Case Studies.

Add Case Study

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 737 Suppliers
Selected Filters
19,090 case studies
Sort by:
Online gaming company bets on Vectra and AWS for cyberattack detection and monitoring -  Industrial IoT Case Study
Online gaming company bets on Vectra and AWS for cyberattack detection and monitoring
The online gaming company, with operations in more than a dozen locations worldwide, was facing a rapidly changing threat landscape. Gaming companies are lucrative targets for cybercriminals, who range from solo actors to organized crime rings. An outage or data breach can cause material damage to the firm’s income, customer retention and longterm value. As a publicly traded company, it is required to meet a wide range of regulatory and compliance mandates, including PCI-DSS and GDPR. The gaming firm needs to be able to detect threats and attacks, which means having the ability to hunt for malicious activity around the clock without requiring security teams to be on site 24/7. At the same time, security analysts were overwhelmed by the volume of alerts from their security tools, such as SIEMs, firewalls and other defenses. Before selecting Vectra’s AI-driven platform, the company experienced limited visibility into threat behaviors inside its networks, which did not support the company’s priorities to deliver the best experience for gamers, guard its operations against attacks, and protect its brands and intellectual property.
Download PDF
Major real estate firm replaces IDS/IPS with AI-driven network detection and response -  Industrial IoT Case Study
Major real estate firm replaces IDS/IPS with AI-driven network detection and response
The security operations team of a major real estate firm realized the need to modernize their approach to potential cyber threats. The company had been using combined intrusion detection and intrusion prevention systems to catch threats at the network perimeter. However, these systems did not scale well and offered no visibility inside the network and data center. The security operations teams were also burdened with manually investigating thousands of threat alerts per day, causing significant alert fatigue and giving real attacks more time to spread.
Download PDF
The new science of threat detection -  Industrial IoT Case Study
The new science of threat detection
The financial markets are a favorite target of cyberattackers, whether they are trying to disrupt the global economy, make a political statement or commit an act of war. From the banks to dealers, clearing houses to exchanges, the industry strives to maintain the availability and integrity of the financial infrastructure. It’s a massive challenge, where one worker’s misstep or moment of inattention can lead to compromised systems, financial loss and damage to corporate reputation. This exchange is well prepared to defend against the everyday cybercrimes of monetary gain and reputational damage as well as black swan events. To stay ahead of bad actors and criminals, it continually improves its information security controls and systems.
Download PDF
Online retailer reduces business risk -  Industrial IoT Case Study
Online retailer reduces business risk
The Very Group, a leading digital retailer in the UK, has undergone a significant digital transformation, shifting from a catalog operation to a pureplay digital retailer. However, this transformation has introduced new risks. The company needed to protect its ecommerce platforms, maintain customer trust, and meet regulatory requirements like the European Union’s General Data Protection Requirement (GDPR). The Very Group has 1.3 million visitors a day and four million active customers, and its systems hold a wealth of information that needs to be protected. The company also wanted to ensure that its security and privacy practices were tightly aligned with GDPR and other mandates.
Download PDF
The EDAG Group Flips the Script on Ransomware -  Industrial IoT Case Study
The EDAG Group Flips the Script on Ransomware
The EDAG Group, one of the world’s largest independent development partners to the automotive and aviation industries, fell victim to a ransomware attack on the night of March 13, 2021. A large number of their business-critical systems suddenly became unusable, and it was determined that their IT systems were under attack. The stakes were high as they were up against a ransomware attack. Their security team quickly stepped in and was able to control the attack, getting their systems back up and running. However, EDAG knew they needed an approach that would ensure no suspicious activity was left in the network and any future attacks would be thwarted.
Download PDF
Australian Private Health Fund Gains Full Visibility Using Vectra -  Industrial IoT Case Study
Australian Private Health Fund Gains Full Visibility Using Vectra
The Australian Private Health Fund was facing a challenge with their existing cybersecurity solution, Darktrace. The number of alerts they were receiving was overwhelming and they needed a solution that would reduce these alerts and increase visibility across their hybrid environments. They were looking for a solution that would not only protect against external threats but also spot unusual employee behavior that could lead to vulnerabilities. The organization wanted to ensure the cyber wellness of their members and prevent any risk of their information being compromised in a cyberattack.
Download PDF
Vectra AI -  Industrial IoT Case Study
Vectra AI
The company initially implemented Vectra AI to protect some of its legacy systems that did not support encryption at rest. This was necessary to meet compliance requirements. The company then extended the use of Vectra AI to monitor other devices and servers within its network. The company was looking for a solution that could detect anomalous behavior and reduce the time spent on looking into logs. The company also wanted a solution that could triage threats and correlate them with compromised host devices. The company was dealing with about 300 events a day, with about 10 to 15 events requiring investigation.
Download PDF
Vectra AI -  Industrial IoT Case Study
Vectra AI
The organization had a gap in its cybersecurity infrastructure. They did not have a managed service and needed a solution that would help them detect malicious behavior and anomalies within the organization. They were looking for a solution that could provide actionable data and reduce the workload on their small team. They also needed a solution that could provide visibility into behaviors across the full lifecycle of an attack in their network, beyond just the internet gateway.
Download PDF
Vectra AI -  Industrial IoT Case Study
Vectra AI
The organization was dealing with a large volume of network traffic, with 89,000 concurrent IPs being analyzed. This resulted in a significant amount of noise, with only 1% of the traffic warranting deeper investigation. The challenge was to filter out the noise and focus on the high-risk events that needed attention. Additionally, the organization needed a solution that could provide visibility into behaviors across the full lifecycle of an attack in the network, beyond just the internet gateway. This included identifying unauthorized devices on the network and detecting suspicious domain activity.
Download PDF
Vectra AI -  Industrial IoT Case Study
Vectra AI
The company lacked an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) across its estate, which includes numerous offices across the country. This situation made it difficult for the company to monitor and flag up unusual network traffic for further investigation. The company was also struggling with false positives and had to invest time in tuning the system to reduce these. The company was looking for a solution that could provide visibility into behaviors across the full life cycle of an attack in their network, beyond just the internet gateway.
Download PDF
Vectra AI -  Industrial IoT Case Study
Vectra AI
The company was in need of an intrusion detection system to monitor traffic within their network. They had previously experienced a ransomware event, which Vectra AI was able to quickly detect and alert on, greatly reducing the time it took for the company to respond to the incident. However, the company was looking for a solution that could provide a fuller picture of what was going on before the target left the network, and also triage threats and correlate them with compromised host devices to further reduce the time to respond to incidents.
Download PDF
Vectra AI Review -  Industrial IoT Case Study
Vectra AI Review
The university was looking for a solution that required less customization and more commercial off-the-shelf capabilities. They wanted their team to focus on protecting the university rather than upgrading custom software. They needed a solution that could inspect and look for malicious, abusive, or other types of forbidden behavior with their north-south and east-west traffic. The solution needed to be able to differentiate between normal and abnormal events. The university also wanted to detect issues with privileged accounts, as they had users ranging from low-privileged, regular users to administrators with high levels of privilege.
Download PDF
Government Authority Achieves Complete Cloud Monitoring with Vectra AI and AWS -  Industrial IoT Case Study
Government Authority Achieves Complete Cloud Monitoring with Vectra AI and AWS
The Government Authority in the Middle East manages and oversees all of the country's digital assets, information technology, and data programs. It operates similarly to a service provider throughout all government agencies including healthcare, education, traffic, and immigration. Cybersecurity is a fundamental pillar protecting government institutions as they are a prime target for hackers. The Government Authority maintains and supports multiple core business functions at a large scale where compromised data or systems increase the risk of a breach. A breach in a government institution would impact critical systems that citizens rely on, demand remediation costs, and require unplanned spending to close the gaps. The security team needed to reduce the risk of a breach by having the ability to detect and respond to potential threats. However, they were overwhelmed with a large volume of unprioritized alerts, poor capability in detecting unknown threats, and they lacked visibility into their cloud environment.
Download PDF
An Innovative Financial Services Institution Leverages Aviatrix to Reduce Enterprise and Customer Risk -  Industrial IoT Case Study
An Innovative Financial Services Institution Leverages Aviatrix to Reduce Enterprise and Customer Risk
The financial services institution, with assets valued at over $34 billion, was seeking to improve customer experience by addressing its growing security, visibility, and compliance needs while expanding into a multi-cloud environment. However, the enterprise soon became increasingly dependent on the native constructs provided by Cloud Service Providers (CSPs) that limited the visibility, security, and control over the company’s multi-cloud network. Changes in the business environment, further accelerated due to COVID-19, required even more resilience and risk management. These factors could have become costly to the enterprise, but with Aviatrix leading them into the multi-cloud, they were able to mitigate risks for their customers and their organization.
Download PDF
Aviatrix Multi-Cloud Network Architecture Modernizes Legacy Oil and Gas Industry Operations -  Industrial IoT Case Study
Aviatrix Multi-Cloud Network Architecture Modernizes Legacy Oil and Gas Industry Operations
The oil and gas enterprise was already leveraging the multi-cloud to enhance the analytics of petabytes of critical data. However, the increasingly complex multi-cloud network architecture was compromising the security and visibility of the organization’s applications and workloads. The enterprise realized that the need for a simplified, comprehensive view of its network infrastructure was vital to creating efficiencies that could help save millions of dollars. The enterprise faced challenges with costly and insecure cloud native architecture, combined with high use of IoT devices and established SD-WAN network, which limited the enterprise’s scalability and performance while increasing network complexity. The implementation of Next-Gen Firewall (NGFW) on multi-cloud network was complex and cost prohibitive. The enterprise also lacked a Role-Based Granular Access Control (RBAC) for admins and needed advanced cloud visibility and troubleshooting tools to investigate network health, detect cyberattacks, and provide management records and evidential data that highlight environment change activity.
Download PDF
RumbleUp and Bandwidth: Personalized Political Outreach at Scale -  Industrial IoT Case Study
RumbleUp and Bandwidth: Personalized Political Outreach at Scale
Reaching voters is a daunting task. Whether you’re a candidate asking for their vote, polling potential voters, or just making them aware of the issues, reaching out to the electorate in a way that’s effective while still connecting with them on a personal level can be extremely challenging. RumbleUp understood that challenge, and launched their platform to make political outreach scalable while still maintaining the personal connections that are so crucial to winning over new supporters, donors and voters. Finding a partner that can provide the throughput that’s needed while helping to maintain the personal touch is a tall order, but RumbleUp delivers on that every day, which is why their customers keep coming back to them, campaign after campaign.
Download PDF
Pinger Had a Novel Idea; Have Every App Download Come With Its Own Phone Number -  Industrial IoT Case Study
Pinger Had a Novel Idea; Have Every App Download Come With Its Own Phone Number
In 2010, Pinger, a leading free texting provider, wanted to add voice services to their market-leading text free SMS application. They aimed to offer each of their users their own phone number. However, being more of a software company than a traditional telecom player, Pinger needed a network partner that was flexible, agile, experienced, and creative enough to help them bring voice to life in their Textfree app. The challenge was that Pinger was new to VoIP and had no volume yet. They needed a partner willing to work with them so they could launch and scale their innovative app. Traditional larger incumbents were difficult to negotiate with due to Pinger's lack of existing voice minute volumes.
Download PDF
Bandwidth Communications APIs Help BoomTown CRM Seamlessly Integrate Text Messaging -  Industrial IoT Case Study
Bandwidth Communications APIs Help BoomTown CRM Seamlessly Integrate Text Messaging
BoomTown, a CRM platform for the real estate industry, was facing a challenge where a significant portion of communication between realtors and leads was happening outside of the CRM, specifically through text messages on personal cell phones. This presented two major business challenges. First, there was limited tracking capability. Unless a text interaction was manually logged into the CRM, there was no official record of it happening. This meant limited sharing of historical data among team members and the inability to accurately measure an agent’s response time and overall performance. Second, there was a limited ability to share best practices. BoomTown prides itself on delivering up-to-the-hour best practices data and advice to the real estate industry. With a large chunk of data missing from user reports, analyzing response rates for best practice indicators was a challenge.
Download PDF
Acumatica improves global company’s connections with staff and customers -  Industrial IoT Case Study
Acumatica improves global company’s connections with staff and customers
Sciessent is a global company that offers chemical treatment products used in several industries. The company had utilized Sage MAS 500 for about seven years, and in 2015 they faced the loss of Sage support for MAS 500. Their partner recommended Acumatica as a way to replace and upgrade their financial management system. The company needed a solution that would improve their customer relations and make their business processes more fluid.
Download PDF
Dakota Red Corporation Case Study -  Industrial IoT Case Study
Dakota Red Corporation Case Study
Dakota Red Corporation, a holding company for King’s Material, Midland Concrete Products, Hawkeye Ready Mix, and Stone Concepts, was facing challenges with its outdated business processes and technology. The company had been using the same computer and software system since 1988, supplemented by spreadsheets, Microsoft Access, and later Sage 100. As the company grew, it added more databases and spreadsheets to keep track of various business entities. The impending retirement of the company's CFO, who had installed the first computer and software system, prompted a review of the company's business processes and technology. The company realized that an ERP system integrated with financial software could greatly improve operations.
Download PDF
BLD Brands, LLC -  Industrial IoT Case Study
BLD Brands, LLC
BLD Brands was running an unsupported version of Sage Pro and operating with eight different charters of accounts and four different accounting calendars as a result of prior acquisitions. Numerous intercompany transactions and consolidations made it challenging to bring them all into a single audited entity. In addition to running siloed accounting systems and three different point-of-sale systems, four people manually entered about 90,000 invoices a year. Bringing those systems together required three in-house developers to create proprietary desktop and mobile applications that BLD used for managing communication and approvals, among other operations. Those applications pulled information from a data warehouse into which all financial data was then added.
Download PDF
xByte Technologies Case Study -  Industrial IoT Case Study
xByte Technologies Case Study
xByte Technologies, a company that sells new and refurbished Dell servers and network switches, was facing potential disaster with their old ERP, Everest Software, running on end of life with Windows Server. The company's success is predicated on having highly-available, always-on technology infrastructure that enables them to deliver superior service. However, when company executives started noticing their ERP slowed down every afternoon, they knew they had to take action. They needed to move to a platform that was more futureproofed, and to an ERP that could automate many of their operations.
Download PDF
Myanmar’s premier security services firm picks Acumatica to scale with its growing business -  Industrial IoT Case Study
Myanmar’s premier security services firm picks Acumatica to scale with its growing business
Exera, a security services company in Myanmar, experienced rapid growth from 150 employees to over 1,000 in just five years. This expansion necessitated a new way to manage its human resources and finances. The company had been relying on manually created spreadsheets, which were no longer sufficient for the scale of their operations. They needed a system that could automate business processes, integrate local tax and labor guidelines, and be flexible enough to add more functionalities as the company grew.
Download PDF
Data-Driven Korpack Harnesses Acumatica for Nationwide Growth -  Industrial IoT Case Study
Data-Driven Korpack Harnesses Acumatica for Nationwide Growth
Korpack, a startup in the packaging industry, needed an ERP system that was affordable, capable of organizing, analyzing, and acting on data, and flexible enough to allow customization and growth into a national concern. The company evaluated several ERPs, including NetSuite, Microsoft Dynamics, and QuickBooks, but found them either too expensive, lacking in customization options, or not robust enough for their needs. They needed a system that would allow them to quote immediately and fulfill winning bids quickly and accurately, while providing instant access to vendor pricing and services, and connections to sophisticated data analysis tools.
Download PDF
Malta vacation ownership specialist poised for rapid growth with Acumatica -  Industrial IoT Case Study
Malta vacation ownership specialist poised for rapid growth with Acumatica
Azure Malta, a vacation ownership specialist, was using four legacy software applications to run their business. This included Sage 50, Omnis reservation system, and Microsoft Access and Excel. The data had to be manually entered into each system and then imported and exported to other applications to keep everything current. This process was inefficient and time-consuming. In 2013, Azure decided to adopt a digital media marketing strategy and expand into new properties in different countries. However, they realized that their dated technology infrastructure and patchwork of legacy financial systems would not support this expansion. They needed a system that could scale, was easy-to-use, flexible, and could easily integrate with third-party solutions.
Download PDF
Acumatica Helps Lighting Manufacturer Improve Processes, Scale Rapidly -  Industrial IoT Case Study
Acumatica Helps Lighting Manufacturer Improve Processes, Scale Rapidly
FSC Lighting Inc. was operating with Sage DacEasy, an older system that didn't incorporate MRP and warehouse management and the rest of the manufacturing process. There were no inventory locations, and there wasn’t any accountability. The warehouse manager would bring a list of things he thought they might be low on, maybe, to order. The company had purchased a Sage replacement for DacEasy but had not implemented it yet. The version wasn’t robust enough for their business. It was only a replacement for DacEasy. The company wanted to find something they could do in the cloud, add an ERP and barcode scanning, and then add on from there.
Download PDF
Bell and Company -  Industrial IoT Case Study
Bell and Company
Bell and Company, an industrial and marine parts distributor, was using QuickBooks' Enterprise Edition to automate its financial processes. However, the president of the company, Dan Wilkins, realized that he needed more than a simple accounting package to run his small business and deliver superior customer service. The financial software lacked sophisticated reporting, dashboards, and didn't integrate with third parties, such as a CRM. The company was looking for an affordable Enterprise Resource Planning (ERP) system for small businesses that could provide automated communication with customers, sophisticated reporting, and integration with third-party systems.
Download PDF
Ray Allen Manufacturing Case Study -  Industrial IoT Case Study
Ray Allen Manufacturing Case Study
Ray Allen Manufacturing, a leading manufacturer of canine equipment for military and police departments, was facing challenges with its legacy AS400 system. The system was not integrating well with its eCommerce software and was creating a new customer account every time there was an online order. This required manual consolidation of accounts, a time-consuming task. The system also lacked a manufacturing module, which meant the company had limited insight into production effectiveness, inventory levels, and manufacturing schedules. The company's strategy included future acquisitions and rapid growth, and they realized that new additions would be difficult to integrate with their legacy system.
Download PDF
New York State Office for People with Developmental Disabilities -  Industrial IoT Case Study
New York State Office for People with Developmental Disabilities
The New York State Office for People with Developmental Disabilities (OPWDD) assists more than 128,000 individuals, acting as their fiduciary agent, or guardian, in managing their finances. About 2,000 people handle these financial management tasks, in more than a dozen locations around the state. For 30 years the agency relied on a state-created system called “Client Cash,” which required OPWDD staff to spend a large amount of time tracking and coordinating each client’s income and expenses on an outdated stand-alone character based PC. In addition, the OPWDD business office used software that didn’t communicate with the different systems used by the resident care providers or by the state’s facilities. The lack of connection between the offices and facilities was a key problem. The old system had no communication between the sites.
Download PDF
Antenova Amplifies Connections and Improves Operations with Acumatica -  Industrial IoT Case Study
Antenova Amplifies Connections and Improves Operations with Acumatica
Antenova, a multinational company that manufactures high-performing standard antennas and RF antenna modules, was previously operating with two separate systems: Sage50 for finance and Orderwise for purchase orders, sales, and warehouse management. This setup posed challenges as the two systems did not work together, leading to manual data input from one system to the other. Some reports also had to be constructed in MS Excel to get the desired information. As the company grew and the IoT market expanded, Antenova needed to keep pace by renewing its website and digital marketing tools. This led to the need for a cloud-based ERP system that would enable Antenova to grow efficiently to meet these challenges.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.