CheckPoint Software > Case Studies > Enhanced Data Security for NHS Blood and Transplant with Check Point Endpoint Security

Enhanced Data Security for NHS Blood and Transplant with Check Point Endpoint Security

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Application Security
  • Cybersecurity & Privacy - Endpoint Security
Applicable Industries
  • Equipment & Machinery
  • National Security & Defense
Applicable Functions
  • Product Research & Development
Use Cases
  • Remote Control
  • Tamper Detection
Services
  • Cybersecurity Services
About The Customer
NHS Blood and Transplant is an integral part of the National Health Service (NHS) in the UK. The organization collects, processes, stores, and issues approximately 2.1 million blood donations per year from its 15 blood centres in England and North Wales. In addition to dealing with blood donations, NHS Blood and Transplant conducts new research into improving the safety of blood and blood products, and the ways they can be used to help save lives. The organization stores confidential personal data as well as sensitive research data, making it imperative to have a robust data security solution in place.
The Challenge
NHS Blood and Transplant, a part of the National Health Service (NHS), is responsible for collecting, processing, storing, and issuing approximately 2.1 million blood donations per year. In addition to handling blood donations, the organization also conducts research to improve the safety of blood and blood products. This involves storing confidential personal data and sensitive research data, making it crucial for the organization to have a fail-safe data security solution. Although NHS Blood and Transplant already had a robust laptop and PC security solution in place as an existing Check Point customer, they needed to enhance the protection for sensitive data on its PCs to comply with the latest UK Government’s directives on data security in the public sector.
The Solution
After evaluating solutions from several vendors, NHS Blood and Transplant chose to deploy Check Point Endpoint Security. This is the first single agent for total endpoint security that combines a firewall, network access control, program control, antivirus, anti-spyware, data security, and remote access. It is designed to protect company laptops and PCs against malware, data loss, and other threats while enabling secure remote access to the corporate network. The solution was chosen for its ability to deliver comprehensive security in a single software agent that is easily deployed and managed from a single console. Check Point Endpoint Security also includes data security for preventing data loss and theft and a VPN client which provides secure remote access for employees working offsite.
Operational Impact
  • The deployment of Check Point Endpoint Security has significantly enhanced the data security at NHS Blood and Transplant. The solution has provided comprehensive protection for the data on its fleet of laptops, desktop PCs, and USB storage devices against malware, data loss, and theft. The full-disk encryption feature of Endpoint Security ensures that employees don’t have to make any decisions about what data needs protecting. The solution also gives full control over data written to USB devices and removable media, and controls which types of removable storage devices can be used on the organization's network. The deployment and ongoing management have been seamless and easy for users and the IT team. The solution also allows any required upgrades or policy issues to be identified and addressed directly by administrators from the central management console.
Quantitative Benefit
  • Secured confidential data on all laptops, PCs, and USB devices against malware, theft, and data loss
  • Enabled secure remote access to corporate networks for employees
  • Reduced burden on IT support staff through quick and easy centralized deployment, and ease of administration and management

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.