Region
- America
Country
- Brazil
Product
- Forcepoint Web Security
- Forcepoint Email Security
- Forcepoint Data Loss Prevention
Tech Stack
- Web Security
- Email Security
- Data Loss Prevention
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Brand Awareness
- Cost Savings
- Productivity Improvements
Technology Category
- Cybersecurity & Privacy - Cloud Security
- Cybersecurity & Privacy - Database Security
- Cybersecurity & Privacy - Network Security
Applicable Functions
- Discrete Manufacturing
- Quality Assurance
Use Cases
- Cybersecurity
- Manufacturing System Automation
Services
- Cloud Planning, Design & Implementation Services
- Cybersecurity Services
About The Customer
Tekno Group is a company based in Brazil that specializes in manufacturing pre-painted metallic products. The company was using a security solution that had become cost-prohibitive and was not keeping up with the advancing technologies. They needed a solution that could protect their intellectual property and client data, increase prevention of threats via email and web, and was cost-effective while still maintaining the highest quality.
The Challenge
Tekno Group, a company specializing in manufacturing pre-painted metallic products, was facing a challenge with their previous security solution. The solution had become cost-prohibitive and was not keeping up with advancing technologies. The company needed a security strategy that could protect their intellectual property and client data, increase prevention of threats via email and web, and was cost-effective while still maintaining the highest quality.
The Solution
Tekno Group decided to implement Forcepoint's solutions to address their challenges. They used Forcepoint Web Security, Forcepoint Email Security, and Forcepoint Data Loss Prevention. These solutions provided coordination of threat response via web and email channels and inbound and outbound protection of critical data. The implementation of these solutions allowed Tekno Group to increase their protection while still reducing costs. They also gained better visibility of inbound and outbound data flow.
Operational Impact
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Plastic Spoons Case study: Injection Moulding
In order to meet customer expectations by supplying a wide variety of packaging units, from 36 to 1000 spoons per package, a new production and packaging line needed to be built. DeSter wanted to achieve higher production capacity, lower cycle time and a high degree of operator friendliness with this new production line.
Case Study
Robot Saves Money and Time for US Custom Molding Company
Injection Technology (Itech) is a custom molder for a variety of clients that require precision plastic parts for such products as electric meter covers, dental appliance cases and spools. With 95 employees operating 23 molding machines in a 30,000 square foot plant, Itech wanted to reduce man hours and increase efficiency.
Case Study
Fully Automated Visual Inspection System
Tofflon has developed a fully automatic machine that uses light to inspect vials, medicine bottles, or infusion containers for glass fragments, aluminum particles, rubber grains, hairs, fibers, or other contaminants. It also detects damaged containers with cracks or inclusions (microscopic imperfections), automatically removing faulty or contaminated products. In order to cover all production processes for freeze-dried pharmaceuticals, Tofflon needed to create an open, consistent, and module-based automation concept.
Case Study
SAP Leonardo Enabling Rocket Science
At times, ULA has as many as 15 different operating systems dedicated to overlapping processes, such as rocket design, testing, and launch. Multiple systems created unnecessary costs and unwanted confusion among workers at offices, factories, and launch sites in different location. In order to improve collaboration and transparency during vital activities that directly influence mission success, ULA wanted to improve data sharing and streamline manufacturing processes.
Case Study
Enel Secures Italian Power Generation Network
Electric energy operators around the world are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company that manages and monitors the Italian power grid. This grid:• Serves 31 million customers• Has a net installed energy capacity exceeding 31 gigawatts• Includes more than 500 power generation plants,including hydroelectric, thermoelectric, and wind• Is managed and monitored by Enel 24/7/365• Is operated by Terna, the Italian Transmission System Operator (TSO)Enel is responsible for the availability of the grid’s underlying ICS and industrial network. It also manages Regional Control Centers and Interconnection Centers which connect with the TSO. The TSO manages the flow of energy to the grid plus controls and remotely regulates the power generation of power plants, increasing and decreasing power production as required. The complex system of interaction and cooperation between Enel and the TSO has strong security implications as well as operational and business challenges.
Case Study
Securing the Connected Car Ecosystem
In-vehicle communications and entertainment system hosts high-value or sensitive applications. API libraries facilitate communication and sharing of vehicle data. These API libraries are vulnerable to reverse engineering and tampering attacks and may even result in loss of passenger safety. Attackers can inject malware that may be able to migrate to other in-car networks such as the controller-area-network (CAN) bus which links to the vehicle’s critical systems. Software provided for dealers to interface with cars through the OBD2 port is vulnerable to reverse engineering and tampering attacks. Hackers may be able to abuse these tools to inject malicious code into the ECUs and CAN bus. Attackers can lift the cryptographic keys used, and use that to build their own rogue apps/software. Their cloned version of the original app/software may have altered functionality, and may intend to gain access to other in-car networks.