Case IBM

What does it take to move more than 38 million tons of agricultural, steel and mineral products in Brazil every year?

VLI requires 8,000 kilometers of railroad, 100 locomotives, 6,700 wagons, eight intermodal terminals, four strategically located shipping ports, 8,000 employees and 1,000 contractors.

As complex as logistics and transportation are, the challenges go far beyond simply moving products from Point A to Point B. As the owner and operator of an integrated logistics system of rails, ports and terminals, VLI must meet numerous government regulations relating to compliance, safety, security and other factors.

To comply with railway regulations established by Brazil’s national regulator for the land transportation sector, the National Land Transportation Agency (ANTT), VLI must demonstrate how it safely manages its trains and railways. Additionally, in 2014, the company was organized as a holding, a business model subject to numerous governance laws and regulations, as well as some operational and safety rules that must be followed.

We are a company with many government regulations. In Brazil, port regulations require us to have specific security-related controls and processes. In the end, regulations are related to technology, so identity management is important to me.

VLI improves user access request response times by

0 %
0 %

in 5 days to mere seconds

With IBM Security solutions, VLI minimizes malware and ransomware attack risks.

We have around 9,000 people who need access to our different systems to move the trains. Time is crucial - a new driver can't wait to unload a truck. He needs access to records on product movements and transactions

A portfolio of security solutions

VLI’s approach to choosing a provider for its identity governance and administration (IGA) initiative was a meticulous six-month process. A key factor for the project was business enablement; specifically, having the ability to provide the right users with access to the right resources at the right time. Ultimately, VLI chose IBM for its local presence and support, its range of offerings, and the cost-effectiveness of its solutions.

“We started the RFP process [solicitação de proposta] looking for many solutions,” Galvão recalls. “We created scenarios. We did benchmarks. We analyzed how the solutions integrated. And we created scorecards.”

He continues: “We decided on IBM for a combination of reasons: technology, local support and price. We validated the technical integration and that the solution works for us. We validated that IBM could meet our expectations. But it was also very important that I have support in Brazil because we need to have a relationship too. IBM paid attention to us. And the third reason was price. So we made a big investment in IBM.”

Today, VLI is the first IBM client to implement solutions across the entire IBM Security Identity and Access Management product portfolio. To help with the integration and deployment, VLI turned to IBM Business Partner Qriar, a technology company specializing in cyber security solutions. Qriar has been involved with VLI since the early stage of RFP response. He is working with the company throughout the project, from the planning and definition of the architecture to the implementation, installation, configuration and customization of IBM products according to the client’s needs and best practices.
VLI implemented the solutions in four phases. Phase 1, which began in September 2019 and ended two months later, focused on the IGA. During this period, the company deployed IBM Security Verify Governance software and the Microsoft Azure Active Directory platform. IBM software automates processes that used to be cumbersome, such as access certifications, access requests, and password management. It also provides detailed reports and recertification campaigns to ensure that users receive only the access rights they need to perform their jobs.

In Phase 2, VLI implemented three solutions from IBM’s Privileged Access Management package: IBM Security Verify Privilege Vault technologies, IBM Security Verify Privilege Manager for Client and IBM Security Verify Privilege Manager for Server. IBM Security Verify Privilege Vault software helps protect VLI’s most confidential servers by eliminating the need for shared passwords from privileged users. The session recording feature logs all actions performed on the servers, providing extensive audit trails and helping VLI to manage compliance with strict identity governance requirements.

IBM Security Verify Privilege Manager technologies help VLI minimize the risk of malware and ransomware attacks by reducing the number of non-administrative users who have administrative privileges on terminals. VLI can also configure lists of trusted and untrusted applications and commands and customize elevation policies.

From trucks to trains, gains throughout the company

By implementing IBM Security solutions, VLI has seen benefits from the loading docks to the bottom line.

The software automates processes that used to be laborious, such as access certifications, access requests and password management. In the past, these activities could take up to five days, causing delays and frustration for workers. Access requests are now granted automatically after approval by a manager, or 99% faster than before.

“We have 8,000 employees and around 1,000 contractors and customers,” explains Galvão, “so around 9,000 people who need access to our different systems to move the trains. It’s crucial for time – a new driver can’t wait to unload a truck. He needs access to records about product movements and transactions.”

By eliminating the delays and frustrations associated with accessing the system, employee satisfaction and productivity have improved. “We measure our performance according to the total weight of the cargo we handle on the railroad,” says Galvão. “In April 2020, we reached the highest number in the company’s history.”

IBM’s solutions are also helping to minimize the risks related to cyber threats and access to the system by unauthorized people. Galvão concludes: “A key point is the risk and prevention of attacks. Previously, users who left the company could still be activated in the system. It was because we had no standards. Maybe we had external people using our systems and we didn’t know who.

“Now I have controls. Now we’re investing in identity solutions and increasing the number of integrations.”

Agendar demonstração gratuita

Preencha os campos e nossa equipe entrará em contato para agendarmos sua demonstração gratuita.

telefone

+55 (11) 2386-7515

e-mail

comercial@qriar.com

telefone

+55 (11) 2386-7515

e-mail

comercial@qriar.com

Schedule a free demo

Fill in the fields and our team will contact you to arrange your free demonstration.

telephone

+55 (11) 2386-7515

e-mail

comercial@qriar.com

telephone

+55 (11) 2386-7515

e-mail

comercial@qriar.com

Do you have any questions?
We can help you
through our channels.

Do you have questions or need to report a problem with a product or service? We can help.

telephone

+55 (11) 2386-7515

e-mail

comercial@qriar.com

telephone

+55 (11) 2386-7515

e-mail

comercial@qriar.com