CheckPoint Software > Case Studies > Enhancing Mobile Security and IT Productivity: A Case Study on Terma

Enhancing Mobile Security and IT Productivity: A Case Study on Terma

CheckPoint Software Logo
Technology Category
  • Platform as a Service (PaaS) - Device Management Platforms
  • Robots - Wheeled Robots
Applicable Industries
  • Aerospace
  • Telecommunications
Applicable Functions
  • Maintenance
Use Cases
  • Tamper Detection
  • Time Sensitive Networking
About The Customer
Terma is a global defense and aerospace contractor based in Denmark. The company provides mission-critical solutions for aerospace, defense, and security customers. Operating subsidiaries around the world, Terma has 1,300 employees. Security is paramount for the company as it develops and customizes components for complex defense systems like military aircraft, radar, and surveillance. Terma employees routinely work with highly confidential information, and the company must meet customers’ specific security requirements before they can collaborate on projects.
The Challenge
Terma, a global defense and aerospace contractor based in Denmark, faced a significant challenge in securing mobile connections to internal corporate information. The company's employees routinely work with highly confidential information, and the company must meet specific security requirements before collaborating on projects. As mobile devices became essential to employees, Terma needed to ensure that these devices and remote connections to corporate assets were as secure as desktop systems and connections. The company had implemented multiple layers of security, such as firewalls, filters, encryption, and others, to protect devices and information in all its product areas. However, when it came to securing mobile access to data for its 600 mobile users, Terma needed a robust solution.
The Solution
Terma chose Check Point Capsule Workspace (Workspace) to secure mobile access to data. Workspace includes a secure container that isolates corporate data on iOS and Android mobile devices. It provides users with one-touch access to corporate email, calendars, contacts, documents, and applications, and it enables remote access to internal corporate resources. For IT, Workspace encrypts business data and applications seamlessly to ensure secure access for authorized users. Unlike competing solutions, Workspace communicates directly with Terma’s existing Check Point firewall, reducing potential points of failure and improving the user experience by making data access faster and more efficient. Workspace also provides IT with information about how the solution is being used, helping Terma ensure that it is meeting its compliance requirements.
Operational Impact
  • The implementation of Check Point Capsule Workspace has brought significant operational benefits to Terma. The solution's encrypted container and identity management have enabled secure, direct access from mobile devices to internal systems. It has also given IT control over who connects on which devices and creates expirations on local data storage. Workspace can detect and prevent access from compromised devices and can remotely wipe the entire mobile corporate workspace if necessary. The solution's synchronization with Terma’s Microsoft Exchange environment has delivered fast, accurate email and calendar information to users, resulting in high user satisfaction. Furthermore, Workspace has simplified maintenance dramatically, making it easier for Terma to provision and maintain mobile devices.
Quantitative Benefit
  • Reduced time required to implement software and security on mobile devices from more than 30 to less than 10 minutes
  • Streamlined infrastructure, minimized potential points of failure, and accelerated responsiveness of the mobile apps
  • High user satisfaction and adoption due to outstanding usability

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.