Origina uses a layered approach to cybersecurity that melds cutting-edge technology with forward-thinking strategy to deliver comprehensive security and protection against security vulnerabilities and threats. With IBM, customers get a security patch, if they’re lucky.
Origina's layered approach to software security delivers better protection than IBM.
Origina uses a layered approach that adopts elements of the world’s leading cybersecurity frameworks to help customers protect IBM software and products divested to HCL Technologies from emerging threats. In doing so, companies avoid falling victim to a single point of failure – relying on vendor-supplied security patches that may never arrive – and implement an extensive system of checks and balances that greatly limits exposure.
What’s In Origina’s Layered
Approach to Security?
Origina’s layered approach to cybersecurity begins during onboarding with a service transition review. Each security incident is reviewed through a risk assessment to identify what the vulnerability is, if the customer is affected and how Origina can mitigate the threat.
SERVICE TRANSITION REVIEW
PRODUCT HARDENING GUIDES
Product hardening guides enable security teams to identify and treat security and compliance issues at the architectural level of the software. Implementing these controls can vastly strengthen a product’s security and will limit exposure to 85 percent of all known vulnerabilities.
Staying informed of the latest security vulnerabilities that impact a digital estate is critical to securing it. In the same way, companies are notified of application risks by the vendor, Origina’s proactive vulnerability advisories deliver timely notifications of emerging threats and actionable guidance on how to mitigate them.
ORIGINA INDEPENDENT SOLUTIONS
ORIGINA'S INDEPENDENT SOLUTIONS
Origina's Risk-Based Approach to
Whenever a security vulnerability is identified, Origina follows a four-step, risk-based approach to evaluating its threat to customers and finding the method of mitigating it.
A review and assessment of the identified vulnerability is conducted to evaluate if the customer is exposed.
The software entitlement repository is reviewed to check if an existing patch is available and was it captured during the onboarding process.
Where an existing patch is not available, our independent Global IBM Experts look to create a workaround to mitigate exposure to the vulnerability.
Where no workaround is possible, our independent Global IBM Experts will look to develop a code-based fix to mitigate the issue.