Technology Category
- Infrastructure as a Service (IaaS) - Cloud Computing
- Infrastructure as a Service (IaaS) - Hybrid Cloud
Applicable Industries
- E-Commerce
- National Security & Defense
Applicable Functions
- Maintenance
- Sales & Marketing
Use Cases
- Inventory Management
- Tamper Detection
Services
- Cloud Planning, Design & Implementation Services
- Hardware Design & Engineering Services
About The Customer
Kingdee Youshang E-business Service Co. Ltd. is a subsidiary of Kingdee International Software Group, one of the largest online software application and service platforms in China. The company has been the number one player in China's enterprise online management service market for three consecutive years. Headquartered in Shenzhen, Kingdee Youshang has over 20 branches, including established sales and marketing offices across seven key regions within China. The company focuses on providing one-stop shopping of management software and E-business services, catering primarily to small and medium-sized businesses that lack the necessary IT resources for deploying ERP and CRM software solutions.
The Challenge
Kingdee Youshang E-business Service Co. Ltd., a leading player in China's enterprise online management service market, faced several challenges in maintaining a high level of security for its cloud computing and endpoint devices. The company needed to implement robust mobile data protection and improve efficiency for its remote offices. Many small and medium-sized businesses, which are Kingdee Youshang's primary customers, lack the necessary IT resources for deploying ERP and CRM software solutions. Kingdee Youshang specializes in providing this market with a full array of software, platform, and service support, including security. To ensure proper protection of its resources, the company needed to secure its applications with a robust data protection solution, ensure data integrity on client’s endpoint machines with proven encryption technology, and improve the efficiency of remote offices while maintaining a high level of security for cloud computing and endpoint devices.
The Solution
Kingdee Youshang adopted Check Point's data protection solutions to ensure the confidentiality and integrity of data accessed through the cloud and on its endpoint machines. This included the Check Point Full Disk Encryption Software Blade (FDE) for data at rest on desktop and laptop PCs, which protects from unauthorized access to data if laptops are lost or stolen. The company also implemented Check Point GO to enable its clients and mobile workers to access corporate cloud applications and data on both managed and unmanaged machines. Check Point GO allowed Kingdee Youshang and its customers to eliminate the need for providing laptop computers to tele-workers, opting instead to empower them with a secure remote access device. This not only reduced IT hardware and management costs but also increased working efficiency. Furthermore, Check Point GO enabled the company to meet strict internal security requirements as well as industry and government regulations while increasing mobility.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Data Capture for Afghanistan Forces
Electronic equipments on the field of Afghanistan provided information on the status of the vehicle and to identify potential threats surrounding it to the British Force. The monitoring and interpretation of this data requires robust and sophisticated digitization for data capture and communication.
Case Study
Digital Transformation of Atlanta Grout & Tile: An IoT Case Study
Atlanta Grout & Tile, a Tile, Stone & Grout restoration company based in Woodstock, Georgia, was facing challenges with its traditional business model. Despite steady growth over the years, the company was falling behind the web revolution and missing out on the opportunity to tap into a new consumer base. They were using independent software from different vendors for each of their department information and workforce management. This resulted in a lot of manual work on excel and the need to export/import data between different systems. This not only increased overhead costs but also slowed down their response to clients. The company also had to prepare numerous reports manually and lacked access to customer trends for effective business decision-making.
Case Study
Major Aerospace Company Automates Asset Management
The O&M division of an aerospace and global security company was using spreadsheets to manually track more than 3,000 assets assigned to students and staff. Maintaining audit trails for this high volume of equipment became increasingly time-consuming and challenging. The chore involved knowing precisely what equipment was on hand, what had been issued, its location and the name of the custodial owner of each item. Every aspect of this task was carried owner of each item. Every aspect of this task was carried out by individuals with spreadsheets. Manually documenting the full lifecycle of each asset added to the burden. This included tracking maintenance requirements and records, incidents and damages, repairs, calibrations, depreciation, and end-of-life data.
Case Study
Securing a Large Data Center in the EMEA Region: An IoT Case Study
A leading data-center operator in the EMEA region, with multiple facilities spanning over 25,000 square meters, faced significant security challenges. The operator experienced interruptions in their internal IT network due to unsupervised work of third-party technicians. Despite having a high-end building control system that provided 24x7 monitoring and control to all the building’s infrastructure, the data center was vulnerable from a cyber perspective as it was connected to the IT network infrastructure. The operator launched an urgent OT cyber security project that included both IT-OT network segmentation and OT network asset mapping and anomaly detection. The main objectives were to harden the security of the server systems, secure the facility’s power supply and server cooling system, strengthen the segmentation between building and operational systems, create a visual OT network map, and set up a system for presenting supply-chain attacks that may threaten the data center through equipment vendors’ maintenance activities.
Case Study
IFFCO Boosts IT Performance and Innovates Agriculture with Oracle Cloud
Indian Farmers Fertiliser Cooperative Ltd. (IFFCO), the world’s largest manufacturer and marketer of fertilizers in the cooperative sector, was facing several challenges in its quest to innovate and improve the livelihood of farmers in India. The organization had recently launched a new product, nano urea, which brought new demands to IFFCO’s cloud computing needs. The organization needed a reliable cloud vendor to support the processes of 6–7 new manufacturing plants during the upcoming year, enhancing its production capability 300–350 million bottles of nano urea to meet increasing demand. IFFCO’s cloud adoption was driven by a need to innovate. The organization wanted capabilities for a dynamic business that can adapt to the changing needs of the market while growing fast. However, it was inhibited by rigid on-premises data center deployments and the overhead of maintaining legacy systems. IFFCO wanted to apply the elasticity and availability of cloud for improving overall performance of applications at lowest possible operational overhead. Lastly, IFFCO needed to provide the benefits of its technology to all its stakeholders, including employees, members, transporters, and farmers, some of whom have limited literacy. To accommodate all stakeholders, IFFCO wanted to add a voice interface to its applications.
Case Study
Enhancing Security Precision with IoT: A Case Study of Guardsman Group
Guardsman Group, a leading security company in the Caribbean, faced a significant challenge in maintaining the security of its digital infrastructure. The company provides security equipment, personnel, and systems for various businesses across the region. However, one of its offices experienced a security incident that affected all communications at that location. The existing security tools were not sufficient to provide the necessary protection, and it took hours to identify the source of the issue. This incident highlighted the need for a dynamic solution that could proactively identify threats. The company's primary concern was any disruption to its business, as it manages a significant portion of Jamaica's money and cannot afford for its operations to go down.