CheckPoint Software > Case Studies > Enhancing Endpoint Security for a U.S. State Agency with Check Point Solutions

Enhancing Endpoint Security for a U.S. State Agency with Check Point Solutions

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Cybersecurity & Privacy - Security Compliance
Applicable Industries
  • Education
  • National Security & Defense
Applicable Functions
  • Maintenance
  • Quality Assurance
Use Cases
  • Inventory Management
  • Tamper Detection
About The Customer
The customer is a state agency belonging to one of the largest states in the US with a population of more than 25 million. The agency is comprised of five divisions and serves all boards and agencies of its state government. As a state entity, the agency must abide by strict compliance and privacy laws, and it is responsible for ensuring optimal data protection. The agency was looking for a solution that could consolidate various technologies, simplify management, reduce costs, and increase protection through user education.
The Challenge
The state agency, serving all boards and agencies of its state government, was faced with the challenge of abiding by strict compliance and privacy laws. The agency needed to ensure optimal data protection and was looking for a solution that could consolidate technologies including encryption, firewall, and anti-malware. They also required simplified central management and reporting, reduced costs associated with a multi-vendor deployment, and increased protection through user education. The selection criteria for the solution included comprehensive coverage, enhanced support, a common management console with a single interface, policy-based controls, a small footprint, and cost-effectiveness.
The Solution
The agency chose Check Point Endpoint Security to meet their needs. The solution provides comprehensive coverage with simplified and intuitive management. It includes Full Disk Encryption (FDE) and Media Encryption (ME) to safeguard against the loss of intellectual property, comply with HIPPA regulations, and ensure the protection of personally identifiable information. The solution also includes Anti-Malware & Program Control, Firewall & Compliance Check, and WebCheck, providing better control and increased security protection in a single consolidated package. The Check Point Endpoint security solution also enables the agency to identify, set customized messages for various conditions, and drive users to take corrective actions should they be out of compliance, violating agency policy, or a number of other conditions that might arise. The solution's centralized management increases visibility and simplifies the deployment of consistent policies across nearly 5000 endpoint devices.
Operational Impact
  • The Check Point Endpoint Security solution has significantly improved the agency's security posture. It has provided a comprehensive solution that maintains the ability to comply with government privacy and security requirements. It has also delivered multi-tiered endpoint threat protection in an integrated package and efficiently detects and removes malware from endpoints with a single scan. The solution's centralized security management enables the agency to set and monitor policies for multiple security needs while conserving resources. The single management console simplifies administration. The solution has proven to be reliable, significantly lessening the possibility of major work disruption. The agency has been able to ensure a strong security posture, compliance with government and privacy policies, and optimal configuration and protection against malware.
Quantitative Benefit
  • Cut the number of infected machines by at least half
  • Deployed consistent policies across nearly 5000 endpoint devices
  • Reduced costs associated with a multi-vendor deployment

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.