Case Studies.

Add Case Study

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 731 Suppliers
Selected Filters
19,090 case studies
Sort by:
Tecnun Enhances Digital Campus Security with Check Point Next Generation Threat Prevention -  Industrial IoT Case Study
Tecnun Enhances Digital Campus Security with Check Point Next Generation Threat Prevention
Tecnun, the School of Engineering in San Sebastián, part of the University of Navarre, was facing a significant challenge in securing its digital campus. The transition to a digital university, the rise of social networks, increased voice and video traffic, and the migration of applications and services to the cloud were pushing the network infrastructure to its limits. The university was being targeted by numerous attacks of all kinds, and the existing solutions from different vendors only provided partial coverage. The security management had become highly complex, with a requirement to simultaneously manage and monitor various sites. The university lacked the capacity to correlate or analyze all the information generated by the various protection systems in place.
Download PDF
Real-Time Threat Blocking for Public Sector Organization: A Case Study of Conseil Départemental du Val de Marne -  Industrial IoT Case Study
Real-Time Threat Blocking for Public Sector Organization: A Case Study of Conseil Départemental du Val de Marne
The Conseil Départemental du Val de Marne, a public sector organization managing the economic and social activity of 1.4 million inhabitants, was facing a significant challenge. Their computers, including those in the IT Department, were experiencing regular cyber attacks. These attacks were primarily caused by suspicious email attachments containing either known or new malicious code. Despite having antivirus programs installed, the malware was so sophisticated that it could evade detection. The IT team was tasked with finding a solution to this growing problem to ensure a secure working environment. The organization needed to protect itself against advanced threats and block all malware in real time, and manage the entire environment from a single console.
Download PDF
Enhancing Security in Biotechnology: Gnosis SpA's Journey with Check Point Security Solutions -  Industrial IoT Case Study
Enhancing Security in Biotechnology: Gnosis SpA's Journey with Check Point Security Solutions
Gnosis SpA, an Italian biotechnology company, was facing a growing security challenge due to its rapid expansion. The company's increased attack surface was becoming more susceptible to zero-day and other advanced threats. As a pharmaceutical company, Gnosis had to comply with strict government security regulations, which were increasingly focusing on system security in facilities such as laboratories and manufacturing facilities. However, Gnosis' legacy systems were not equipped to prevent advanced threats from gaining access. The company needed a more efficient, consolidated security solution that could protect its network, data, and communications between its headquarters and other sites. It was looking for a next-generation solution to protect against advanced threats targeting employees, visitors, suppliers, websites, and outgoing communications like email.
Download PDF
Fondazione Telethon Bolsters Security with Check Point Next Generation Threat Prevention -  Industrial IoT Case Study
Fondazione Telethon Bolsters Security with Check Point Next Generation Threat Prevention
Fondazione Telethon, a medical nonprofit organization based in Italy, was facing significant security challenges. The organization, which fosters research for rare genetic diseases, handles a large amount of sensitive, high-quality research and medical data. The security of this data was critical, not only for information safety and business continuity but also for maintaining the organization's stellar reputation. Any security breach could potentially cause irreparable damage to its future fundraising campaigns and limit its ability to support research. The escalating cyber threats were exposing Telethon to significant risk. The organization needed a threat protection solution that could secure its network at the edge and provide email protection, as email is a primary attack vector. Telethon also sought better insight into cyber threats to analyze attacks, infections, and impact, and wanted to improve visibility and incident analysis capabilities.
Download PDF
Ultima Enhances Mobile Security with Check Point Capsule Cloud -  Industrial IoT Case Study
Ultima Enhances Mobile Security with Check Point Capsule Cloud
Ultima Business Solutions, a UK-based IT services provider, faced a significant challenge in protecting its employee laptops from zero-day malware and suspicious sites and applications when used outside the company's security perimeter. The company had a 'cloud-first' secure cloud migration program, but lacked comprehensive visibility into threats on laptops used outside the perimeter. The challenge was further compounded when employees were in the field, as the security team had no visibility into these devices. Moreover, users were often unaware if their devices were under attack, as there were few obvious symptoms.
Download PDF
Australian Non-Profit Enhances Security with Check Point vSEC for Azure -  Industrial IoT Case Study
Australian Non-Profit Enhances Security with Check Point vSEC for Azure
The Australian non-profit community service organization, with over 3,500 staff members, was faced with the challenge of securely moving their mission-critical applications and sensitive CRM data to the cloud. They chose Microsoft Azure for its cloud computing infrastructure but needed a robust security solution that offered intelligence, simplicity, and manageability. The traditional approach of the Microsoft cloud using built-in controls of port groups and static firewall rules was not sustainable for the small IT team. The organization also required a solution that could scale with cost-effectiveness. The challenge was to find a security solution that could be integrated with Azure, as many firewall vendors either didn’t have offerings for Azure, couldn’t provide supporting information about integration, or lacked experience in the security industry.
Download PDF
Daymark Solutions Enhances Security with Check Point vSEC for Microsoft Azure Cloud -  Industrial IoT Case Study
Daymark Solutions Enhances Security with Check Point vSEC for Microsoft Azure Cloud
Daymark Solutions, a company that designs and implements data center infrastructure, data protection, cloud services and managed services, was faced with the challenge of preventing cyberthreats, malware and ransomware from penetrating their hybrid cloud environment. They needed a powerful next-generation firewall with advanced threat prevention capabilities and deeper visibility into threats and firewall activity inside the cloud. As their customers began migrating workloads to the cloud, Daymark needed to ensure the security of these applications and workloads. They chose Microsoft Azure as their cloud delivery platform and began moving core assets into it. However, they needed to protect their intellectual property and their customers' cloud data. They also needed better visibility into the Azure environment for troubleshooting, forensics and reporting purposes.
Download PDF
Koch Media Enhances Security with Check Point SandBlast to Safeguard Intellectual Property -  Industrial IoT Case Study
Koch Media Enhances Security with Check Point SandBlast to Safeguard Intellectual Property
Koch Media, a leading independent producer and marketer of digital entertainment products, faced significant challenges in securing its applications and intellectual property, including game code, across its 25 locations. Each location had its own security rules and policies, making the task even more complex. The company was using Cisco Adaptive Security Appliances (ASA) in each location, which required manual reconfiguration for any firewall rule change. This process was not only time-consuming but also prone to human error. Moreover, the company was dealing with a growing amount of malware that its antivirus was unable to detect. Another major concern was the safe sharing of large files, as securing ports or IP addresses was no longer sufficient. The company needed a solution that could secure the application layer, especially for assets like game code.
Download PDF
Health Care Insurance Company Enhances Security with Check Point SandBlast -  Industrial IoT Case Study
Health Care Insurance Company Enhances Security with Check Point SandBlast
The health insurance company, a large U.S. carrier, was facing a growing number of cyber-attacks, putting patient care data and financial data at risk. The company had multiple point solutions, each with its own set of capabilities, and wanted to add layers of security and new features to close some gaps, such as improving Data Loss Prevention (DLP) coverage. The company had multiple, separate firewalls for web filtering, content filtering, and Intrusion Prevention System (IPS) protection. As the CISO and his team evaluated their options, they looked at Palo Alto Networks, F5, FireEye, and several niche solutions. However, none of them offered the unique combination of comprehensive features, high scalability, centralized threat visibility, and low IT overhead that they wanted.
Download PDF
Regional Hospital Enhances Data Security and Compliance with SandBlast Threat Emulation Service -  Industrial IoT Case Study
Regional Hospital Enhances Data Security and Compliance with SandBlast Threat Emulation Service
The award-winning hospital, one of the premier healthcare providers in the Northeastern U.S., faced a significant challenge in maintaining the security of its critical healthcare operations and data. The hospital had to meet stringent government healthcare regulatory requirements, including the Health Insurance Portability and Accountability Act (HIPAA). The hospital's network, which supports its most important patient services and business operations, was used by approximately 1,200 users. The IT team was aware of the evolving security landscape, with zero-day malware emerging as a major threat. The stakes were high, as even a brief security lapse could compromise business systems or impact healthcare services. The team also recognized the need to protect the network from threats originating inside the hospital.
Download PDF
Dutch Water Resource Board Enhances Network Security and SCADA Systems with Check Point Solutions -  Industrial IoT Case Study
Dutch Water Resource Board Enhances Network Security and SCADA Systems with Check Point Solutions
The Hunze en Aa Water Resource Board, responsible for managing water throughout eastern Groningen, the Netherlands, faced a significant challenge in maintaining the security and reliability of its Supervisory Control and Data Acquisition (SCADA) systems. The board's primary responsibility is to ensure that communities in eastern Groningen and northeastern Drenthe have access to sufficient, clean water. However, the area's geographical location, much of which is below sea level, makes it particularly vulnerable to flooding. Therefore, any network downtime could jeopardize the safety and lives of people throughout the region. The board needed a reliable solution that provided complete control and minimized risks in its SCADA environment. The existing security tools, which were eight years old and mixed, needed to be replaced with a central, manageable solution. Additionally, the board sought to improve compliance with guidelines from the Baseline Information Security Water Board (BIWA), which has established recommendations to secure utilities’ physical environments and digital information.
Download PDF
SE2 Enhances Data Security with Check Point SandBlast -  Industrial IoT Case Study
SE2 Enhances Data Security with Check Point SandBlast
SE2, a third-party administration services provider to major insurance carriers globally, faced a significant challenge in protecting its clients' highly sensitive financial data from being leaked, exfiltrated, or held for ransom. The company was also tasked with proactively preventing unknown malware and zero-day threats. The task of keeping up with new threats was a constant challenge, consuming a significant portion of the security team’s time. They monitored logs, reviewed events, and simultaneously tried to advance new security projects. However, their efforts seemed insufficient. The existing sandboxing solution took up to 10 minutes to alert the team after malware hit a workstation, which was too late to stop, resulting in additional effort to remediate any impact.
Download PDF
Community Newspaper Group Enhances Security with Check Point SandBlast Agent -  Industrial IoT Case Study
Community Newspaper Group Enhances Security with Check Point SandBlast Agent
Community Newspaper Group (CNG), a provider of local news throughout Western Australia, was facing challenges in securing their digital assets and end-user systems. With over 700,000 readers relying on their daily content, any downtime affecting the network or employees could lead to lost revenue and dissatisfied clients. The existing security solutions from Trend Micro and Microsoft were aging and lacked the visibility into threats that the IT team needed. The team had to navigate multiple dashboards to gather data from various areas of the network and piece together a picture of what was happening. The challenge was to find a solution that could provide better visibility and actionable data for fighting advanced threats on laptops and desktops, minimize security impact on users, and simplify and centralize threat monitoring, management, and reporting.
Download PDF
Enhancing Mobile Security and IT Productivity: A Case Study on Terma -  Industrial IoT Case Study
Enhancing Mobile Security and IT Productivity: A Case Study on Terma
Terma, a global defense and aerospace contractor based in Denmark, faced a significant challenge in securing mobile connections to internal corporate information. The company's employees routinely work with highly confidential information, and the company must meet specific security requirements before collaborating on projects. As mobile devices became essential to employees, Terma needed to ensure that these devices and remote connections to corporate assets were as secure as desktop systems and connections. The company had implemented multiple layers of security, such as firewalls, filters, encryption, and others, to protect devices and information in all its product areas. However, when it came to securing mobile access to data for its 600 mobile users, Terma needed a robust solution.
Download PDF
Optix Enhances Client Data Security and Gains Visibility with Check Point Small Business Appliances -  Industrial IoT Case Study
Optix Enhances Client Data Security and Gains Visibility with Check Point Small Business Appliances
Optix, a leading provider of practice management software for optical professionals in the U.K., faced the challenge of ensuring stronger protection for client business data and secure VPN connections for each client. The company needed to simplify the management of hundreds of connected appliances. As healthcare providers, opticians treat patients and have the same requirements for managing patient, scheduling, and clinical data as other healthcare providers. Ensuring patient privacy and meeting other compliance regulations are critical. More than 800 opticians in the U.K. turn to Optix solutions to gain high-quality practice management tools without the worries of having to deploy, manage, upgrade, or support IT equipment and applications themselves. However, the Secure Socket Layer (SSL) protocol that Optix used to protect connections was no longer sufficient to secure patient, clinical, confidential business, and payment information.
Download PDF
Samsung Research America Enhances Mobile Security with Check Point -  Industrial IoT Case Study
Samsung Research America Enhances Mobile Security with Check Point
Samsung Research America, a subsidiary of Samsung Electronics Company, is tasked with researching and developing new core technologies to enhance the competitive edge of Samsung products. The organization deals with a vast portfolio of patented intellectual property and confidential product plans. With employees increasingly working on smartphones, tablets, and their own devices, the IT team had to support approximately 800 corporate-owned and 400 employee-owned devices. The challenge was to prevent data leaks from mobile users and defend against cybercriminals trying to break in from the outside via phishing emails and other tactics. The organization needed a solution that would prevent compromised devices from accessing the network or enterprise data, defend clean devices on the network, and protect both iOS and Android mobile devices with a single solution. The solution also needed to integrate with Samsung’s existing AirWatch by VMWare mobile device management (MDM) and Splunk security information and event management (SIEM) platforms.
Download PDF
Enhancing Endpoint Security for a U.S. State Agency with Check Point Solutions -  Industrial IoT Case Study
Enhancing Endpoint Security for a U.S. State Agency with Check Point Solutions
The state agency, serving all boards and agencies of its state government, was faced with the challenge of abiding by strict compliance and privacy laws. The agency needed to ensure optimal data protection and was looking for a solution that could consolidate technologies including encryption, firewall, and anti-malware. They also required simplified central management and reporting, reduced costs associated with a multi-vendor deployment, and increased protection through user education. The selection criteria for the solution included comprehensive coverage, enhanced support, a common management console with a single interface, policy-based controls, a small footprint, and cost-effectiveness.
Download PDF
Enhancing Network Security and Efficiency with Check Point DDoS Protector Appliances -  Industrial IoT Case Study
Enhancing Network Security and Efficiency with Check Point DDoS Protector Appliances
A major enterprise software developer, with nearly 3000 employees and dozens of sites worldwide, was facing significant challenges in safeguarding its data center from Distributed Denial of Service (DDoS) attacks and other network threats. The company's existing security appliance was aging and could not provide the level of security and manageability required to maintain internal security requirements. The company needed a solution that could block current and emerging attacks with customized protection, minimize manual IT processes for efficiency, and improve IT visibility throughout the network. The fluctuating incoming traffic from its Internet content delivery network often led to legitimate traffic being dropped due to the lack of intelligence in the existing security system.
Download PDF
Banco del Pacifico Enhances Cybersecurity with Check Point Solutions -  Industrial IoT Case Study
Banco del Pacifico Enhances Cybersecurity with Check Point Solutions
Banco del Pacifico, the second largest bank in Ecuador, was facing an escalating scale and growing sophistication of cybercrime. The bank was witnessing a significant increase in the volume and complexity of cyberattacks, some of which were designed to disrupt day-to-day banking activities, while others were aimed at financial gain. The bank needed to improve the efficiency, visibility, and control of its in-house security resources to protect its assets and customers' money from thefts. The challenge was to defend against these advanced threats and safeguard the bank's deposits and other assets from cybercriminals.
Download PDF
Cadence Leverages CloudGuard Dome9 for Enhanced Security in Multi-Cloud Environment -  Industrial IoT Case Study
Cadence Leverages CloudGuard Dome9 for Enhanced Security in Multi-Cloud Environment
Cadence Design Systems, Inc., a global technology company, was initially running its own datacenters which were sufficient for their computing needs. However, as the company expanded, it outgrew the computing capacity of its on-premise system. Cadence needed a system that offered scalability, elasticity, and securely enabled cloud demand. The company turned to Amazon Web Services (AWS) for help, but this move presented a new set of challenges. Cadence's AWS footprint covered more than 1,000 instances, 770 security groups, and 115 Amazon VPCs, with more than 4,000 different network security policies and rules. This left the company with the challenge of securing a very dynamic cloud environment. Additionally, Cadence also had Azure and Google Cloud Platform (GCP) in their multicloud environment. The company faced challenges in network security, compliance, and visibility in the multi-cloud environment. They needed a solution that would be compatible and effective across all major public cloud infrastructures.
Download PDF
Nihondentsu's Secure Mobile Workplace: Driving Business Growth with Check Point Next Generation Firewalls -  Industrial IoT Case Study
Nihondentsu's Secure Mobile Workplace: Driving Business Growth with Check Point Next Generation Firewalls
Nihondentsu, an ICT consultancy based in Japan, faced a significant challenge in accommodating its rapid growth in network traffic. The company needed to deploy a new solution that would not impact its day-to-day operations and simplify ongoing security management. A critical aspect of this challenge was establishing a seamless link between its 18 offices across Japan. The company aimed to enable all staff to access the latest corporate and customer data securely. However, the VPN solution installed across all branches in 2000 had become unstable and insufficient. As communications across the business increased, the VPNs were unable to cope with higher levels of traffic. The system was complex to manage and difficult to maintain.
Download PDF
DataStream Connexion: Building Secure Federal and Healthcare Applications with CloudGuard Dome9 -  Industrial IoT Case Study
DataStream Connexion: Building Secure Federal and Healthcare Applications with CloudGuard Dome9
DataStream Connexion, a technology consulting and web application development agency, faced several challenges in managing the security and compliance of their cloud-based applications. They had to manage tens of Virtual Private Clouds (VPCs) and security groups, creating an elastic cloud environment with hundreds of inbound and outbound rules. They also had to provide access to various resources for development and specific environments for production, while enforcing strict segregation according to predefined user roles. Furthermore, they had to allow their team self-servicing and flexibility, which meant allowing individuals remote access to their cloud environment at any time. Lastly, they had to implement end-to-end compliance management, which was especially complex given their customer base of federal agencies and healthcare organizations that had to adhere to standards such as FedRAMP, NIST, and HIPAA.
Download PDF
Preventing Downtime in Media Industry: A Case Study of ProSiebenSat.1 Media SE -  Industrial IoT Case Study
Preventing Downtime in Media Industry: A Case Study of ProSiebenSat.1 Media SE
ProSiebenSat.1 Media SE, a leading German entertainment player with a strong e-commerce business, faced a challenge of accommodating rapid growth in network traffic. The company needed to segment different network users and simplify security management. The digital competition had changed the way viewers consume content, leading to a continuous state of service delivery. The company had to constantly engage with viewers across multiple platforms and offer entertainment across any device. Seven years ago, ProSiebenSat.1 brought its security management in-house with the primary objective to protect media files and customer data when moving between sites. The business also wanted greater responsiveness around security and to build its corporate knowledge of security threats and solutions.
Download PDF
Good Sam Enhances Security Infrastructure with Check Point Solution -  Industrial IoT Case Study
Good Sam Enhances Security Infrastructure with Check Point Solution
Good Sam, the world's largest organization of recreational vehicle owners and outdoor enthusiasts, faced a significant challenge in managing its cybersecurity posture. With the company's rapid growth and numerous acquisitions, the cyber threats facing the organization increased substantially. However, their cyber protection infrastructure, which originally included McAfee Sidewinder firewalls and Cisco ASA devices, was not keeping pace. The existing security systems lacked the ability to provide visibility into advanced threats attacking the business. Good Sam had no way of knowing what threats were lurking in its infrastructure or targeting its end users. This lack of insight into potential threats posed a significant risk to the company's security, prompting the management to decide on a significant upgrade of its security posture.
Download PDF
Omnyway's Secure DevOps for Retail Mobile Platform with CloudGuard Dome9 -  Industrial IoT Case Study
Omnyway's Secure DevOps for Retail Mobile Platform with CloudGuard Dome9
Omnyway, a mobile shopping and payment platform provider, faced several challenges in managing its AWS cloud environment. The environment consisted of 2 regions, 4 accounts, and 20 VPCs supporting different applications, with applications spread across all accounts. The VPCs were designed to isolate specific information that did not need to be shared. All applications were replicated in the second region for resiliency and redundancy. However, as the platform scaled, the security groups became complicated, making it hard to track workflow and locate misconfigurations. Omnyway needed clear visibility into its security infrastructure. Another challenge was providing secure access for agile DevOps. Omnyway was providing developers access to their production environment through their bastion host, which was consistently experiencing brute force attacks. Lastly, Omnyway needed to enforce continuous compliance and security best practices to meet PCI certification guidelines and secure their environment.
Download PDF
FIASA Enhances Data Security with Check Point's Advanced Solutions -  Industrial IoT Case Study
FIASA Enhances Data Security with Check Point's Advanced Solutions
FIASA, an in-house business consultancy for companies associated with the Parma Industrial Union, faced a significant challenge in protecting its customers’ sensitive personal data and its own corporate data from cyber-attacks. The company had to adhere to strict GDPR regulations regarding the storage of customer data. Additionally, FIASA needed to support mobile working while simplifying security management. The introduction of GDPR and an evolving threat landscape led FIASA to re-evaluate its security position. The company aimed to strengthen threat prevention for around 200 users of the FIASA network, support mobile working, and reduce the strain on in-house management and help desk support.
Download PDF
Belgian Local Authority Enhances Security with Check Point's IoT Solutions -  Industrial IoT Case Study
Belgian Local Authority Enhances Security with Check Point's IoT Solutions
Commune d’Uccle, one of the 19 communes of Brussels Capital Region, faced a significant challenge in protecting its employees' mobile devices from emerging security threats, including zero-day disruptions. The local authority, which delivers and manages a range of critical services to a population of over 80,000, needed to ensure the consistent delivery of local services while integrating with new service providers. This often required the sharing of sensitive personal data, making it an attractive target for cyber-attacks. With the organization becoming increasingly mobile and promoting remote working for 500 staff members, there was a pressing need to upgrade its cybersecurity to protect against current threats and stay ahead of future issues.
Download PDF
CloudGuard Dome9: Streamlining Security Complexity for Pacific Life in the Cloud -  Industrial IoT Case Study
CloudGuard Dome9: Streamlining Security Complexity for Pacific Life in the Cloud
Pacific Life, a Fortune 500 Company and one of the largest financial institutions in the US, began planning the migration of a portion of their workload to the public cloud in 2013. The Retirement Solutions Division at Pacific Life was tasked with this migration, led by Reza Salari, Manager of Information Security and Telemetry. The team chose Amazon Web Services (AWS) for its business differentiating value. However, the team faced challenges in managing network security, accelerating software delivery, and controlling data residency. Pacific Life’s AWS network includes over 150 security groups across seven Amazon cloud accounts in three US regions, with each varying between 5-20 security rules. The team needed to manage this growing complexity with AWS native tools as they expanded their footprint. They also needed to quickly test the security posture of software products early in the software development lifecycle (SDLC). Lastly, they had to control and prevent usage of AWS regions outside of the company’s approved US regions due to compliance and regulations.
Download PDF
Control Southern Enhances Cybersecurity with Check Point Infinity Architecture -  Industrial IoT Case Study
Control Southern Enhances Cybersecurity with Check Point Infinity Architecture
Control Southern, a trusted automation partner for process industries in the Southeastern United States, was facing a growing number of multi-vector cyber attacks targeting its network and endpoints. The company's existing firewalls were reaching end of life and the existing Sophos platform was unable to handle the increasing threats of malware, phishing, and larger-scale infections. The situation worsened when Control Southern moved to Office 365 and experienced a surge in phishing attacks on its endpoints. Ransomware gained access through malware on a web browser, infecting servers and spreading to connected client computers, encrypting gigabytes of data within minutes. The company's McAfee software on endpoints was not updating systems correctly, adding the burden of manually pushing updates to endpoints almost daily.
Download PDF
Xero's Successful Cloud Migration and Security Transformation with Check Point CloudGuard and AWS -  Industrial IoT Case Study
Xero's Successful Cloud Migration and Security Transformation with Check Point CloudGuard and AWS
In 2014, Xero, a global online platform for small businesses and their advisors, faced a challenge with its infrastructure and security. The company was managing a premises-based infrastructure that supported almost 700,000 subscribers but often found itself spending time and resources on controlling the environment, which limited the team's ability to fully support product innovation. Xero decided that only a public cloud infrastructure could provide the capabilities needed to support its next wave of growth. In addition to scaling to support millions of new customers, Xero wanted to reduce its cost of service delivery, ensure high infrastructure availability, and defend effectively against evolving cyber threats. Agility is fundamental to Xero. Hundreds of product-based teams release more than 1,200 product features and updates each year. Xero wanted to reduce the time it took to build out DevOps infrastructure from weeks, to days, to hours, to milliseconds. It also needed to support internationally recognized security standards, so the new infrastructure had to be secure by design.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.