COVER story
With a rapidly expanding workforce and a cloud-first strategy, NatWest Cushon faced escalating cybersecurity challenges due to inconsistent password management practices across departments. The company turned to Keeper Security to implement a centralised, compliant and scalable solution that strengthened credential protection, improved operational efficiency and ensured regulatory alignment.
Simon Stiebel, Technology and Security Operations Director at NatWest Cushon
NATWEST CUSHON UNIFIES PASSWORD SECURITY AND IMPROVES COMPLIANCE WITH KEEPER
ith a rapidly growing team and
W multiple acquisitions, NatWest Cushon faced significant challenges in managing passwords and credential security.
Employees across different departments used a mix of different solutions, or in some cases, no password manager at all, leaving them unfamiliar with such tools. This inconsistency posed security risks, and concerns arose around securely sharing sensitive information between teams and enforcing best practices for password management across the organisation.
Moreover, the company’ s cloud-first approach required enhanced security protocols to prevent unauthorised access to critical systems. As a financial services provider handling confidential customer data, including pension and savings accounts, ensuring end-to-end security was paramount. The firm needed a solution that not only addressed password security but also provided compliance reporting and audit capabilities to meet strict regulatory requirements. Below are the key challenges that Keeper solved.
Password Management Practices – The lack of a centralised password management system led to inconsistent security practices. Employees resorted to insecure methods such as storing sensitive credentials in browser-based password managers, which made it difficult for the company to enforce password best practices and maintain data hygiene to protect critical business information.
Limited Visibility and Access Control – System administrators often struggled with limited access control capabilities, especially when decommissioning or transferring the stored
WWW. INTELLIGENTCISO. COM 51