to take advantage of, so it decided to outsource its cybersecurity via Sapphire’s Managed Security service.

Managed Security Services process

MSSP Selection Process

SUS’s essential requirement was to ensure they received an “eyes on” managed service that picked up anything their IT team had missed. “We needed a service where we received credible alerts to react effectively. Our team did not want to be drowning in alerts,” said Mo.

For Mo, this meant looking for a provider with experience. “The managed security service had to demonstrate a best-in-class security toolkit, extensive security experience and a broad client base to map trends.

Communication is also important, and a personal touch is critical to a successful partnership between businesses. After reviewing multiple service providers, we found that Sapphire exceeded these requirements.”

The SUS team visited the Sapphire Security Operations Centre (SOC)/team with Ryan impressed with what he saw. “It was insightful to see how the Sapphire SOC combines people, processes, and technology to increase an organisation’s levels of cybersecurity.”

Working with Sapphire

Working with Sapphire

During the onboarding process, Ryan found Sapphire’s experience valuable. “What’s impressed me is how Sapphire has worked around the Microsoft cloud service changes. The SOC team are not only knowledgeable and helpful but also adaptable.”

“We’re months into the Managed SIEM service, and through an initial deep dive followed by fortnightly reviews, we’re delighted by the reassurance this offers”, said Mo.

Impact of Sapphire’s Managed Security Services

24x7x365 Service

SUS receives 24x7x365 threat monitoring, logging, analysis, notification, and threat hunting via Sapphire’s dedicated UK-based Security Operations Centre (SOC). The organisation’s security posture is more robust and can now respond effectively to cyber threats.

Reporting

The Sapphire SOC provides SUS with reporting bespoke to their IT team and board. The SUS IT team can justify their investment in a managed service to the board via the service breakdown. SUS also receive reports on actions taking place with analysis by Sapphire on how their IT team can remediate malicious activity.

Increased monitoring and logging

The Managed SIEM service has increased the level of monitoring and logging at SUS. Sapphire collects and processes data, including all devices and systems, providing a centralised view of all security events.

Mitigating Cyber Risk for Organisations

Sapphire has over 25 years of experience mitigating cyber risk for organisations across the UK.

Our clients have access to the best possible people, processes and technology, all continually augmented to match a highly fluid threat landscape.

Whether it is securing physical hardware, managing cloud risk or developing a security strategy mapped to your organisation.

For all additional information or enquiries contact us today.

I agree to the terms & conditions

Related Articles

Sapphire Acquires Awen to Expand IT/OT Services Portfolio
27 September 2023

Appointment of new CEO, Ian Thomas, and acquisition signals next phase of growth for wholly UK-based Sapphire Darlington, UK – 27th September 2023 – Sapphire, the UK based pure-play cyber security solutions provider, today announced the acquisition of Awen Collective, a cyber security software company dedicated to reducing the risks of cyberattacks to Operational Technology (OT). The acquisition […]

Find Out More
Data Breach Reporting: How Quickly Should It Be Done?
20 September 2023

Organisations must protect data and respond quickly and transparently during a data breach. However, despite their relentless efforts, data breaches remain a persistent and formidable threat. But, the good thing is that data breach reporting plays a crucial role in data protection. How quickly should a data breach be reported when it occurs? A slow […]

Find Out More
Authentication vs Authorisation: Understanding the Difference
15 September 2023

In today’s digital age, where information is a valuable asset and data breaches are a constant threat, ensuring the security of systems and sensitive information is paramount. Two fundamental concepts are pivotal in safeguarding digital assets: authentication vs authorisation. While often used interchangeably, these terms have distinct roles in information security. We will delve deep […]

Find Out More