Technology Category
- Cybersecurity & Privacy - Endpoint Security
- Cybersecurity & Privacy - Malware Protection
Applicable Industries
- National Security & Defense
- Telecommunications
Use Cases
- Supply Chain Visibility
- Tamper Detection
Services
- System Integration
About The Customer
Community Newspaper Group (CNG) is a leading provider of local news to citizens throughout Western Australia. The group's seventeen regional newspapers and associated websites provide readers with the latest local news, sports, entertainment and more. More than 700,000 readers rely on their daily Community Newspaper Group content to stay informed about local news and events. In today’s fast-moving publishing world, readers expect near real-time information even at the local level. Advertising is still the primary revenue source for CNG, so any interruptions that could prevent timely rollout of physical or online editions translate to lost revenue and potentially dissatisfied clients.
The Challenge
Community Newspaper Group (CNG), a provider of local news throughout Western Australia, was facing challenges in securing their digital assets and end-user systems. With over 700,000 readers relying on their daily content, any downtime affecting the network or employees could lead to lost revenue and dissatisfied clients. The existing security solutions from Trend Micro and Microsoft were aging and lacked the visibility into threats that the IT team needed. The team had to navigate multiple dashboards to gather data from various areas of the network and piece together a picture of what was happening. The challenge was to find a solution that could provide better visibility and actionable data for fighting advanced threats on laptops and desktops, minimize security impact on users, and simplify and centralize threat monitoring, management, and reporting.
The Solution
CNG chose Check Point SandBlast Agent to protect the company’s desktop and laptop systems. SandBlast Agent uses a complete set of advanced endpoint protection technologies to secure CNG’s users from threats, regardless of whether they are connected within their corporate network or working remotely. The solution helps CNG detect and block attacks, including those that use social engineering techniques such as phishing to deliver malware. It also limits damage in case of infection, by blocking any command and control communications, preventing movement of sensitive information externally and restricting spread of the attack to other systems. The Threat Emulation capability within SandBlast Agent discovers malicious behavior, preventing infection by quickly inspecting files in a virtual sandbox. It also provides protection for various file types used to share information at CNG, including Microsoft Word and Excel and Adobe PDF.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.