ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Build business applications using new tools & platforms
The leading solution for COBOL application modernization
Modernize mainframe applications for the Cloud
Modernize host application access
Discover the future of CORBA
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Build secure software fast
Augment human intelligence
Discover, analyze, and protect sensitive data
Drive IT ecosystem with identity-centric expertise
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Get fast, accurate detection of threats
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Manage IT & non-IT services with automation and AI
Discover, monitor, and remediate with AIOps
Monitor and optimize complex networks
Discover, manage, and map configurations & assets
Accelerate provisioning with governance in place
Automate and orchestrate processes end to end
Manage IT & software assets for better compliance
Automate server provisioning, patching, and compliance
Automate screen-based human actions with robots
All Micro Focus learning in one place
Build the skills to succeed
Streamline software delivery for faster value
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Modernize Core Business Systems to Drive Business Transformation
Build business applications using new tools & platforms
The leading solution for COBOL application modernization
Modernize mainframe applications for the Cloud
Modernize host application access
Discover the future of CORBA
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
Security at the core to everything you do; Operations, Applications, Identity and Data
Build secure software fast
Augment human intelligence
Discover, analyze, and protect sensitive data
Drive IT ecosystem with identity-centric expertise
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Get fast, accurate detection of threats
Access all products in CyberRes
Trusted, proven legal, compliance and privacy solutions
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Simplify Your IT Transformation
Manage IT & non-IT services with automation and AI
Discover, monitor, and remediate with AIOps
Monitor and optimize complex networks
Discover, manage, and map configurations & assets
Accelerate provisioning with governance in place
Automate and orchestrate processes end to end
Manage IT & software assets for better compliance
Automate server provisioning, patching, and compliance
Automate screen-based human actions with robots
Access all products in IT Operations Management
Give your team the power to make your business perform to its fullest
The University needed a powerful set of tools for managing identities across multiple directories.
As the first new sporting event the International Olympic Committee (IOC) had introduced since the 1924 Winter Olympics, the 2010 Youth Olympic Games was a highly anticipated event on the international sporting calendar. Its success depended on key IT systems, such as results processing, broadcaster data feeds, accreditations, Games logistics applications and public websites.
Atos Origin, under the direction of SYOCOG Technology, needed to ensure that comprehensive security monitoring and protection was in place for the more than 3,000 devices in the Youth Olympic Games infrastructure – including servers, workstations, network devices and appliances.
In the event of a security breach, Atos Origin knew its Incident Management team would be working under severe time restrictions. “During the two-week games operations phase, we knew we would only have a few seconds for detection and action,” said Vladan Todorovic, Atos Origin’s technical and IT security manager for the Youth Olympic Games. The team needed the ability to monitor the IT infrastructure with heightened visibility so it could quickly resolve security issues.
As the worldwide IT partner for the Olympic Games, Atos Origin is responsible for designing, building and operating the Olympic Games IT infrastructure, which includes key systems that are critical to the success of Olympic events.
Vladan Todorovic – TECHNICAL AND IT SECURITY MANAGER
Atos Origin
“The short operational period of the project, as well as its far-reaching security implications, meant that we had very specific requirements for our security information and event management (SIEM) solution,” said Todorovic. “The solution needed to be able to process events processing on a massive scale, take feeds from a number of custom data sources, and integrate with real-time, risk-based event prioritization technology from Atos Origin.”
Atos Origin and SYOCOG Technology evaluated several possible solutions and ultimately decided to implement Sentinel Enterprise. “The Youth Olympic Games is a demanding project from an IT-security perspective,” said Todorovic. “Sentinel was the only solution which fully met our requirements. In addition, Sentinel was highly scalable and allowed our architects to fully optimize the solution to our specific project requirements.”
Sentinel Enterprise, “allowed for the tracking in real time of any anomalous configuration changes which did not coincide with IT policy,” said Todorovic. “Any irregular configuration which might constitute a security violation became a SIEM event and was given a priority status corresponding to its risk level. Sentinel allowed us to aggregate and display data from thousands of events and draw correlations between them.”
Atos Origin’s longstanding partnership with the IOC had given it extensive experience that enabled it to rapidly design and implement advanced functionalities in Sentinel Enterprise.
“The simple but powerful tools provided by Sentinel enabled us to aggregate data from an enormous variety of IT systems,” said Todorovic. “These included servers running multiple operating systems, network devices, security devices, business applications and our own custom-developed ‘real-time risk audit’ solution.”
With Sentinel Enterprise as the event’s SIEM heart, Atos Origin ensured systems performed smoothly and securely.
“During the operational period of the Games, there were more than 90 million security events,” said Todorovic. “Using intelligent processing in our SIEM, this was reduced to only three million events for review, which were prioritized according to the level of business risk they posed. This saved a lot of valuable time for the Incident Management team.”
Sentinel Enterprise and the Atos Origin real time audit solution delivered rapid, intelligent responses to potential security threats. “Even though we were experiencing up to 35 serious security incidents a day, Sentinel allowed us to achieve early detection and fast resolution, ensuring that these incidents had no impact whatsoever on the running of the Games,” said Todorovic.
Vladan Todorovic – TECHNICAL AND IT SECURITY MANAGER
Atos Origin