Case Studies.

Add Case Study

Our Case Study database tracks 19,090 case studies in the global enterprise technology ecosystem.
Filters allow you to explore case studies quickly and efficiently.

Download Excel
Filters
  • (5,807)
    • (2,609)
    • (1,767)
    • (765)
    • (625)
    • (301)
    • (237)
    • (163)
    • (155)
    • (101)
    • (94)
    • (87)
    • (49)
    • (28)
    • (14)
    • (2)
    • View all
  • (5,166)
    • (2,533)
    • (1,338)
    • (761)
    • (490)
    • (437)
    • (345)
    • (86)
    • (1)
    • View all
  • (4,457)
    • (1,809)
    • (1,307)
    • (480)
    • (428)
    • (424)
    • (361)
    • (272)
    • (211)
    • (199)
    • (195)
    • (41)
    • (8)
    • (8)
    • (5)
    • (1)
    • View all
  • (4,164)
    • (2,055)
    • (1,256)
    • (926)
    • (169)
    • (9)
    • View all
  • (2,495)
    • (1,263)
    • (472)
    • (342)
    • (227)
    • (181)
    • (150)
    • (142)
    • (140)
    • (129)
    • (99)
    • View all
  • View all 15 Technologies
  • (1,744)
  • (1,638)
  • (1,622)
  • (1,463)
  • (1,443)
  • (1,412)
  • (1,316)
  • (1,178)
  • (1,061)
  • (1,023)
  • (838)
  • (815)
  • (799)
  • (721)
  • (633)
  • (607)
  • (600)
  • (552)
  • (507)
  • (443)
  • (383)
  • (351)
  • (316)
  • (306)
  • (299)
  • (265)
  • (237)
  • (193)
  • (193)
  • (184)
  • (168)
  • (165)
  • (127)
  • (117)
  • (116)
  • (81)
  • (80)
  • (64)
  • (58)
  • (56)
  • (23)
  • (9)
  • View all 42 Industries
  • (5,826)
  • (4,167)
  • (3,100)
  • (2,784)
  • (2,671)
  • (1,598)
  • (1,477)
  • (1,301)
  • (1,024)
  • (970)
  • (804)
  • (253)
  • (203)
  • View all 13 Functional Areas
  • (2,573)
  • (2,489)
  • (1,873)
  • (1,561)
  • (1,553)
  • (1,531)
  • (1,128)
  • (1,029)
  • (910)
  • (696)
  • (647)
  • (624)
  • (610)
  • (537)
  • (521)
  • (515)
  • (493)
  • (425)
  • (405)
  • (365)
  • (351)
  • (348)
  • (345)
  • (317)
  • (313)
  • (293)
  • (272)
  • (244)
  • (241)
  • (238)
  • (237)
  • (217)
  • (214)
  • (211)
  • (207)
  • (207)
  • (202)
  • (191)
  • (188)
  • (182)
  • (181)
  • (175)
  • (160)
  • (156)
  • (144)
  • (143)
  • (142)
  • (142)
  • (141)
  • (138)
  • (120)
  • (119)
  • (118)
  • (116)
  • (114)
  • (108)
  • (107)
  • (99)
  • (97)
  • (96)
  • (96)
  • (90)
  • (88)
  • (87)
  • (85)
  • (83)
  • (82)
  • (81)
  • (80)
  • (73)
  • (67)
  • (66)
  • (64)
  • (61)
  • (61)
  • (59)
  • (59)
  • (59)
  • (57)
  • (53)
  • (53)
  • (50)
  • (49)
  • (48)
  • (44)
  • (39)
  • (36)
  • (36)
  • (35)
  • (32)
  • (31)
  • (30)
  • (29)
  • (27)
  • (27)
  • (26)
  • (26)
  • (26)
  • (22)
  • (22)
  • (21)
  • (19)
  • (19)
  • (19)
  • (18)
  • (17)
  • (17)
  • (16)
  • (14)
  • (13)
  • (13)
  • (12)
  • (11)
  • (11)
  • (11)
  • (9)
  • (7)
  • (6)
  • (5)
  • (4)
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • View all 127 Use Cases
  • (10,416)
  • (3,525)
  • (3,404)
  • (2,998)
  • (2,615)
  • (1,261)
  • (932)
  • (347)
  • (10)
  • View all 9 Services
  • (507)
  • (432)
  • (382)
  • (304)
  • (246)
  • (143)
  • (116)
  • (112)
  • (106)
  • (87)
  • (85)
  • (78)
  • (75)
  • (73)
  • (72)
  • (69)
  • (69)
  • (67)
  • (65)
  • (65)
  • (64)
  • (62)
  • (58)
  • (55)
  • (54)
  • (54)
  • (53)
  • (53)
  • (52)
  • (52)
  • (51)
  • (50)
  • (50)
  • (49)
  • (47)
  • (46)
  • (43)
  • (43)
  • (42)
  • (37)
  • (35)
  • (32)
  • (31)
  • (31)
  • (30)
  • (30)
  • (28)
  • (27)
  • (24)
  • (24)
  • (23)
  • (23)
  • (22)
  • (22)
  • (21)
  • (20)
  • (20)
  • (19)
  • (19)
  • (19)
  • (19)
  • (18)
  • (18)
  • (18)
  • (18)
  • (17)
  • (17)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (16)
  • (15)
  • (15)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (14)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (13)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (12)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (11)
  • (10)
  • (10)
  • (10)
  • (10)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (9)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (8)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (7)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (6)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (5)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (4)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • View all 733 Suppliers
Selected Filters
19,090 case studies
Sort by:
Absolute helps primary school quickly recover from major laptop theft -  Industrial IoT Case Study
Absolute helps primary school quickly recover from major laptop theft
It came as a huge shock and a significant disruption to the children’s education when the school’s laptops were stolen, not once, but three times in one year. Despite a number of security measures, including alarms connected to the local police, pupils’ laptops were stolen multiple times. Although the school was covered by insurance and was able to replace the laptops, disruption to the learning and teaching was significant. It can take up to eight weeks to verify the insurance claim, obtain replacement quotes, acquire new laptops and have software reinstalled. This meant that the children were without their laptops for the best part of half a term.
Download PDF
Las Vegas Valley Water District saves time, money, and stress with Absolute -  Industrial IoT Case Study
Las Vegas Valley Water District saves time, money, and stress with Absolute
Theft is a principal challenge that the District faces, particularly as up to 700 of the organization’s laptops can be found in the field. Although company policy advises workers against leaving laptops in unattended vehicles, the nature of field work is often conducive to them doing so. Presenting the potential for additional loss, the organization hires a number of temporary and contract workers who will often leave the company on limited notice. The possibility of these individuals walking off with issued laptops is of concern. The loss of a substantial number of devices, along with risk of a data breach and its financial, regulatory, and reputational consequences, made the necessity of a comprehensive security solution apparent.
Download PDF
US Environmental Protection Agency saves money and protects data with Absolute -  Industrial IoT Case Study
US Environmental Protection Agency saves money and protects data with Absolute
Using an in-house product for asset management and asset tracking, the EPA IT team had to conduct software and hardware audits by hand, and had no way of knowing if they were within or exceeding software license limits without surveying each user individually. This left them at risk of being non-compliant with software vendor contracts. This manual process also presented time-consuming issues with patch management.
Download PDF
Cayman Islands Ministry of Education Manages Assets and Protects Devices with Persistence Technology -  Industrial IoT Case Study
Cayman Islands Ministry of Education Manages Assets and Protects Devices with Persistence Technology
These devices are Ministry assets and require an added level of protection. A number of device thefts instigated the search for a solution that would help the Ministry retrieve these devices and serve as a deterrent for future theft. With 3,000 devices spread across more than 6,000 students and teachers, a stolen laptop represented not only a lost investment but a road block to student progress.
Download PDF
Lancashire Care NHS Foundation Trust secures computers and sensitive patient data with Absolute -  Industrial IoT Case Study
Lancashire Care NHS Foundation Trust secures computers and sensitive patient data with Absolute
One of the biggest challenges facing the Trust is the NHS mandate to move many Healthcare services out into the community. This results in an increase in mobile workers using laptops off-site. Additional pressure to maintain data security comes from potential government fines of up to £500,000 for breaches of the Data Protection Act. The Trust has implanted policies that have largely mitigated the threat of data loss. All data is securely held in a data centre and accessible only through the network. However, it is possible that some data may still reside on a device.
Download PDF
Design college adds laptop security to its portfolio -  Industrial IoT Case Study
Design college adds laptop security to its portfolio
Laptops are allowing students and faculty to become more mobile. The use of physical deterrents is no longer adequate, and Kwantlen needs to reduce the risk of laptop theft and data breaches.
Download PDF
Absolute the key in “biggest bust ever” at University Police Department -  Industrial IoT Case Study
Absolute the key in “biggest bust ever” at University Police Department
The faculty and staff at the College are assigned Hewlett-Packard tablet computers, while the students at the College of Business enjoy free 3-hour checkout privileges to HP tablets owned by the College. Students pursuing minors in Business studies also receive access. Colorado State University needed a way to track these devices as they changed hands and ensure they were protected throughout.
Download PDF
NMR Staging and Events cuts computer loss in half -  Industrial IoT Case Study
NMR Staging and Events cuts computer loss in half
An inability to track laptops along the way has been problematic, as devices are largely unaccounted for between barcode scans. It was difficult to efficiently recognize when a laptop went missing or was stolen, and as a result, equally difficult to effectively respond. This delayed response time was of increasing concern since around 30 laptops were lost or stolen each year. With each laptop valued between $1,200 and $2,500, it was too expensive a trend to continue. NMR knew it needed to enhance its computer tracking capabilities and implement a more effective theft reduction strategy.
Download PDF
Securing the mobile learning environment at Thomas College -  Industrial IoT Case Study
Securing the mobile learning environment at Thomas College
Several laptops were stolen from the library and from administrative staff. This prompted the Thomas College IT team to begin the search for a security solution to track and secure its laptop deployment. The impact of a lost or stolen laptop is significant for the college, as it not only hurts their tightly managed IT budget but also steals valuable, productive time from students and staff.
Download PDF
Arizona’s fastest-growing School District offers laptops in the classroom -  Industrial IoT Case Study
Arizona’s fastest-growing School District offers laptops in the classroom
As with a growing number of school districts across North America, Dysart is increasingly turning to laptops and mobile devices as an everyday learning tool in an effort to produce better results in the classroom and prepare students for life in the new century. The move is evident in the District’s work with device manufacturer HP. The District’s laptop learning program began with the purchase of 1,000 desktop and 300 notebook computers. This expanded quickly, adding more than 1,700 devices with a goal of putting 5-6 in selected District classrooms.
Download PDF
Charles County Public Schools reduces theft and improves inventory accuracy -  Industrial IoT Case Study
Charles County Public Schools reduces theft and improves inventory accuracy
As a growing school district, Charles County Public Schools faced significant challenges in managing their expanding inventory of computers. With over 14,000 desktops, laptops, and mobile devices, tracking these assets became a daunting task. The IT department struggled to produce detailed hardware and software inventories due to the overwhelming workload. In 2007, the situation worsened when several laptops went missing, and employees reported thefts from their vehicles. The IT department was unable to track the lost devices or verify the theft reports. Additionally, there was a concern about unauthorized software, such as LimeWire, being used on the machines.
Download PDF
Hundreds of thousands saved makes Absolute a “no brainer” for Kansas City, Kansas Public Schools -  Industrial IoT Case Study
Hundreds of thousands saved makes Absolute a “no brainer” for Kansas City, Kansas Public Schools
When first told of plans for the 1:1 program, the school, parents, and the local community voiced a common concern: that of student safety. With devices come theft and the misdemeanors that surround it. What if students were bullied to hand over their laptop? Would the program attract thieves? And how could an already tight IT budget overcome the sunken costs of loss due to theft? For KCKPS, proving that these concerns were addressed was a crucial step in gaining approval.
Download PDF
Northern Gas Networks uses Absolute to protect £1.4m laptop investment -  Industrial IoT Case Study
Northern Gas Networks uses Absolute to protect £1.4m laptop investment
These expensive laptops were not always returned from the field. Devices would go missing and Northern Gas Networks had no way to determine where they were or who was using them. The company needed to find a cost-effective way to protect these laptops, an investment of almost £1.5 million.
Download PDF
Absolute Application Persistence Delivers Reliability to Allegis Group -  Industrial IoT Case Study
Absolute Application Persistence Delivers Reliability to Allegis Group
As Allegis Group continues its global expansion and engages new contractors in different regions, the number of remote staff has increased. IT has been tasked with putting in place architecture that optimizes productivity for employees working off the corporate network. Allegis Group also needed to address the integrity of its data security with many employee devices containing personally identifiable information. Allegis Group required a comprehensive and streamlined security protocol to ensure the protection of this data on behalf of their business partners and clients.
Download PDF
Absolute diminishes the threat and fear of violent theft for Swedish pupils -  Industrial IoT Case Study
Absolute diminishes the threat and fear of violent theft for Swedish pupils
The mobile devices are a huge educational benefit to students, but giving expensive items to young people to use anywhere runs the risk of loss, theft or older children taking devices from younger ones. Kungälvs Kommun found that on average around 17 devices a year were going missing. But despite the loss of the devices, the main concern for Kungälvs Kommun was the potential risk of harm that pupils faced if they were to be threatened with violence during a theft.
Download PDF
Absolute protects the laptops of the Intelligrated mobile workforce -  Industrial IoT Case Study
Absolute protects the laptops of the Intelligrated mobile workforce
The company has grown rapidly in the last four years through consolidations, acquisitions, and because their conveyors, sorters and palletizing systems are in such high demand. Because of this, the number of laptops have increased, and the ability to track and manage them has become increasingly difficult. The Intelligrated IT Department was concerned about potential laptop theft, and needed a solution that would allow them to track and secure laptops in the field. After researching available options, they chose Absolute.
Download PDF
Suffolk Construction track, manage, and secure site devices with Absolute -  Industrial IoT Case Study
Suffolk Construction track, manage, and secure site devices with Absolute
Physically tracking, managing and securing devices that are off the network is a difficult task. Combine this with a dispersed workforce and across construction sites that are a high target for theft.
Download PDF
Capital Guardian Youth ChalleNGe Academy tracks laptops and protects sensitive data with Absolute -  Industrial IoT Case Study
Capital Guardian Youth ChalleNGe Academy tracks laptops and protects sensitive data with Absolute
The CGYCA is currently configured to support up to 176 cadets on campus. The 12 campus buildings (including dorms) are spread across 29.7 acres. The challenge was to ensure that cadets had access to computers during the program to complete classroom work and exams, especially after the GED examination moved from a paper-based to a paperless test. Additionally, there was a need to protect these laptops from theft and ensure the security of sensitive data related to underage cadets.
Download PDF
Absolute locates stolen PCs for General Services Administration, breaks up theft ring -  Industrial IoT Case Study
Absolute locates stolen PCs for General Services Administration, breaks up theft ring
When two laptop computers were stolen from the General Services Administration (GSA) office in Atlanta, just a few months after the agency had decided to load Absolute on all of its portable computers, the purchasing arm for the federal government was naturally concerned.
Download PDF
Allina Health prevents costly data breaches with Absolute -  Industrial IoT Case Study
Allina Health prevents costly data breaches with Absolute
In a demonstration of technology adoption, Allina is rapidly increasing the number of laptops and tablets they provide to nurses, physicians and other mobile employees to allow for better patient care. However, with the move towards portable computers, Allina’s IT team experienced a sharp increase in laptop theft including one incident requiring public disclosure of breached health information. Allina sought a high-tech solution for laptop management and data breach protection.
Download PDF
UK School’s stolen laptops tracked and recovered from India -  Industrial IoT Case Study
UK School’s stolen laptops tracked and recovered from India
Having already suffered a theft from the school, Jon Bullard, Laleham Gap’s network manager wanted a solution that could protect both devices and the students. “I was really keen to find a solution that would prevent laptop theft. It was important that if we did have any thefts we could recover the laptop to minimise any inconvenience. Additionally, if the person or people involved in the theft could be brought to justice, so much the better,” said Mr. Bullard.
Download PDF
Hornblower goes from zero to SOC in 60 minutes -  Industrial IoT Case Study
Hornblower goes from zero to SOC in 60 minutes
Hornblower, the nation's largest private vessel company, faced significant challenges in managing their security posture due to a small IT team focused primarily on operational tasks. Despite having traditional perimeter and endpoint defenses, the company recognized the need for a more robust security strategy to counter advanced and targeted attacks. The scarcity of security engineers and high competition for hiring them made it difficult for mid-market companies like Hornblower to build a scalable security operations center in-house. They needed a solution that provided comprehensive coverage and consistency without overwhelming their limited IT resources.
Download PDF
Getting tough on cybercrime while lightening IT budget and workload -  Industrial IoT Case Study
Getting tough on cybercrime while lightening IT budget and workload
Stevens Aviation, a premier US aviation services company, faced significant cybersecurity challenges. Their mission-critical systems required robust protection from cybercriminals, but their small IT staff lacked the resources to focus on cybersecurity. Additionally, they needed an affordable solution to secure hundreds of workers across multiple locations. The evolving nature of cyber attacks, where hackers remain hidden within networks to steal assets or cause damage over time, made it clear that detection was just as important as prevention. Detecting breaches that bypass perimeter defense systems required diligent forensic analysis, which was a tedious and daily task.
Download PDF
Gaining a security operations center for less than the cost of a full-time security engineer -  Industrial IoT Case Study
Gaining a security operations center for less than the cost of a full-time security engineer
Threshold, a leading distributor of nutritional supplements, recognized the need to enhance its cybersecurity measures to protect its expanding multi-national business. The company was aware of the increasing threat of cybercrime, especially for smaller firms with limited IT resources and security expertise. They understood that a data breach could be devastating, as seen in high-profile cases like Sony and Target. Despite their commitment to improving cybersecurity, Threshold faced significant challenges due to their limited budget and lack of in-house security experts. They needed a comprehensive solution that could provide robust security without the high costs associated with hiring full-time security personnel.
Download PDF
ACTIVECYBER and Arctic Wolf Partner to Secure Data of Leading Industry Organizations -  Industrial IoT Case Study
ACTIVECYBER and Arctic Wolf Partner to Secure Data of Leading Industry Organizations
ACTIVECYBER faced challenges in fully leveraging opportunities driven by increased demand for Managed Detection and Response (MDR) services. Previous experiences with Security Operations Center (SOC)-as-a-service providers were underwhelming, failing to deliver the promised value. Additionally, there was a need for executive reporting to demonstrate cybersecurity compliance effectively.
Download PDF
Arctic Wolf Cures Madison Memorial Hospital’s Security and Compliance Pain -  Industrial IoT Case Study
Arctic Wolf Cures Madison Memorial Hospital’s Security and Compliance Pain
Madison Memorial Hospital faced significant challenges in managing its cybersecurity and compliance requirements. The hospital's IT team, consisting of 20 members, had to oversee a diverse infrastructure that included 600 endpoints, 300 servers, and several thousand medical devices. Despite having a robust security infrastructure, an external risk assessment revealed gaps in incident detection and response, particularly concerning HIPAA compliance. The hospital needed a solution to holistically monitor its infrastructure and detect threats. They considered three approaches: an on-premises SIEM solution, a managed security service provider (MSSP), or a managed detection and response (MDR) solution. After evaluating products from Splunk, Exabeam, and SecureWorks, Madison chose Arctic Wolf for its security operations.
Download PDF
First United Bank & Trust “Banks” on Arctic Wolf for Security and Compliance -  Industrial IoT Case Study
First United Bank & Trust “Banks” on Arctic Wolf for Security and Compliance
In 2015, First United Bank & Trust faced significant challenges in monitoring its diverse and distributed network infrastructure. The bank needed a solution to provide comprehensive visibility and detect threats across its infrastructure, which included workstations, servers, ATMs, and network devices. Additionally, the bank had to comply with complex regulatory requirements such as the Graham-Leach-Bliley Act (GLBA) and Sarbanes-Oxley Act (SOX), overseen by the Federal Financial Institution Examination Council (FFIEC) and the Federal Deposit Insurance Corporation (FDIC). The bank's IT resources were constrained, making it difficult to achieve 24x7 security monitoring and manage the necessary compliance obligations. The bank evaluated various security information and event management (SIEM) technologies but found them to be prohibitively costly and resource-intensive. The need for continuous monitoring and the challenges of managing an in-house security operations center (SOC) led the bank to seek an outsourced solution.
Download PDF
Bay Federal Credit Union Enjoys Comprehensive Security and Compliance with the AWN CyberSOC™ Service -  Industrial IoT Case Study
Bay Federal Credit Union Enjoys Comprehensive Security and Compliance with the AWN CyberSOC™ Service
Bay Federal Credit Union faced ongoing security challenges due to its diverse IT infrastructure, which includes workstations, servers, routers, and switches across six physical locations. The environment also includes a corporate network, an ATM network, and several cloud-based solutions. The company needed to leverage advanced tools with minimal administrative overhead. Additionally, Bay Federal required a proactive partner to meet enhanced expectations and compliance requirements, including National Credit Union Administration (NCUA) guidance and Payment Card Industry Data Security Standard (PCI DSS) requirements. The credit union also needed detailed reporting to support governance and compliance requirements.
Download PDF
Arctic Wolf Helps Zelle LLP Raise Security Posture and Ensure Client Confidence -  Industrial IoT Case Study
Arctic Wolf Helps Zelle LLP Raise Security Posture and Ensure Client Confidence
Zelle LLP faced significant challenges in maintaining an appropriate security posture with comprehensive visibility across multiple offices and systems. The firm needed to build a security staff capable of analyzing event log data and meeting client obligations for cybersecurity. Significant data breaches originating through work with subcontractors heightened awareness among large corporations about the potential risks vendors pose. Corporations now require their legal counsel to adopt stronger security measures than ever before. Initially, these requirements were in the form of questionnaires, but they evolved into a combination of questionnaires and review sessions. An internal audit of Zelle's security practices revealed gaps in their ability to detect and respond to threat indicators. This led to the realization that ramping up managed detection and response (MDR) capabilities was a significant security need.
Download PDF
Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations -  Industrial IoT Case Study
Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
Maslon LLP faced multiple challenges in maintaining the confidentiality and integrity of client information while balancing user productivity and information security. The firm needed to satisfy client security requirements around data, internal assessments, and reviews, and meet increasing demands within an existing IT organizational structure. Additionally, Maslon had to adhere to client compliance regimes as part of the business relationship, including HIPAA requirements for some clients. The firm also needed to address client risk management concerns and optimize its security posture without the prohibitive costs of staffing and managing an in-house SIEM system.
Download PDF

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.