CheckPoint Software > Case Studies > Enhancing Network Security at the University of Hawaii with Check Point Tools

Enhancing Network Security at the University of Hawaii with Check Point Tools

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Application Security
  • Cybersecurity & Privacy - Network Security
Applicable Industries
  • Education
  • National Security & Defense
Applicable Functions
  • Product Research & Development
  • Quality Assurance
Use Cases
  • Smart Campus
  • Tamper Detection
Services
  • System Integration
  • Training
About The Customer
The University of Hawaii (UH) system includes 10 campuses and dozens of educational, training, and research centers across the six Hawaiian Islands. As the public system of higher education in Hawaii, UH offers opportunities as unique and diverse as its island home. Its campuses and educational centers provide opportunities for learning and recreation, offering programs ranging from vocational training to doctoral studies. UH Information Technology Services (ITS) is responsible for supporting the computer-network security and availability demands of more than 47,000 students and 30 in-house software developers.
The Challenge
The University of Hawaii (UH) was facing a significant challenge in managing its computer-network security and availability for over 47,000 students and 30 in-house software developers. The university was using a firewall from a legacy computer-network provider, which lacked the necessary functionality and user-friendly interface. With a community of over 58,000 students, faculty, and staff, and a peak usage of 36,000 sessions per second, UH needed to stay ahead of the network demand curve and prevent potential performance issues. The university also required a solution that was flexible and adaptable to the changing pattern of attacks on the Internet. The existing firewall/VPN was too rigid and lacked intelligent management capabilities. Therefore, UH began to evaluate alternatives to its current configuration in winter 2004.
The Solution
The University of Hawaii found its solution in Check Point's VPN-1 Power integrated firewall and VPN connectivity solution hosted on a Corrent SR600 series security appliance. This solution was not only the most effective but also the most scalable, supporting up to 50,000 sessions per second. The solution also featured the industry's most intelligent security inspection technologies—Application Intelligence™ and Check Point-patented Stateful Inspection. This preempted attacks against both the network and application layers of UH's island-strewn network. The Check Point/Corrent/STHI solution performed well for UH, providing an adaptable firewall atop an accelerated VPN. The easy manageability of the solution was crucial for UH, given its network presence scattered over many square miles of the Pacific.
Operational Impact
  • The implementation of the Check Point solution has brought significant operational benefits to the University of Hawaii. As a state agency, UH ITS needs to comply with many government regulations, as well as rules enforced by non-governmental agencies. The Check Point solution has enabled UH to demonstrate compliance with these regulations, particularly in relation to online class registration and payment processing. The university was able to confidently assert the soundness of its online transaction systems in a self-assessment submitted to Visa and MasterCard, leading to their certification of UH’s online transaction system. The solution has also prepared UH for future challenges, such as the potential application of Sarbanes-Oxley legislation to higher education institutions.
Quantitative Benefit
  • Support for up to 50,000 sessions per second, ensuring scalability.
  • Managed to securely expand the university’s network availability.
  • Successfully certified credit-card transactions for registering students.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.