CheckPoint Software > Case Studies > Fondazione Telethon Bolsters Security with Check Point Next Generation Threat Prevention

Fondazione Telethon Bolsters Security with Check Point Next Generation Threat Prevention

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Endpoint Security
  • Infrastructure as a Service (IaaS) - Virtual Private Cloud
Applicable Industries
  • Construction & Infrastructure
  • National Security & Defense
Applicable Functions
  • Product Research & Development
Use Cases
  • Construction Management
  • Tamper Detection
Services
  • Cybersecurity Services
  • System Integration
About The Customer
Fondazione Telethon is a nonprofit organization based in Italy, with headquarters in Rome and Milan. Founded in 1990, Telethon fosters research that leads to cures for rare genetic diseases. The organization prioritizes its focus on diseases that are so rare that they do not attract sufficient research investment. It then matches Italy’s top researchers with the most promising projects and promotes public involvement through a television fundraising marathon, a partner and volunteer network, and other initiatives. Security at Telethon is critical because of the large amount of sensitive, high-quality research and medical data it handles. In addition to requiring information safety and business continuity, Telethon has a strong reputation for excellence.
The Challenge
Fondazione Telethon, a medical nonprofit organization based in Italy, was facing significant security challenges. The organization, which fosters research for rare genetic diseases, handles a large amount of sensitive, high-quality research and medical data. The security of this data was critical, not only for information safety and business continuity but also for maintaining the organization's stellar reputation. Any security breach could potentially cause irreparable damage to its future fundraising campaigns and limit its ability to support research. The escalating cyber threats were exposing Telethon to significant risk. The organization needed a threat protection solution that could secure its network at the edge and provide email protection, as email is a primary attack vector. Telethon also sought better insight into cyber threats to analyze attacks, infections, and impact, and wanted to improve visibility and incident analysis capabilities.
The Solution
To defend its network against advanced threats, Telethon evaluated several possible solutions and ultimately chose Check Point. Through Grafidata, a trusted Check Point partner in Rome, Telethon implemented Check Point virtual appliances, which are completely hardware-independent. Telethon implemented Check Point Software Blade architecture, initially using the Firewall, Intrusion Prevention System (IPS), URL Filtering, and VPN Software Blades. This deployment provided Telethon with integrated security for its network gateway, connections to remote locations, web security enforcement features, and intrusion prevention. Later, it added Application Control for creating granular security policies, Anti-Bot Software for defending against bot and C&C communications, and the Antivirus Software Blade to defend against incoming malicious files.
Operational Impact
  • The implementation of Check Point's solutions has provided Telethon with a robust security infrastructure. The hardware independence of the virtual appliances allows Telethon to scale its infrastructure as needed, adding processing power and exploiting the full potential of its virtual appliances with high performance and reliability. The IT team can easily add services, upgrade systems, add policies, or implement new controls with no service disruptions. The centralized control and easy manageability through a single dashboard have streamlined daily security tasks and provided valuable insight with a centralized view across the network. As Telethon grows, it can easily add new capabilities without disruption to users or its IT team. Even as cyber threats have proliferated and become more advanced, Telethon’s protection has kept pace. The IT department can intercept threats before they infect the systems and cause service disruption.
Quantitative Benefit
  • Hardware independence allows for easy scalability of infrastructure as needed.
  • Centralized control and easy manageability through a single dashboard.
  • Continuous protection against proliferating and advanced cyber threats.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.