Case Studies.

Add Case Study

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Selected Filters
19,090 case studies
Sort by:
dormakaba provides new concept guest access solution for Oxford Hotel -  Industrial IoT Case Study
dormakaba provides new concept guest access solution for Oxford Hotel
The Museum Hotel Oxford, a luxury hotel located in a 16th Century building in the heart of Oxford, was undergoing a refurbishment. The hotel required a keyless access system that could integrate with its online reservation system, providing easy check-in and check-out for guests while maintaining high levels of security. The system also needed to be able to provide smart and secure access to the hotel rooms and common access doors. The challenge was to find a solution that could meet these requirements and integrate seamlessly with the hotel's existing systems.
Download PDF
dormakaba Marriott Hotel Belfast -  Industrial IoT Case Study
dormakaba Marriott Hotel Belfast
The new AC Hotel Belfast by Marriott, a £25 million-pound investment by owners Belfast Harbour, required high-quality access solutions for its 188 guest bedrooms. The hotel, which is among the city’s largest, needed locks that could provide enhanced security and superior guest experience. The hotel also required a pitch-free pivoting system for its toughened glass doors to ensure optimum safety by preventing the risk of trapped fingers.
Download PDF
dormakaba, hetras and Village Hotels innovative collaboration for mobile access -  Industrial IoT Case Study
dormakaba, hetras and Village Hotels innovative collaboration for mobile access
The rise of smartphones has led to a shift in consumer behavior, with users increasingly expecting to be able to perform a wide range of tasks on their mobile devices. This includes checking into hotels, a process that traditionally requires physical interaction with hotel staff. Village Hotels, a UK-based hotel chain with 28 locations, recognized the need to adapt to this changing landscape and sought a solution that would allow guests to check in using their smartphones. The challenge was to implement a system that was secure, reliable, and user-friendly, enhancing the guest experience while also streamlining operations for the hotel.
Download PDF
dormakaba high security locking solution for new electric and bi-mode Hitachi trains -  Industrial IoT Case Study
dormakaba high security locking solution for new electric and bi-mode Hitachi trains
Hitachi Rail Europe was in the process of supplying new Class 800/801 trains as part of the Intercity Express Programme. These trains, which can travel at up to 125 mph in various formations from five to ten cars, were designed to provide an efficient means for passengers to travel on electrified and non-electrified routes. They were also intended to enhance the customer experience with more modern trains, better interiors and seating arrangements, and faster journey times. However, these trains required a high-security locking solution that could meet the client's exacting specifications. The solution needed to be reliable in extreme operating conditions and secure enough to protect the trains' valuable assets.
Download PDF
Great Western on track with dormakaba -  Industrial IoT Case Study
Great Western on track with dormakaba
First Great Western operates high speed, commuter, regional and branch line train services across the former Wessex Trains, First Great Western Link and First Great Western routes. Their vision is to provide their customers and communities with travel that is safe, reliable and enjoyable. However, they faced a challenge in ensuring passenger safety when alighting the train at shorter platforms. They needed a selective opening device for their high-speed trains that would allow the Train Manager to control the automatic locking and unlocking device for the train doors.
Download PDF
Embassy Gardens -  Industrial IoT Case Study
Embassy Gardens
Embassy Gardens is the residential and commercial centrepiece of the Nine Elms area regeneration, consisting of luxury apartments on a site that will offer residents a host of one-off leisure facilities such as the Sky Pool, a transparent 25m swimming pool which will bridge two of the residential buildings, an exclusive cinema and other exclusive leisure, fitness and business facilities. The challenge was to install a system within the residential units that have their own internal winter garden, allowing residents to enjoy their outdoor space whatever the weather.
Download PDF
dormakaba standing the test of time -  Industrial IoT Case Study
dormakaba standing the test of time
The Nexus owned Tyne and Wear Metro, one of only two underground metro-type systems in the UK outside London, has been providing public transport to the people of Tyne and Wear for several decades. The Metro, which covers 60km and carries over forty million passenger journeys per year, opened in 1980 and opted for a Kaba 20 mechanical master key system for its security needs. The Metro has a varied range of locking solutions in Kaba 20 including, entrance and exit doors, perimeter fencing and track side pedestrian gates, signal points, office and high voltage access, and the train controls on the metro cars.
Download PDF
Increasing Rail Passenger Safety and Security -  Industrial IoT Case Study
Increasing Rail Passenger Safety and Security
The rail sector demands high-quality security and surveillance equipment to increase passenger safety and improve passenger satisfaction. The challenge was to find a solution that could meet the legislated environmental and power requirements, while also being enclosed in a custom thermomechanical vandal-resistant rack-mounted casing. The solution also needed to have the ability to react to alarms and triggers to increase the recorded frame rate during incidents and securely protect the recording to allow later retrieval.
Download PDF
dormakaba builds on long-term collaboration with UWE -  Industrial IoT Case Study
dormakaba builds on long-term collaboration with UWE
The University of the West of England (UWE) needed a high-security mechanical locking system for its new Faculty of Business and Law building. The new building includes two showcase law courts, a city trading room, a 300-seat lecture theatre, two Harvard lecture theatres, and technology-enhanced active learning classrooms. The university required a system that would allow quick access to all rooms to aid fast evacuation and ensure a lower number of keys in circulation. The system also needed to be flexible enough to evolve with UWE, helping to future-proof the installation.
Download PDF
dormakaba delivers a door closing solution to CBeebies Land Hotel At Alton Towers Resort -  Industrial IoT Case Study
dormakaba delivers a door closing solution to CBeebies Land Hotel At Alton Towers Resort
The newly built CBeebies Land Hotel at the Alton Towers resort in Staffordshire required door closers that would not spoil intricate vinyl leaf designs on the bedroom doors, while also ensuring compliance with both access and fire regulations. The hotel, designed by The Manser Practice, is the first hotel designed exclusively for children and young families. Each room features its own individual kids zone. The architect initially stipulated that overhead door closers were to be installed. However, due to the nature of the fully screen-printed doors, complete with images of CBeebies characters, it was decided that more discreet door closers were needed to ensure the design was not obstructed.
Download PDF
Technology Helps Albuquerque Sunport Improve Passenger Flow and Security -  Industrial IoT Case Study
Technology Helps Albuquerque Sunport Improve Passenger Flow and Security
Albuquerque International Sunport (ABQ) was facing issues with its aging, obsolete revolving exit doors which had become a security and maintenance headache. The growing needs for passenger flow required that these doors be manned 24/7. The challenge was to elevate the passenger experience by focusing on all touch points along the passenger journey, transforming the airport experience with efficient processes.
Download PDF
The Home of Stephen Winthrop & Jane Williamson -  Industrial IoT Case Study
The Home of Stephen Winthrop & Jane Williamson
Stephen Winthrop, diagnosed with ALS in November 2013, and his wife, Jane Williamson, had a new home built with technology that would maximize their home’s utility for someone with his specific form of ALS. The ALS has been advancing slowly, initially affecting his arms. It will likely spread to his legs and other parts of his body. Their house has been equipped to enable Winthrop to control certain features and appliances (e.g., thermostats, doors, lights, TV, etc.) through a computer interface. It’s also built to readily undergo modifications as Winthrop’s ALS progresses. In the future, he will be able to use his voice or eye movement alone to control features through a server that electronically connects a tablet computer with myriad electrical features throughout the home.
Download PDF
Hillwood Adds Mobile Access to Tacara Village -  Industrial IoT Case Study
Hillwood Adds Mobile Access to Tacara Village
Hillwood Development Company, based in Fort Worth, Texas, was looking to integrate modern, convenient amenities into their Tacara Village property. They wanted to provide their residents with a 'smart' living experience by automating technology for security, convenience, comfort, and entertainment. The company was particularly interested in offering their residents the convenience of using a smart device to simplify access throughout the property. They wanted to provide a solution that would allow residents to unlock their apartment doors for guests or dog walkers even when they were not at home.
Download PDF
Identify. Authenticate. Control. City of Madison Enhances Security with Networked Access Control -  Industrial IoT Case Study
Identify. Authenticate. Control. City of Madison Enhances Security with Networked Access Control
The City of Madison, Wisconsin, had a mix of new and older buildings, some of which were 50-60 years old and of complex construction. These buildings included engineering sites, streets buildings, five different police districts, 14 fire stations, and government facilities, among others. The IT Department services 36 different agencies in 20 sites across the city. The city's assets were protected by a team of security and technology experts whose responsibility included everything from assigning rights to software use to protecting taxpayer data to securing buildings and people, and more. However, when officials were unable to lock down a building during an emergency due to technical issues and the company who installed it said they could not provide on-site support for two days, Ken Ferguson, Information Specialist 3 and System Administrator for City of Madison, knew he needed to replace the system.
Download PDF
Historic Manufacturing Site Vaults into 21st Century by Implementing a Wireless Access Control System -  Industrial IoT Case Study
Historic Manufacturing Site Vaults into 21st Century by Implementing a Wireless Access Control System
Kaba Access Control, a North Carolina-based manufacturing facility, has been home to some diverse operations, including a cotton mill, foundry, and furniture hardware manufacturer. The company has utilized its prior assets to build a business that includes die-casting, plating, sanding, stamping, assembly, and shipping operations, as well as in-house research, engineering, and customer support services. The facility includes 150,000 square feet of manufacturing and office space and employs over 250 personnel. Coinciding with its changing businesses, the building’s original 1905 brick structure has undergone a series of renovations and additions, morphing the once basic space into a complex web of access points. The company had managed their access points with an online, wired system, but retired the system when it could not provide expanded coverage at a reasonable cost. With input from the safety committee, the company embarked on choosing and installing a new access control system that would provide a higher level of security and accommodate its numerous users and critical access points.
Download PDF
Williams Racing's Remote Working and Cybersecurity Solution -  Industrial IoT Case Study
Williams Racing's Remote Working and Cybersecurity Solution
Williams Racing, a Formula 1 race team, employs over 650 people who contribute to the team’s performance. This includes engineers who analyze real-time data from video analytics of their own and competitors’ cars, weather data, and over 300 sensors on the car to inform pit crews on health and performance. Cybersecurity is critical to Williams’ success on and off the track. To race competitively, their engineers need unencumbered access to the real-time data from the track and ensure that the data is not tampered with. To compete in their commercial markets, they need to protect their intellectual property from external attacks and insider threats. The COVID-19 pandemic has further complicated this task, with over 60% of Williams’ employees working remotely from unsecure home networks or remote Wi-Fi networks with unknown configuration.
Download PDF
Protecting Trusted Insiders -  Industrial IoT Case Study
Protecting Trusted Insiders
The enterprise security threat landscape is more complex than ever, with new risks and attack methods emerging faster than we can keep up with them. One established attack vector that shows no signs of slowing down is phishing. As phishing attacks have become more sophisticated, they're increasingly focused on exploiting a key, but often overlooked, vulnerability: the users inside of your network. It is user behavior - the opening, the clicking, the downloading - that serves as the enabler, allowing malicious actors to gain entry to your network and find the valuable personal or company information they're seeking. Recently, a slew of invoice-themed malicious phishing emails was found to have penetrated a customer network - past a tried-and-true network defense system and straight into employee inboxes. A proxy service eventually detected and flagged that users had visited malicious URLs, but there was limited visibility into where and how the attackers entered the network, the number of users affected, and the extent of the potential damage.
Download PDF
Financial Services Organization Stops Attack Targeting a Senior Executive -  Industrial IoT Case Study
Financial Services Organization Stops Attack Targeting a Senior Executive
A large financial services company with over 10,000 employees was the target of a java backdoor attack aimed at a senior executive. Despite having several antivirus, endpoint detection and response (EDR), and email security tools in place, the attack managed to bypass these defenses and land on the executive's computer. The malware used common administrative commands, which did not trigger alerts from the other security solutions. Without the visibility provided by DTEX, the attack would have gone undetected, potentially leading to data theft, sabotage, lateral movement within the organization, or worse. The malware was delivered via a phishing email that appeared to be shipping-related, which the executive was expecting. The email contained a malicious link that pointed to a compromised Turkish website that downloaded the malware. The malware then hid itself by creating a new temporary folder on the desktop and moving all associated files to this location. It also created a new path in the registry directory, setting up a persistent foothold on the machine, and took several actions to enumerate the environment.
Download PDF
Detecting a Java Backdoor with Dtex -  Industrial IoT Case Study
Detecting a Java Backdoor with Dtex
A large financial services company with over 10,000 employees was the victim of a java backdoor attack that targeted a senior member of the company. Despite having several AV, EDR, and email security tools deployed, the attack managed to slip through and land on the computer of a high-ranking employee. The malware utilized commonplace admin commands, which other solutions did not alert on. Without Dtex's visibility and alerting, the attack would have gone undetected, potentially leading to data theft, sabotage, lateral movement within the organization, or worse.
Download PDF
FERCAM Updates Web Security Quickly with Forcepoint -  Industrial IoT Case Study
FERCAM Updates Web Security Quickly with Forcepoint
FERCAM, a logistics company, was experiencing growth that necessitated the modernization of its technology resources. Internet access had become a crucial part of daily operations, and the company needed a more effective monitoring solution. The previous solution was plagued with issues such as weak performance, ineffective blacklist updating, and inadequate web traffic monitoring and analysis for 800 users. These inefficiencies led to a high number of IT tickets related to service issues or false positives.
Download PDF
Forcepoint Enables AZ Sint-Lucas Hospital to Safeguard Patient Care -  Industrial IoT Case Study
Forcepoint Enables AZ Sint-Lucas Hospital to Safeguard Patient Care
Healthcare professionals at AZ Sint-Lucas Hospital required unfiltered access to websites to provide patients with the best possible outcome. This resulted in a substantial amount of unprotected data being sent and received via smartphones, tablets, or other devices. A study of user behavior discovered that staff visited more non-work-related websites than job-related sites, posing a serious risk for data loss or theft. The increasing number of spam complaints also required too much time from the IT team to handle.
Download PDF
Swire Oilfield Services Case Study -  Industrial IoT Case Study
Swire Oilfield Services Case Study
Swire Oilfield Services, a global supplier of offshore containers to the energy industry, faced the challenge of protecting its business operations in some of the world's most remote locations. The company's global presence, coupled with recent acquisitions, resulted in a complex security portfolio with five different security solutions in place for email. This setup became increasingly problematic as the number of malware and phishing attempts targeting the company's cloud app services reached an all-time high. The company needed a solution to standardize its security across all locations, despite varying connection issues.
Download PDF
Sauer Corporate Services, LLC Case Study -  Industrial IoT Case Study
Sauer Corporate Services, LLC Case Study
Sauer Corporate Services, LLC faced several challenges that led them to evaluate and ultimately select Forcepoint Secure Web Gateway. These challenges included the difficult and costly maintenance of appliances and the need for better protection for roaming users and/or distributed offices. They chose Forcepoint’s hybrid deployment option for Secure Web Gateway because of its dedicated filtering in the cloud, the full-featured policy set, and the need to prevent loss of DLP functionality in a cloud deployment. Before choosing Forcepoint Secure Web Gateway, they evaluated or previously used vendors including Cisco, Symantec, and McAfee.
Download PDF
Swiss Life Case Study -  Industrial IoT Case Study
Swiss Life Case Study
In 2009, Swiss Life France recognized a key challenge which had been impacting the company as well as several of its peers. Zero-day malware and advanced persistent threats, such as ransomware and rootkits, were infiltrating its network undetected. As a result, Swiss Life recognized that it needed to optimize and better secure the infiltration and exfiltration of its data. In addition, Swiss Life’s sales representatives working remotely (approximately 1,400 in total) are equipped with laptops and Windows tablets. These devices are frequently connected to unsecured external networks and must be equipped with the same level of protection as if connected to the corporate network.
Download PDF
Vector Keeps Email Communications Moving Safely with Forcepoint -  Industrial IoT Case Study
Vector Keeps Email Communications Moving Safely with Forcepoint
Vector SpA, an international freight forwarding agent, was facing challenges with its existing antispam software. The software was unable to effectively filter spam messages from the company’s high volume of email. This led to a significant amount of manual analysis required to identify false positives in the quarantined email messages. The company needed a solution that could effectively manage and secure their email communications without slowing down the IT team or the rest of the company’s more than 2,500 employees.
Download PDF
A New Security Strategy with Forcepoint Helps this Customer Service Organization Secure Personal Information Across 22 Countries, Despite an Evolving Threat Landscape -  Industrial IoT Case Study
A New Security Strategy with Forcepoint Helps this Customer Service Organization Secure Personal Information Across 22 Countries, Despite an Evolving Threat Landscape
The company, a managed administration services group based in Italy, provides a superior experience for its customers’ customers. As its services are rooted in data exchange, the company’s success means that the amount of information it must protect is growing exponentially. A breach would grant bad actors access to data from not just one company, but hundreds. Prior to its relationship with Forcepoint, the company’s open-source security solutions were difficult and time-consuming to manage and maintain. After the enterprise fell victim to a ransomware attack, it knew the time had come to pursue a new security strategy to better safeguard its data against cyber threats, while opening doors to advancing technologies, greater automation, and continual evolution.
Download PDF
U.S. Department Of Health and Human Services -  Industrial IoT Case Study
U.S. Department Of Health and Human Services
The U.S. Department of Health and Human Services (HHS) needed a security solution that could effectively protect more than 150,000 users across multiple departments and locations. These users access billions of sensitive data files and interact with the American public through various online communication methods. The challenge was to maintain a high level of productivity while ensuring that the systems and data remain free of malware. The department also needed to balance data security with user access. Doctors and researchers within HHS handle very sensitive health information daily, making collaboration with other researchers worldwide risky without the right security. The department also had to meet the requirements of the Federal Information Security Management Act (FISMA) and implement continuous monitoring of computer systems for security.
Download PDF
Leeds and York Partnership NHS Foundation Trust -  Industrial IoT Case Study
Leeds and York Partnership NHS Foundation Trust
In 2010, Leeds & York Partnership NHS Foundation Trust (LYPFT) embarked on a project to manage costs, which affected all facets of the organization. IT budgets were adjusted, leading to a change in web security and the implementation of Cisco IronPort. However, the IronPort solution introduced a number of operational challenges for LYPFT. The level of expertise needed to manage IronPort put a significant and unexpected strain on LYPFT’s IT resources. The IronPort solution also lacked the necessary reporting capabilities—which caused issues between the IT and Human Resources departments because of delays in generating information relating to employee website usage. Aside from reporting, LYPFT needed advanced threat protection from ransomware attacks, a prevalent type of malware that many UK businesses currently face. During that time, LYPFT experienced an uptick of attacks similar to the recent spate of attacks on US healthcare organizations, which successfully targeted a considerable number of LYPFT employees.
Download PDF
Forcepoint's Secure Multilevel Access Solution for Intelligence Community -  Industrial IoT Case Study
Forcepoint's Secure Multilevel Access Solution for Intelligence Community
The Intelligence Community (IC) customer was facing several challenges including crowded desktops, facilities at capacity causing a strain on power, excessive cooling, limited floor space, network proliferation, decreasing annual budgets, and a need for cross domain collaboration. They embarked on an enterprise-wide initiative for a multilevel security solution to support both high-end tactical operations support and low-end administrative users. The complete solution called for a data guard with self-release and reliable (two-person) human review capabilities. The overarching goal was for a desktop solution that can become the enterprise standard for the IC, achieving a “Culture of Collaboration.”
Download PDF
Open Source Center -  Industrial IoT Case Study
Open Source Center
The Open Source Center (OSC) is the US Government’s premier provider of foreign, open-source intelligence. OSC collects data from a wide range of sources, formats, content, media, and languages resulting in large volumes of data distributed across multiple repositories. One of OSC’s challenges is to derive value from this corpus, providing accurate insights while remaining flexible to incorporating new sources and integrating different technological capabilities. OSC analysts needed technology to help discover content, accomplish data harmonization (integration), identify relationships and connections in the data, use visualization and exploratory analytics to better understand the content, and capture/ enable the sharing of analytic discoveries (retain knowledge). OSC must be able to quickly respond to constituent requests from other agencies or Congress, special projects, and general inquiries and therefore required a system that was adaptive, flexible, and agile with respect to the changing landscape of data, requests,and knowledge.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.